To design a clinically translatable nanomedicine for photodynamic theranostics, the ingredients should be carefully considered. A high content of nanocarriers may cause extra toxicity in metabolism, and multiple theranostic agents would complicate the preparation process. These issues would be of less concern if the nanocarrier itself has most of the theranostic functions. In this work, a poly(ethylene glycol)‐boron dipyrromethene amphiphile (PEG‐F54‐BODIPY) with 54 fluorine‐19 (19F) is synthesized and employed to emulsify perfluorohexane (PFH) into a theranostic nanoemulsion (PFH@PEG‐F54‐BODIPY). The as‐prepared PFH@PEG‐F54‐BODIPY can perform architecture‐dependent fluorescence/photoacoustic/19F magnetic resonance multimodal imaging, providing more information about the in vivo structure evolution of nanomedicine. Importantly, this nanoemulsion significantly enhances the therapeutic effect of BODIPY through both the high oxygen dissolving capability and less self‐quenching of BODIPY molecules. More interestingly, PFH@PEG‐F54‐BODIPY shows high level of tumor accumulation and long tumor retention time, allowing a repeated light irradiation after a single‐dose intravenous injection. The “all‐in‐one” photodynamic theranostic nanoemulsion has simple composition, remarkable theranostic efficacy, and novel treatment pattern, and thus presents an intriguing avenue to developing clinically translatable theranostic agents. 相似文献
This article deals with the issue of input-to-state stabilization for recurrent neural networks with delay and external disturbance. The goal is to design a suitable weight-learning law to make the considered network input-to-state stable with a predefined -gain. Based on the solution of linear matrix inequalities, two schemes for the desired learning law are presented via using decay-rate-dependent and decay-rate-independent Lyapunov functionals, respectively. It is shown that, in the absence of external disturbance, the proposed learning law also guarantees the exponential stability of the network. To illustrate the applicability of the present weight-learning law, two numerical examples with simulations are given. 相似文献
The corrosion behaviour of 6082 aluminium alloy was studied by measuring the electrochemical impedance spectra and electrode polarization curves. After the electrochemical tests, a microstructural analysis of the samples was conducted by using optical microscopy and electron scanning microscopy techniques to determine the corrosion mechanism. The results show that the Nyquist plot of the electrochemical impedance data in the NaCl solution consists of high- and low-frequency capacitive impedance loops. When ions are added to the NaCl etchant, the Nyquist plots of the electrochemical impedance data are composed of two different curves: a high-frequency capacitive impedance loop and a low-frequency inductive impedance loop. The corrosion current density increases with increasing concentration, and as a result, the corrosion resistance of the aluminium alloy decreases. The microstructures of 6082 aluminium alloy consist of Mg2Si secondary particles in a large α-Al matrix. Pitting corrosion initially occurs at the boundary between the matrix and secondary particles because the electrode potentials of the matrix and secondary particles are different. Then, corrosion paths develop along the network-like grain boundaries, and finally, massive network-like corrosion occurs throughout the entire alloy. 相似文献
Emerging privacy-preserving technologies help protect sensitive data during application executions. Recently, the secure two-party computing (TPC) scheme has demonstrated its potential, especially for the secure model inference of a deep learning application by protecting both the user input data and the model parameters. Nevertheless, existing TPC protocols incur excessive communications during the program execution, which lengthens the execution time. In this work, we propose the precomputing scheme, POPS, to address the problem, which is done by shifting the required communications from during the execution to the time prior to the execution. Particular, the multiplication triple generation is computed beforehand with POPS to remove the overhead at runtime. We have analyzed the TPC protocols to ensure that the precomputing scheme conforms the existing secure protocols. Our results show that POPS takes a step forward in the secure inference by delivering up to \(20\times \) and \(5\times \) speedups against the prior work for the microbenchmark and the convolutional neural network experiments, respectively.