Dear Dale,I'm glad to hear from you.You asked me something about how to make friends.In my opinion,you can make friends in the following principles.First of all,you must be friendly to others if you want to make f...Dear Dale,I'm glad to hear from you.You asked me something about how to make friends.In my opinion,you can make friends in the following principles.First of all,you must be friendly to others if you want to make friends with them.Everyone can be in trouble,so at any time,you should be friendly to others.In this way,you will have a lot of friends.展开更多
With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to mult...With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.展开更多
Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A light...Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.展开更多
FROM May 5 to 10,Chinese President Xi Jinping paid state visits to France,Serbia,and Hungary.Being his first European trip in about five years,it consolidated China’s relationships with the three countries and Europe...FROM May 5 to 10,Chinese President Xi Jinping paid state visits to France,Serbia,and Hungary.Being his first European trip in about five years,it consolidated China’s relationships with the three countries and Europe as a whole.The four states looked back on the history of their friendships,signed multiple cooperation agreements,and reached a consensus on promoting stable and sound development of China-Europe relations.Great Minds Think Alike Upon his arrival in Paris on May 5,President Xi Jinping received a warm welcome in Chinese from Gabriel Attal,France’s youngest ever modern prime minister.展开更多
Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in l...Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in low prevalence settings, where HIV rates are <0.1% of the population, false positive results are more likely. This results in apprehension in the dialysis unit as breaches in infectious disease protocols could be presumed. This is illustrated in the case report below. Case Summary: A 62-year-old male Saudi end-stage kidney disease patient secondary to DM nephropathy began dialysis a year before presentation in a hemodialysis center in Saudi Arabia. Routine screening tests done at the start of dialysis revealed negative Hepatitis C, HIV 1 and 2 screening but a positive Hepatitis B surface antigen screen. The patient went for holiday dialysis at another facility and had a routine fourth-generation HIV test done which was positive. A confirmatory HIV PCR test was negative. Conclusion: This case highlights the need for caution in interpreting highly sensitive and specific HIV screening tests in a low-prevalence setting. Routine screening beyond the national recommendation may not be necessary in low-prevalence areas.展开更多
Hello,I am Allen,a primary school student from No.2 Experimental Primary School in Doumen District,Zhuhai,Guangdong Province.I am an active and outgoing person who loves making friends.Allow me to introduce you to my ...Hello,I am Allen,a primary school student from No.2 Experimental Primary School in Doumen District,Zhuhai,Guangdong Province.I am an active and outgoing person who loves making friends.Allow me to introduce you to my five good friends:Nick,Jack,Alex,Tina,and Lily.展开更多
It is very easy for an African living in Africa to be misled into believing that the China-Africa friendship is superficial.In fact,with so much of information reaching Africa about China-Africa cooperation being targ...It is very easy for an African living in Africa to be misled into believing that the China-Africa friendship is superficial.In fact,with so much of information reaching Africa about China-Africa cooperation being targeted at undermining the friendly relations enjoyed by the two sides and the e!orts to build a China-Africa community with a shared future,this in a way is not surprising.展开更多
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas...This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.展开更多
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ...With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.展开更多
Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients ...Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.展开更多
At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,late...At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,latex agglutination test(LA),lateral flow assay(LFA)and Enzyme-linked Immunosorbent Assay,have certain limitations.Although these techniques do not often lead to false-positive results,once this result occurs in a particular group of patients(such as human immunodeficiency virus patients),it might lead to severe consequences.展开更多
Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to dete...Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.展开更多
Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working co...Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.展开更多
Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice f...Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.展开更多
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation...The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.展开更多
This year marks the fifth year for China and Serbia to jointly celebrate the Chinese New Year,and the celebration is to be extended to other cities apart from Belgrade,Serbia,which shows the sincere friendship between...This year marks the fifth year for China and Serbia to jointly celebrate the Chinese New Year,and the celebration is to be extended to other cities apart from Belgrade,Serbia,which shows the sincere friendship between the two peoples and the Serbian people's love for the Chinese people and Chinese culture.展开更多
As a recognized classic of American TV series,“Friends”tells the complex story of friendship,love between six distinctive American young people.Different family backgrounds and childhood experiences presented in TV ...As a recognized classic of American TV series,“Friends”tells the complex story of friendship,love between six distinctive American young people.Different family backgrounds and childhood experiences presented in TV dramas take account for their difference in traits.Through the theoretical concept of psychoanalytic literature,this article attempts to reveal how the specific influence and manifestation of the family situation and parental behavior have on the character and behavior of the protagonist,as well as to further analyze how the trauma suffered in childhood functions in adult behavior.As adults,their behavior and habits are still constrained and influenced by their childhood experiences.展开更多
Everyone needs friends.Different people have different ideas about making friends.Some like to make friends with those who are honest and easy to communicate with,some like those who study hard and love sports,and sti...Everyone needs friends.Different people have different ideas about making friends.Some like to make friends with those who are honest and easy to communicate with,some like those who study hard and love sports,and still others like those who are lively,outgoing and ready to help others.展开更多
This study explored the factors influencing cooperative innovation in environmentally friendly agricultural biotechnology in China.First,we constructed an evolutionary game model comprising the factors of net income o...This study explored the factors influencing cooperative innovation in environmentally friendly agricultural biotechnology in China.First,we constructed an evolutionary game model comprising the factors of net income of cooperative innovation,net income of independent innovation,market constraints,and government subsidies.Using MATLAB simulation,we assigned different values to the aforementioned variables to explore the evolutionary trend of innovators’willingness to cooperate.Results showed that when the values of net income of cooperative innovation,net income of independent innovation,market constraints,and government subsidies exceeded the threshold,innovators’willingness to cooperate was significantly enhanced.Furthermore,the proportion of innovators who cooperated with others gradually increased to 100%;otherwise,it gradually decreased to 0%.Comparing the simulation curve with the real evolution curve of cooperative innovation in agricultural biotechnology in China,we found that the gradual decline in the willingness to cooperate could be due to insufficient subsidies for cooperative innovation,low income from cooperative innovation,weak profitability of innovators,and weak market constraints.展开更多
文摘Dear Dale,I'm glad to hear from you.You asked me something about how to make friends.In my opinion,you can make friends in the following principles.First of all,you must be friendly to others if you want to make friends with them.Everyone can be in trouble,so at any time,you should be friendly to others.In this way,you will have a lot of friends.
文摘With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.
基金This work was supported by the Natural Science Foundation of Heilongjiang Province(LH2022F049).
文摘Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.
文摘FROM May 5 to 10,Chinese President Xi Jinping paid state visits to France,Serbia,and Hungary.Being his first European trip in about five years,it consolidated China’s relationships with the three countries and Europe as a whole.The four states looked back on the history of their friendships,signed multiple cooperation agreements,and reached a consensus on promoting stable and sound development of China-Europe relations.Great Minds Think Alike Upon his arrival in Paris on May 5,President Xi Jinping received a warm welcome in Chinese from Gabriel Attal,France’s youngest ever modern prime minister.
文摘Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in low prevalence settings, where HIV rates are <0.1% of the population, false positive results are more likely. This results in apprehension in the dialysis unit as breaches in infectious disease protocols could be presumed. This is illustrated in the case report below. Case Summary: A 62-year-old male Saudi end-stage kidney disease patient secondary to DM nephropathy began dialysis a year before presentation in a hemodialysis center in Saudi Arabia. Routine screening tests done at the start of dialysis revealed negative Hepatitis C, HIV 1 and 2 screening but a positive Hepatitis B surface antigen screen. The patient went for holiday dialysis at another facility and had a routine fourth-generation HIV test done which was positive. A confirmatory HIV PCR test was negative. Conclusion: This case highlights the need for caution in interpreting highly sensitive and specific HIV screening tests in a low-prevalence setting. Routine screening beyond the national recommendation may not be necessary in low-prevalence areas.
文摘Hello,I am Allen,a primary school student from No.2 Experimental Primary School in Doumen District,Zhuhai,Guangdong Province.I am an active and outgoing person who loves making friends.Allow me to introduce you to my five good friends:Nick,Jack,Alex,Tina,and Lily.
文摘It is very easy for an African living in Africa to be misled into believing that the China-Africa friendship is superficial.In fact,with so much of information reaching Africa about China-Africa cooperation being targeted at undermining the friendly relations enjoyed by the two sides and the e!orts to build a China-Africa community with a shared future,this in a way is not surprising.
基金supported by the National Natural Science Foundation of China(61925303,62173034,62088101,U20B2073,62173002)the National Key Research and Development Program of China(2021YFB1714800)Beijing Natural Science Foundation(4222045)。
文摘This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.
基金This work was supported in part by the National Natural Science Foundation of China(62206109)the Fundamental Research Funds for the Central Universities(21620346)。
文摘With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.
文摘Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.
基金Supported by the Key Discipline of Jiaxing Respiratory Medicine Construction Project,No.2019-zc-04.
文摘At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,latex agglutination test(LA),lateral flow assay(LFA)and Enzyme-linked Immunosorbent Assay,have certain limitations.Although these techniques do not often lead to false-positive results,once this result occurs in a particular group of patients(such as human immunodeficiency virus patients),it might lead to severe consequences.
基金Supported by the Science and Technology Precision Poverty Alleviation Project of Planting Industry(ZY18C08)Special Project to Guide the Development of Central and Local Science and Technology。
文摘Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.
基金supported financially by the Ministerio de Ciencia e Innovación(Spain)and the European Regional Development Fund under the Research Grant WindSound Project(Ref.:PID2021-125278OB-I00).
文摘Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.
基金funded by the Education Department of Zhejiang Province Foundation of China(Grant No.Y202249221)。
文摘Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.
基金This research was supported by the Universiti Sains Malaysia(USM)and the ministry of Higher Education Malaysia through Fundamental Research GrantScheme(FRGS-Grant No:FRGS/1/2020/TK0/USM/02/1).
文摘The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
文摘This year marks the fifth year for China and Serbia to jointly celebrate the Chinese New Year,and the celebration is to be extended to other cities apart from Belgrade,Serbia,which shows the sincere friendship between the two peoples and the Serbian people's love for the Chinese people and Chinese culture.
文摘As a recognized classic of American TV series,“Friends”tells the complex story of friendship,love between six distinctive American young people.Different family backgrounds and childhood experiences presented in TV dramas take account for their difference in traits.Through the theoretical concept of psychoanalytic literature,this article attempts to reveal how the specific influence and manifestation of the family situation and parental behavior have on the character and behavior of the protagonist,as well as to further analyze how the trauma suffered in childhood functions in adult behavior.As adults,their behavior and habits are still constrained and influenced by their childhood experiences.
文摘Everyone needs friends.Different people have different ideas about making friends.Some like to make friends with those who are honest and easy to communicate with,some like those who study hard and love sports,and still others like those who are lively,outgoing and ready to help others.
基金funded by National Social Science Fund the Evolution of Japan’s Food Security Policy and Its Enlightenment to China[Grant No.22CSS016].
文摘This study explored the factors influencing cooperative innovation in environmentally friendly agricultural biotechnology in China.First,we constructed an evolutionary game model comprising the factors of net income of cooperative innovation,net income of independent innovation,market constraints,and government subsidies.Using MATLAB simulation,we assigned different values to the aforementioned variables to explore the evolutionary trend of innovators’willingness to cooperate.Results showed that when the values of net income of cooperative innovation,net income of independent innovation,market constraints,and government subsidies exceeded the threshold,innovators’willingness to cooperate was significantly enhanced.Furthermore,the proportion of innovators who cooperated with others gradually increased to 100%;otherwise,it gradually decreased to 0%.Comparing the simulation curve with the real evolution curve of cooperative innovation in agricultural biotechnology in China,we found that the gradual decline in the willingness to cooperate could be due to insufficient subsidies for cooperative innovation,low income from cooperative innovation,weak profitability of innovators,and weak market constraints.