Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this ...Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed.展开更多
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16...Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin...The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.展开更多
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.展开更多
This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC)....This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data.展开更多
With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-base...With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance.展开更多
With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication...With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach.展开更多
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r...Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.展开更多
While being successful in the detection and attribution of climate change,the optimal fingerprinting method(OFM)may have some limitations from a physics-and-dynamics-based viewpoint.Here,an analysis is made on the lin...While being successful in the detection and attribution of climate change,the optimal fingerprinting method(OFM)may have some limitations from a physics-and-dynamics-based viewpoint.Here,an analysis is made on the linearity,noninteraction,and stationary-variability assumptions adopted by OFM.It is suggested that furthering OFM needs a viewpoint beyond statistical science,and the method should be combined with theoretical tools in the dynamics and physics of the Earth system,so as to be applied for the detection and attribution of nonlinear climate change including tipping elements within the Earth system.展开更多
[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with diffe...[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different.展开更多
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma...This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.展开更多
[Objectives]To establish the HPLC-DAD fingerprint of Xueshuan Xinmaining Capsule(XXC).[Methods]The chromatographic conditions for the analysis of XXC solution were as follows:XSelect HSS T3 column;acetonitrile-0.1%pho...[Objectives]To establish the HPLC-DAD fingerprint of Xueshuan Xinmaining Capsule(XXC).[Methods]The chromatographic conditions for the analysis of XXC solution were as follows:XSelect HSS T3 column;acetonitrile-0.1%phosphoric acid water was used as mo-bile phase,gradient elution;flow rate:1.0 mL/min;column temperature 30℃;The injection volume is 10μL.The quality of XXC samples produced by different manufacturers was evaluated by similarity evaluation and cluster analysis.[Results]In theHPLC-dad fingerprints of 15 batches of XXC,23 common peaks were identified and 9 peaks were identified,and the similarity was greater than 0.95.According to the re-sults of cluster analysis,15 batches of XXC samples could be divided into two categories,S2,S5,S6,S7 and S8 batches belonged to category Ⅰ,and the rest batches belonged to category Ⅱ.[Conclusions]In this study,a representative and universal identification method of Xxc HPLC-DAD fingerprint was established.The method has high precision,stability and repeatability,is simple and reliable,and provides a pow-erful reference for further improving the quality evaluation system of XXC.展开更多
Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the i...Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition.展开更多
Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)w...Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies.展开更多
Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the ...Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the performance of RF Fingerprint(RFF)based on preamble with fixed duration, a nonlinear RF fingerprinting method based on payload symbols is proposed for the wireless OFDM communication with the bit mapping scheme of QPSK. The wireless communication system is modeled as a Hammerstein system containing the nonlinear transmitter and multipath fading channel. A parameter separation technique based on orthogonal polynomial is presented for the estimation of the parameters of the Hammerstein system. The Hammerstein system parameter separation technique is firstly used to estimate the linear parameter with the training signal, which is used to compensate the adverse effect of the linear channel for the demodulation of the successive payload symbols. The demodulated payload symbols are further used to estimate the nonlinear coefficients of the transmitter with the Hammerstein system parameter separation technique again, which is used as the novel RFF for the authentication of the QPSK-OFDM device. Numerical simulations have verified the proposed method, which can also be extended to the OFDM signals with other bit mapping schemes.展开更多
High-precision localization technology is attracting widespread attention in harsh indoor environments.In this paper,we present a fingerprint localization and tracking system to estimate the locations of the tag based...High-precision localization technology is attracting widespread attention in harsh indoor environments.In this paper,we present a fingerprint localization and tracking system to estimate the locations of the tag based on a deep belief network(DBN).In this system,we propose using coefficients as fingerprints to combine the ultra-wideband(UWB)and inertial measurement unit(IMU)estimation linearly,termed as a HUID system.In particular,the fingerprints are trained by a DBN and estimated by a radial basis function(RBF).However,UWB-based estimation via a trilateral method is severely affected by the non-line-of-sight(NLoS)problem,which limits the localization precision.To tackle this problem,we adopt the random forest classifier to identify line-of-sight(LoS)and NLoS conditions.Then,we adopt the random forest regressor to mitigate ranging errors based on the identification results for improving UWB localization precision.The experimental results show that the mean square error(MSE)of the localization error for the proposed HUID system reduces by 12.96%,50.16%,and 64.92%compared with that of the existing extended Kalman filter(EKF),single UWB,and single IMU estimation methods,respectively.展开更多
The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome t...The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome the high costs of traditional fingerprint database construction and matching algorithms.First,a partial fingerprint database constructed and the accelerated proximal gradient algorithm is used to fill the partial fingerprint database to construct a full fingerprint database.Second,a fingerprint database division method based on the strongest received signal strength indicator is proposed,which divides the original fingerprint database into several sub-fingerprint databases.Finally,a classification weighted K-nearest neighbor fingerprint matching algorithm is proposed.The estimated coordinates of the point to be located can be obtained by fingerprint matching in a sub-fingerprint database.The simulation results show that the MC-FPL algorithm can reduce the complexity of database construction and fingerprint matching and has higher positioning accuracy compared with the traditional fingerprint algorithm.展开更多
Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessme...Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessment of natural medicines is essential for any therapeutic or health care applications,as their therapeutic potential varies between different geographic origins,plant species,and varieties.Classification of herbal medicines based on a limited number of secondary metabolites is not an ideal approach.Their quality should be considered based on a complete metabolic profile,as their pharmacological activity is not due to a few specific secondary metabolites but rather a larger group of bioactive compounds.A holistic and integrative approach using rapid and nondestructive analytical strategies for the screening of herbal medicines is required for robust characterization.In this study,a rapid and effective quality assessment system for geographical traceability,species,and variety-specific authenticity of the widely used natural medicines turmeric,Ocimum,and Withania somnifera was investigated using Fourier transform near-infrared(FT-NIR)spectroscopy-based metabolic fingerprinting.Four different geographical origins of turmeric,five different Ocimum species,and three different varieties of roots and leaves of Withania somnifera were studied with the aid of machine learning approaches.Extremely good discrimination(R^(2)>0.98,Q^(2)>0.97,and accuracy=1.0)with sensitivity and specificity of 100%was achieved using this metabolic fingerprinting strategy.Our study demonstrated that FT-NIR-based rapid metabolic fingerprinting can be used as a robust analytical method to authenticate several important medicinal herbs.展开更多
Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF ide...Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700.展开更多
基金This study was supported by the National Natural Science Foundation of China(No.81573586).
文摘Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed.
基金This work was supported by the Scientific Research Foundation for High Level Talents of Qingdao Agricultural University,China(665-1120015)the National Program for Quality and Safety Risk Assessment of Agricultural Products of China(GJFP2019011)the National Natural Science Foundation of China(42207017).
文摘Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by National Key R&D Program of China(2019YFB2102303)National Natural Science Foundation of China(NSFC61971014,NSFC11675199)Young Backbone Teacher Training Program of Henan Colleges and Universities(2021GGJS170).
文摘The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.
基金the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
文摘Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.
基金supported by Hunan 2011 Collaborative Innovation Center of Chemical Engineering&Technology with Environmental Benignity and Effective Resource Utilization,Hunan Province Natural Science Fund,China(Grant Nos.:2020JJ4569,2023JJ60378)Hunan Province College Students'Innovation and Entrepreneurship Training Program,China(Grant Nos.:S202110530044,S202210530048).
文摘This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data.
文摘With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance.
文摘With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach.
基金supported in part by the National Science Foundation of China under Grants U22B2027,62172297,62102262,61902276 and 62272311,Tianjin Intelligent Manufacturing Special Fund Project under Grant 20211097the China Guangxi Science and Technology Plan Project(Guangxi Science and Technology Base and Talent Special Project)under Grant AD23026096(Application Number 2022AC20001)+1 种基金Hainan Provincial Natural Science Foundation of China under Grant 622RC616CCF-Nsfocus Kunpeng Fund Project under Grant CCF-NSFOCUS202207.
文摘Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.
基金support from the National Natural Science Foundation of China(Grant No.42175070)。
文摘While being successful in the detection and attribution of climate change,the optimal fingerprinting method(OFM)may have some limitations from a physics-and-dynamics-based viewpoint.Here,an analysis is made on the linearity,noninteraction,and stationary-variability assumptions adopted by OFM.It is suggested that furthering OFM needs a viewpoint beyond statistical science,and the method should be combined with theoretical tools in the dynamics and physics of the Earth system,so as to be applied for the detection and attribution of nonlinear climate change including tipping elements within the Earth system.
基金Supported by General Program of Guangxi Natural Science Foundation(2022GXNSFAA035599).
文摘[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different.
文摘This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.
文摘[Objectives]To establish the HPLC-DAD fingerprint of Xueshuan Xinmaining Capsule(XXC).[Methods]The chromatographic conditions for the analysis of XXC solution were as follows:XSelect HSS T3 column;acetonitrile-0.1%phosphoric acid water was used as mo-bile phase,gradient elution;flow rate:1.0 mL/min;column temperature 30℃;The injection volume is 10μL.The quality of XXC samples produced by different manufacturers was evaluated by similarity evaluation and cluster analysis.[Results]In theHPLC-dad fingerprints of 15 batches of XXC,23 common peaks were identified and 9 peaks were identified,and the similarity was greater than 0.95.According to the re-sults of cluster analysis,15 batches of XXC samples could be divided into two categories,S2,S5,S6,S7 and S8 batches belonged to category Ⅰ,and the rest batches belonged to category Ⅱ.[Conclusions]In this study,a representative and universal identification method of Xxc HPLC-DAD fingerprint was established.The method has high precision,stability and repeatability,is simple and reliable,and provides a pow-erful reference for further improving the quality evaluation system of XXC.
文摘Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition.
文摘Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies.
文摘Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the performance of RF Fingerprint(RFF)based on preamble with fixed duration, a nonlinear RF fingerprinting method based on payload symbols is proposed for the wireless OFDM communication with the bit mapping scheme of QPSK. The wireless communication system is modeled as a Hammerstein system containing the nonlinear transmitter and multipath fading channel. A parameter separation technique based on orthogonal polynomial is presented for the estimation of the parameters of the Hammerstein system. The Hammerstein system parameter separation technique is firstly used to estimate the linear parameter with the training signal, which is used to compensate the adverse effect of the linear channel for the demodulation of the successive payload symbols. The demodulated payload symbols are further used to estimate the nonlinear coefficients of the transmitter with the Hammerstein system parameter separation technique again, which is used as the novel RFF for the authentication of the QPSK-OFDM device. Numerical simulations have verified the proposed method, which can also be extended to the OFDM signals with other bit mapping schemes.
基金supported in part by the National Natural Science Foundation of China under Grant No.61771474in part by the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.KYCX212243+2 种基金in part by the Young Talents of Xuzhou Science and Technology Plan Project under Grant No.KC19051in part by the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2021D02in part by the Open Fund of Information Photonics and Optical Communications (IPOC) (BUPT)。
文摘High-precision localization technology is attracting widespread attention in harsh indoor environments.In this paper,we present a fingerprint localization and tracking system to estimate the locations of the tag based on a deep belief network(DBN).In this system,we propose using coefficients as fingerprints to combine the ultra-wideband(UWB)and inertial measurement unit(IMU)estimation linearly,termed as a HUID system.In particular,the fingerprints are trained by a DBN and estimated by a radial basis function(RBF).However,UWB-based estimation via a trilateral method is severely affected by the non-line-of-sight(NLoS)problem,which limits the localization precision.To tackle this problem,we adopt the random forest classifier to identify line-of-sight(LoS)and NLoS conditions.Then,we adopt the random forest regressor to mitigate ranging errors based on the identification results for improving UWB localization precision.The experimental results show that the mean square error(MSE)of the localization error for the proposed HUID system reduces by 12.96%,50.16%,and 64.92%compared with that of the existing extended Kalman filter(EKF),single UWB,and single IMU estimation methods,respectively.
基金supported in part by Sub Project of National Key Research and Development plan in 2020.NO.2020YFC1511704Beijing Information Science and Technology University.NO.2020KYNH212,NO.2021CGZH302+1 种基金Beijing Science and Technology Project(Grant No.Z211100004421009)in part by the National Natural Science Foundation of China(Grant No.61971048)。
文摘The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome the high costs of traditional fingerprint database construction and matching algorithms.First,a partial fingerprint database constructed and the accelerated proximal gradient algorithm is used to fill the partial fingerprint database to construct a full fingerprint database.Second,a fingerprint database division method based on the strongest received signal strength indicator is proposed,which divides the original fingerprint database into several sub-fingerprint databases.Finally,a classification weighted K-nearest neighbor fingerprint matching algorithm is proposed.The estimated coordinates of the point to be located can be obtained by fingerprint matching in a sub-fingerprint database.The simulation results show that the MC-FPL algorithm can reduce the complexity of database construction and fingerprint matching and has higher positioning accuracy compared with the traditional fingerprint algorithm.
基金Department of Science and Technology-SERB-SRG research grant(Grant No.:SRG/2021/000750-G)and Department of Biotechnology for Ramalingaswami grant(Grant No.:BT/RLF/Re-entry/21/2020)Director,Prabodh Kumar Trivedi,of CSIR-CIMAP for providing infrastructure,facility,and funding support from CSIR,India(Grant Nos.:FC2020-23/NMITLI/TLP0001&TLP0002)We acknowledge Dr.Ritu Trivedi(CSIR-CDRI Lucknow,India)for support and Dr.Abolie Girme and Dr.Lal Hingorani(Pharmanza herbal Pvt.Ltd,India)for providing Withania somnifera samples.We acknowledge Dr.Neerja Tiwari for FT-NIR access,Ms.Manju Yadav and Ms.Namita Gupta for HPLC access,and Ms.Anju Yadav for GC-MS access.Authors would like to thank Aroma mission HCP-0007,India for funding support.Prof.Christopher T.Elliott would like to thank Bualuang ASEAN Chair Professor Fund,UK and Queen's University Belfast Fund,UK.
文摘Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessment of natural medicines is essential for any therapeutic or health care applications,as their therapeutic potential varies between different geographic origins,plant species,and varieties.Classification of herbal medicines based on a limited number of secondary metabolites is not an ideal approach.Their quality should be considered based on a complete metabolic profile,as their pharmacological activity is not due to a few specific secondary metabolites but rather a larger group of bioactive compounds.A holistic and integrative approach using rapid and nondestructive analytical strategies for the screening of herbal medicines is required for robust characterization.In this study,a rapid and effective quality assessment system for geographical traceability,species,and variety-specific authenticity of the widely used natural medicines turmeric,Ocimum,and Withania somnifera was investigated using Fourier transform near-infrared(FT-NIR)spectroscopy-based metabolic fingerprinting.Four different geographical origins of turmeric,five different Ocimum species,and three different varieties of roots and leaves of Withania somnifera were studied with the aid of machine learning approaches.Extremely good discrimination(R^(2)>0.98,Q^(2)>0.97,and accuracy=1.0)with sensitivity and specificity of 100%was achieved using this metabolic fingerprinting strategy.Our study demonstrated that FT-NIR-based rapid metabolic fingerprinting can be used as a robust analytical method to authenticate several important medicinal herbs.
基金supported by Innovation Talents Promotion Program of Shaanxi Province,China(No.2021TD08)。
文摘Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700.