The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilizatio...The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilization of carbon nutrients and enzyme regulation in the presence of complex nutritionalconditions. Although significant progress has been made in understanding carbon catabolite repression infungi such as Aspergillus nidulans and Magnaporthe oryzae, its role in U. virens remains unclear. Toaddress this knowledge gap, we identified UvCreA, a pivotal component of carbon catabolite repression,in U. virens. Our investigation revealed that UvCreA localized to the nucleus. Deletion of UvCreA resultedin decreased growth and pathogenicity in U. virens. Through RNA-seq analysis, it was found that theknockout of UvCreA led to the up-regulation of 514 genes and down-regulation of 640 genes. Moreover,UvCreA was found to be involved in the transcriptional regulation of pathogenic genes and genesassociated with carbon metabolism in U. virens. In summary, our findings indicated that UvCreA isimportant in fungal development, virulence, and the utilization of carbon sources through transcriptionalregulation, thus making it a critical element of carbon catabolite repression.展开更多
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnos...The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes.展开更多
With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to mult...With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.展开更多
In contrast to the solutions of applied mathematics to Zeno’s paradoxes, I focus on the concept of motion and show that, by distinguishing two different forms of motion, Zeno’s apparent paradoxes are not paradoxical...In contrast to the solutions of applied mathematics to Zeno’s paradoxes, I focus on the concept of motion and show that, by distinguishing two different forms of motion, Zeno’s apparent paradoxes are not paradoxical at all. Zeno’s paradoxes indirectly prove that distances are not composed of extensionless points and, in general, that a higher dimension cannot be completely composed of lower ones. Conversely, lower dimensions can be understood as special cases of higher dimensions. To illustrate this approach, I consider Cantor’s only apparent proof that the real numbers are uncountable. However, his widely accepted indirect proof has the disadvantage that it depends on whether there is another way to make the real numbers countable. Cantor rightly assumes that there can be no smallest number between 0 and 1, and therefore no beginning of counting. For this reason he arbitrarily lists the real numbers in order to show with his diagonal method that this list can never be complete. The situation is different if we start with the largest number between 0 and 1 (0.999…) and use the method of an inverted triangle, which can be understood as a special fractal form. Here we can construct a vertical and a horizontal stratification with which it is actually possible to construct all real numbers between 0 and 1 without exception. Each column is infinite, and each number in that column is the starting point of a new triangle, while each row is finite. Even in a simple sine curve, we experience finiteness with respect to the y-axis and infinity with respect to the x-axis. The first parts of this article show that Zeno’s assumptions contradict the concept of motion as such, so it is not surprising that this misconstruction leads to contradictions. In the last part, I discuss Cantor’s diagonal method and explain the method of an inverted triangle that is internally structured like a fractal by repeating this inverted triangle at each column. The consequence is that we encounter two very different methods of counting. Vertically it is continuous, horizontally it is discrete. While Frege, Tarski, Cantor, Gödel and the Vienna Circle tried to derive the higher dimension from the lower, a procedure that always leads to new contradictions and antinomies (Tarski, Russell), I take the opposite approach here, in which I derive the lower dimension from the higher. This perspective seems to fail because Tarski, Russell, Wittgenstein, and especially the Vienna Circle have shown that the completeness of the absolute itself is logically contradictory. For this reason, we agree with Hegel in assuming that we can never fully comprehend the Absolute, but only its particular manifestations—otherwise we would be putting ourselves in the place of the Absolute, or even God. Nevertheless, we can understand the Absolute in its particular expressions, as I will show with the modest example of the triangle proof of the combined horizontal and vertical countability of the real numbers, which I developed in rejection of Cantor’s diagonal proof. .展开更多
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas...This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.展开更多
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ...With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.展开更多
The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand ...The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand networks connected in the IoT environment. In recent years, False DataInjection Attacks (FDIAs) have gained considerable interest in the IoT environment.Cybercriminals compromise the devices connected to the networkand inject the data. Such attacks on the IoT environment can result in a considerableloss and interrupt normal activities among the IoT network devices.The FDI attacks have been effectively overcome so far by conventional threatdetection techniques. The current research article develops a Hybrid DeepLearning to Combat Sophisticated False Data Injection Attacks detection(HDL-FDIAD) for the IoT environment. The presented HDL-FDIAD modelmajorly recognizes the presence of FDI attacks in the IoT environment.The HDL-FDIAD model exploits the Equilibrium Optimizer-based FeatureSelection (EO-FS) technique to select the optimal subset of the features.Moreover, the Long Short Term Memory with Recurrent Neural Network(LSTM-RNN) model is also utilized for the purpose of classification. At last,the Bayesian Optimization (BO) algorithm is employed as a hyperparameteroptimizer in this study. To validate the enhanced performance of the HDLFDIADmodel, a wide range of simulations was conducted, and the resultswere investigated in detail. A comparative study was conducted between theproposed model and the existing models. The outcomes revealed that theproposed HDL-FDIAD model is superior to other models.展开更多
Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice f...Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.展开更多
Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,f...Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset.展开更多
In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of da...In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of data informa-tion resources.Intrusion identification system can easily detect the false positive alerts.If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks.Many research works have been done.The issues in the existing algo-rithms are more memory space and need more time to execute the transactions of records.This paper proposes a novel framework of network security Intrusion Detection System(IDS)using Modified Frequent Pattern(MFP-Tree)via K-means algorithm.The accuracy rate of Modified Frequent Pattern Tree(MFPT)-K means method infinding the various attacks are Normal 94.89%,for DoS based attack 98.34%,for User to Root(U2R)attacks got 96.73%,Remote to Local(R2L)got 95.89%and Probe attack got 92.67%and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.展开更多
Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working co...Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.展开更多
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation...The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.展开更多
Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to dete...Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.展开更多
The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle computing.This novel technique has the aptitude to tackle high performance computation systems a...The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle computing.This novel technique has the aptitude to tackle high performance computation systems and it manages the usage of all computing platforms at a time.Federated learning is a collaborative machine learning approach without centralized training data.The proposed system effectively detects the intrusion attack without human intervention and subsequently detects anomalous deviations in device communication behavior,potentially caused by malicious adversaries and it can emerge with new and unknown attacks.The main objective is to learn overall behavior of an intruder while performing attacks to the assumed target service.Moreover,the updated system model is send to the centralized server in jungle computing,to detect their pattern.Federated learning greatly helps the machine to study the type of attack from each device and this technique paves a way to complete dominion over all malicious behaviors.In our proposed work,we have implemented an intrusion detection system that has high accuracy,low False Positive Rate(FPR)scalable,and versatile for the jungle computing environment.The execution time taken to complete a round is less than two seconds,with an accuracy rate of 96%.展开更多
BACKGROUND In this article,we present a case of iatrogenic bladder neck rupture due to catheter insertion in a 94-year-old comorbid male patient.CASE SUMMARY The patient,who had a urethral catheter inserted in the pal...BACKGROUND In this article,we present a case of iatrogenic bladder neck rupture due to catheter insertion in a 94-year-old comorbid male patient.CASE SUMMARY The patient,who had a urethral catheter inserted in the palliative service 3 d ago,was consulted because the catheter did not work.Because the fluid given to the bladder could not be recovered,computed tomography was performed,which revealed that the catheter had passed the bladder neck first into the retrovesical area then into the intraabdominal area.The appearance of the anterior urethra and verumontanum was normal at cystoscopy.However,extremely severe stenosis of the bladder neck,and perforated posterior wall of the urethral segment between the prostatic urethra and the bladder neck were observed.Internal urethrotomy was applied to the bladder neck with a urethrotome.An urethral catheter was sent over the guide wire into the bladder.The patient was followed in the palliative care service and the catheter was removed 7 d later.No extravasation was observed in the control urethrography.CONCLUSION Although catheter insertion is a simple and frequently performed procedure in hospitalized patients,it is necessary to avoid unnecessary extra-indication catheter insertion.展开更多
Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients ...Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.展开更多
Machine learning algorithms (MLs) can potentially improve disease diagnostics, leading to early detection and treatment of these diseases. As a malignant tumor whose primary focus is located in the bronchial mucosal e...Machine learning algorithms (MLs) can potentially improve disease diagnostics, leading to early detection and treatment of these diseases. As a malignant tumor whose primary focus is located in the bronchial mucosal epithelium, lung cancer has the highest mortality and morbidity among cancer types, threatening health and life of patients suffering from the disease. Machine learning algorithms such as Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Naïve Bayes (NB) have been used for lung cancer prediction. However they still face challenges such as high dimensionality of the feature space, over-fitting, high computational complexity, noise and missing data, low accuracies, low precision and high error rates. Ensemble learning, which combines classifiers, may be helpful to boost prediction on new data. However, current ensemble ML techniques rarely consider comprehensive evaluation metrics to evaluate the performance of individual classifiers. The main purpose of this study was to develop an ensemble classifier that improves lung cancer prediction. An ensemble machine learning algorithm is developed based on RF, SVM, NB, and KNN. Feature selection is done based on Principal Component Analysis (PCA) and Analysis of Variance (ANOVA). This algorithm is then executed on lung cancer data and evaluated using execution time, true positives (TP), true negatives (TN), false positives (FP), false negatives (FN), false positive rate (FPR), recall (R), precision (P) and F-measure (FM). Experimental results show that the proposed ensemble classifier has the best classification of 0.9825% with the lowest error rate of 0.0193. This is followed by SVM in which the probability of having the best classification is 0.9652% at an error rate of 0.0206. On the other hand, NB had the worst performance of 0.8475% classification at 0.0738 error rate.展开更多
Indentations onto crystalline silicon and copper with various indenter geometries, loading forces at room temperature belong to the widest interests in the field, because of the physical detection of structural phase ...Indentations onto crystalline silicon and copper with various indenter geometries, loading forces at room temperature belong to the widest interests in the field, because of the physical detection of structural phase transitions. By using the mathematically deduced F<sub>N</sub>h<sup>3/2 </sup>relation for conical and pyramidal indentations we have a toolbox for deciding between faked and experimental loading curves. Four printed silicon indentation loading curves (labelled with 292 K, 260 K, 240 K and 210 K) proved to be faked and not experimental. This is problematic for the AI (artificial intelligence) that will probably not be able to sort faked data out by itself but must be told to do so. High risks arise, when published faked indentation reports remain unidentified and unreported for the mechanics engineers by reading, or via AI. For example, when AI recommends a faked quality such as “no phase changes” of a technical material that is therefore used, it might break down due to an actually present low force, low transition energy phase-change. This paper thus installed a tool box for the distinction of experimental and faked loading curves of indentations. We found experimental and faked loading curves of the same research group with overall 14 authoring co-workers in three publications where valid and faked ones were next to each other and I can thus only report on the experimental ones. The comparison of Si and Cu with W at 20-fold higher physical hardness shows its enormous influence to the energies of phase transition and of their transition energies. Thus, the commonly preferred ISO14577-ASTM hardness values HISO (these violate the energy law and are simulated!) leads to almost blind characterization and use of mechanically stressed technical materials (e.g. airplanes, windmills, bridges, etc). The reasons are carefully detected and reported to disprove that the coincidence or very close coincidence of all of the published loading curves from 150 K to 298 K are constructed but not experimental. A tool-box for distinction of experimental from faked indentation loading curves (simulations must be indicated) is established in view of protecting the AI from faked data, which it might not be able by itself to sort them out, so that technical materials with wrongly attributed mechanical properties might lead to catastrophic accidents such as all of us know of. There is also the risk that false theories might lead to discourage the design of important research projects or for not getting them granted. This might for example hamper or ill-fame new low temperature indentation projects. The various hints for identifying faked claims are thus presented in great detail. The low-temperature instrumental indentations onto silicon have been faked in two consecutive publications and their reporting in the third one, so that these are not available for the calculation of activation energies. Conversely, the same research group published an indentation loading curve of copper as taken at 150 K that could be tested for its validity with the therefore created tools of validity tests. The physical algebraic calculations provided the epochal detection of two highly exothermic phase transitions of copper that created two polymorphs with negative standard energy content. This is world-wide the second case and the first one far above the 77 K of liquid nitrogen. Its existence poses completely new thoughts for physics chemistry and perhaps techniques but all of them are open and unprepared for our comprehension. The first chemical reactions might be in-situ photolysis and the phase transitions can be calculated from experimental curves. But several further reported low temperature indentation loading curves of silicon were tested for their experimental reality. And the results are compared to new analyses with genuine room temperature results. A lot is to be learned from the differences at room and low temperature.展开更多
Dear Editor,This letter is concerned with the secure tracking control problem in the unmanned aerial vehicle(UAV) system by fixed-time convergent reinforcement learning(RL). By virtue of the zero-sum game,the false da...Dear Editor,This letter is concerned with the secure tracking control problem in the unmanned aerial vehicle(UAV) system by fixed-time convergent reinforcement learning(RL). By virtue of the zero-sum game,the false data injection(FDI) attacker and secure controller are viewed as game players.展开更多
Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature ...Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature review of research since the discovery of rice false smut.We provide a comprehensive and,at times,critical overview of the main results and findings from related research,and propose future research directions.Firstly,we delve into the interaction between U.virens and rice,including the regulation of transcription factors,the process of U.virens infecting rice panicles,and the plant immune response caused by rice infection.Following that,we discuss the identification and characterization of mycotoxins produced by the pathogenic fungus,as well as strategies for disease management.We emphasize the importance of comprehensive agricultural prevention and control methods for the sustainable management of U.virens.This knowledge will update our understanding of the interaction between U.virens and rice plants,offering a valuable perspective for those interested in U.virens.展开更多
基金the Key Projects of Zhejiang Provincial Natural Science Foundation,China(Grant No.LZ23C130002)the National Natural Science Foundation of China(Grant No.32100161)+3 种基金the Zhejiang Science and Technology Major Program on Rice New Variety Breeding,China(Grant No.2021C02063)the Key R&D Project of China National Rice Research Institute(Grant No.CNRRI-2020-04)the Chinese Academy of Agricultural Sciences under the Agricultural Sciences and Technologies Innovation Program,the Youth innovation Program of Chinese Academy of Agricultural Sciences(Grant No.Y2023QC22)the Joint Open Competitive Project of the Yazhou Bay Seed Laboratory and China National Seed Company Limited(Grant Nos.B23YQ1514 and B23CQ15EP).
文摘The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilization of carbon nutrients and enzyme regulation in the presence of complex nutritionalconditions. Although significant progress has been made in understanding carbon catabolite repression infungi such as Aspergillus nidulans and Magnaporthe oryzae, its role in U. virens remains unclear. Toaddress this knowledge gap, we identified UvCreA, a pivotal component of carbon catabolite repression,in U. virens. Our investigation revealed that UvCreA localized to the nucleus. Deletion of UvCreA resultedin decreased growth and pathogenicity in U. virens. Through RNA-seq analysis, it was found that theknockout of UvCreA led to the up-regulation of 514 genes and down-regulation of 640 genes. Moreover,UvCreA was found to be involved in the transcriptional regulation of pathogenic genes and genesassociated with carbon metabolism in U. virens. In summary, our findings indicated that UvCreA isimportant in fungal development, virulence, and the utilization of carbon sources through transcriptionalregulation, thus making it a critical element of carbon catabolite repression.
文摘The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes.
文摘With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.
文摘In contrast to the solutions of applied mathematics to Zeno’s paradoxes, I focus on the concept of motion and show that, by distinguishing two different forms of motion, Zeno’s apparent paradoxes are not paradoxical at all. Zeno’s paradoxes indirectly prove that distances are not composed of extensionless points and, in general, that a higher dimension cannot be completely composed of lower ones. Conversely, lower dimensions can be understood as special cases of higher dimensions. To illustrate this approach, I consider Cantor’s only apparent proof that the real numbers are uncountable. However, his widely accepted indirect proof has the disadvantage that it depends on whether there is another way to make the real numbers countable. Cantor rightly assumes that there can be no smallest number between 0 and 1, and therefore no beginning of counting. For this reason he arbitrarily lists the real numbers in order to show with his diagonal method that this list can never be complete. The situation is different if we start with the largest number between 0 and 1 (0.999…) and use the method of an inverted triangle, which can be understood as a special fractal form. Here we can construct a vertical and a horizontal stratification with which it is actually possible to construct all real numbers between 0 and 1 without exception. Each column is infinite, and each number in that column is the starting point of a new triangle, while each row is finite. Even in a simple sine curve, we experience finiteness with respect to the y-axis and infinity with respect to the x-axis. The first parts of this article show that Zeno’s assumptions contradict the concept of motion as such, so it is not surprising that this misconstruction leads to contradictions. In the last part, I discuss Cantor’s diagonal method and explain the method of an inverted triangle that is internally structured like a fractal by repeating this inverted triangle at each column. The consequence is that we encounter two very different methods of counting. Vertically it is continuous, horizontally it is discrete. While Frege, Tarski, Cantor, Gödel and the Vienna Circle tried to derive the higher dimension from the lower, a procedure that always leads to new contradictions and antinomies (Tarski, Russell), I take the opposite approach here, in which I derive the lower dimension from the higher. This perspective seems to fail because Tarski, Russell, Wittgenstein, and especially the Vienna Circle have shown that the completeness of the absolute itself is logically contradictory. For this reason, we agree with Hegel in assuming that we can never fully comprehend the Absolute, but only its particular manifestations—otherwise we would be putting ourselves in the place of the Absolute, or even God. Nevertheless, we can understand the Absolute in its particular expressions, as I will show with the modest example of the triangle proof of the combined horizontal and vertical countability of the real numbers, which I developed in rejection of Cantor’s diagonal proof. .
基金supported by the National Natural Science Foundation of China(61925303,62173034,62088101,U20B2073,62173002)the National Key Research and Development Program of China(2021YFB1714800)Beijing Natural Science Foundation(4222045)。
文摘This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.
基金This work was supported in part by the National Natural Science Foundation of China(62206109)the Fundamental Research Funds for the Central Universities(21620346)。
文摘With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.
文摘The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand networks connected in the IoT environment. In recent years, False DataInjection Attacks (FDIAs) have gained considerable interest in the IoT environment.Cybercriminals compromise the devices connected to the networkand inject the data. Such attacks on the IoT environment can result in a considerableloss and interrupt normal activities among the IoT network devices.The FDI attacks have been effectively overcome so far by conventional threatdetection techniques. The current research article develops a Hybrid DeepLearning to Combat Sophisticated False Data Injection Attacks detection(HDL-FDIAD) for the IoT environment. The presented HDL-FDIAD modelmajorly recognizes the presence of FDI attacks in the IoT environment.The HDL-FDIAD model exploits the Equilibrium Optimizer-based FeatureSelection (EO-FS) technique to select the optimal subset of the features.Moreover, the Long Short Term Memory with Recurrent Neural Network(LSTM-RNN) model is also utilized for the purpose of classification. At last,the Bayesian Optimization (BO) algorithm is employed as a hyperparameteroptimizer in this study. To validate the enhanced performance of the HDLFDIADmodel, a wide range of simulations was conducted, and the resultswere investigated in detail. A comparative study was conducted between theproposed model and the existing models. The outcomes revealed that theproposed HDL-FDIAD model is superior to other models.
基金funded by the Education Department of Zhejiang Province Foundation of China(Grant No.Y202249221)。
文摘Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.
文摘Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset.
文摘In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of data informa-tion resources.Intrusion identification system can easily detect the false positive alerts.If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks.Many research works have been done.The issues in the existing algo-rithms are more memory space and need more time to execute the transactions of records.This paper proposes a novel framework of network security Intrusion Detection System(IDS)using Modified Frequent Pattern(MFP-Tree)via K-means algorithm.The accuracy rate of Modified Frequent Pattern Tree(MFPT)-K means method infinding the various attacks are Normal 94.89%,for DoS based attack 98.34%,for User to Root(U2R)attacks got 96.73%,Remote to Local(R2L)got 95.89%and Probe attack got 92.67%and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.
基金supported financially by the Ministerio de Ciencia e Innovación(Spain)and the European Regional Development Fund under the Research Grant WindSound Project(Ref.:PID2021-125278OB-I00).
文摘Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.
基金This research was supported by the Universiti Sains Malaysia(USM)and the ministry of Higher Education Malaysia through Fundamental Research GrantScheme(FRGS-Grant No:FRGS/1/2020/TK0/USM/02/1).
文摘The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
基金Supported by the Science and Technology Precision Poverty Alleviation Project of Planting Industry(ZY18C08)Special Project to Guide the Development of Central and Local Science and Technology。
文摘Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.
文摘The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle computing.This novel technique has the aptitude to tackle high performance computation systems and it manages the usage of all computing platforms at a time.Federated learning is a collaborative machine learning approach without centralized training data.The proposed system effectively detects the intrusion attack without human intervention and subsequently detects anomalous deviations in device communication behavior,potentially caused by malicious adversaries and it can emerge with new and unknown attacks.The main objective is to learn overall behavior of an intruder while performing attacks to the assumed target service.Moreover,the updated system model is send to the centralized server in jungle computing,to detect their pattern.Federated learning greatly helps the machine to study the type of attack from each device and this technique paves a way to complete dominion over all malicious behaviors.In our proposed work,we have implemented an intrusion detection system that has high accuracy,low False Positive Rate(FPR)scalable,and versatile for the jungle computing environment.The execution time taken to complete a round is less than two seconds,with an accuracy rate of 96%.
文摘BACKGROUND In this article,we present a case of iatrogenic bladder neck rupture due to catheter insertion in a 94-year-old comorbid male patient.CASE SUMMARY The patient,who had a urethral catheter inserted in the palliative service 3 d ago,was consulted because the catheter did not work.Because the fluid given to the bladder could not be recovered,computed tomography was performed,which revealed that the catheter had passed the bladder neck first into the retrovesical area then into the intraabdominal area.The appearance of the anterior urethra and verumontanum was normal at cystoscopy.However,extremely severe stenosis of the bladder neck,and perforated posterior wall of the urethral segment between the prostatic urethra and the bladder neck were observed.Internal urethrotomy was applied to the bladder neck with a urethrotome.An urethral catheter was sent over the guide wire into the bladder.The patient was followed in the palliative care service and the catheter was removed 7 d later.No extravasation was observed in the control urethrography.CONCLUSION Although catheter insertion is a simple and frequently performed procedure in hospitalized patients,it is necessary to avoid unnecessary extra-indication catheter insertion.
文摘Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.
文摘Machine learning algorithms (MLs) can potentially improve disease diagnostics, leading to early detection and treatment of these diseases. As a malignant tumor whose primary focus is located in the bronchial mucosal epithelium, lung cancer has the highest mortality and morbidity among cancer types, threatening health and life of patients suffering from the disease. Machine learning algorithms such as Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Naïve Bayes (NB) have been used for lung cancer prediction. However they still face challenges such as high dimensionality of the feature space, over-fitting, high computational complexity, noise and missing data, low accuracies, low precision and high error rates. Ensemble learning, which combines classifiers, may be helpful to boost prediction on new data. However, current ensemble ML techniques rarely consider comprehensive evaluation metrics to evaluate the performance of individual classifiers. The main purpose of this study was to develop an ensemble classifier that improves lung cancer prediction. An ensemble machine learning algorithm is developed based on RF, SVM, NB, and KNN. Feature selection is done based on Principal Component Analysis (PCA) and Analysis of Variance (ANOVA). This algorithm is then executed on lung cancer data and evaluated using execution time, true positives (TP), true negatives (TN), false positives (FP), false negatives (FN), false positive rate (FPR), recall (R), precision (P) and F-measure (FM). Experimental results show that the proposed ensemble classifier has the best classification of 0.9825% with the lowest error rate of 0.0193. This is followed by SVM in which the probability of having the best classification is 0.9652% at an error rate of 0.0206. On the other hand, NB had the worst performance of 0.8475% classification at 0.0738 error rate.
文摘Indentations onto crystalline silicon and copper with various indenter geometries, loading forces at room temperature belong to the widest interests in the field, because of the physical detection of structural phase transitions. By using the mathematically deduced F<sub>N</sub>h<sup>3/2 </sup>relation for conical and pyramidal indentations we have a toolbox for deciding between faked and experimental loading curves. Four printed silicon indentation loading curves (labelled with 292 K, 260 K, 240 K and 210 K) proved to be faked and not experimental. This is problematic for the AI (artificial intelligence) that will probably not be able to sort faked data out by itself but must be told to do so. High risks arise, when published faked indentation reports remain unidentified and unreported for the mechanics engineers by reading, or via AI. For example, when AI recommends a faked quality such as “no phase changes” of a technical material that is therefore used, it might break down due to an actually present low force, low transition energy phase-change. This paper thus installed a tool box for the distinction of experimental and faked loading curves of indentations. We found experimental and faked loading curves of the same research group with overall 14 authoring co-workers in three publications where valid and faked ones were next to each other and I can thus only report on the experimental ones. The comparison of Si and Cu with W at 20-fold higher physical hardness shows its enormous influence to the energies of phase transition and of their transition energies. Thus, the commonly preferred ISO14577-ASTM hardness values HISO (these violate the energy law and are simulated!) leads to almost blind characterization and use of mechanically stressed technical materials (e.g. airplanes, windmills, bridges, etc). The reasons are carefully detected and reported to disprove that the coincidence or very close coincidence of all of the published loading curves from 150 K to 298 K are constructed but not experimental. A tool-box for distinction of experimental from faked indentation loading curves (simulations must be indicated) is established in view of protecting the AI from faked data, which it might not be able by itself to sort them out, so that technical materials with wrongly attributed mechanical properties might lead to catastrophic accidents such as all of us know of. There is also the risk that false theories might lead to discourage the design of important research projects or for not getting them granted. This might for example hamper or ill-fame new low temperature indentation projects. The various hints for identifying faked claims are thus presented in great detail. The low-temperature instrumental indentations onto silicon have been faked in two consecutive publications and their reporting in the third one, so that these are not available for the calculation of activation energies. Conversely, the same research group published an indentation loading curve of copper as taken at 150 K that could be tested for its validity with the therefore created tools of validity tests. The physical algebraic calculations provided the epochal detection of two highly exothermic phase transitions of copper that created two polymorphs with negative standard energy content. This is world-wide the second case and the first one far above the 77 K of liquid nitrogen. Its existence poses completely new thoughts for physics chemistry and perhaps techniques but all of them are open and unprepared for our comprehension. The first chemical reactions might be in-situ photolysis and the phase transitions can be calculated from experimental curves. But several further reported low temperature indentation loading curves of silicon were tested for their experimental reality. And the results are compared to new analyses with genuine room temperature results. A lot is to be learned from the differences at room and low temperature.
基金supported partially by Guangdong Basic and Applied Basic Research Foundation (2023A1515 011220)National Natural Science Foundation of China (62073269)+2 种基金Key Research and Development Program of Shaanxi (2022GY-244)Aeronautical Science Foundation of China (2020Z034053002)Natural Science Foundation of Chongqing,China (CSTB2022NSCQMSX0963)。
文摘Dear Editor,This letter is concerned with the secure tracking control problem in the unmanned aerial vehicle(UAV) system by fixed-time convergent reinforcement learning(RL). By virtue of the zero-sum game,the false data injection(FDI) attacker and secure controller are viewed as game players.
基金supported by‘Pioneer’and‘Leading Goose’R&D Program of Zhejiang Province,China(Grant No.2023C02014)Zhejiang Provincial Natural Science Foundation of China(Grant No.LY24C030002)+2 种基金Central Public-Interest Scientific Institution Basal Research Fund for China National Rice Research Institute(Grant No.CPSIBRF-CNRRI-202303)the China Agriculture Research System(Grant No.CARS-01)the Agricultural Science and Technology Innovation Program,China(Grant No.ASTIP)。
文摘Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature review of research since the discovery of rice false smut.We provide a comprehensive and,at times,critical overview of the main results and findings from related research,and propose future research directions.Firstly,we delve into the interaction between U.virens and rice,including the regulation of transcription factors,the process of U.virens infecting rice panicles,and the plant immune response caused by rice infection.Following that,we discuss the identification and characterization of mycotoxins produced by the pathogenic fungus,as well as strategies for disease management.We emphasize the importance of comprehensive agricultural prevention and control methods for the sustainable management of U.virens.This knowledge will update our understanding of the interaction between U.virens and rice plants,offering a valuable perspective for those interested in U.virens.