Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful...Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful items.The fruit pulp,seeds,leaves,flowers.roots,and bark of baobab are edible and they have been studied by scientists for their useful properties.The fruit pulp have very high vitamin C.calcium,phosphorus,carbohydrates,fibers,potassium,proteins and lipids content,which can be used in seasoning as an appetizer and also make juices.Seeds contain appreciable quantities of phosphorus,magnesium,zinc,sodium,iron,manganese,whereas they have high levels of lysine,thiamine,calcium and iron.Baobab has numerous biological properties including antimicrobial,anti-malarial,diarrhoea,anaemia,asthma,antiviral,anti-oxidant and anti-inflammatory activities amongst others.Phytochemical investigation revealed the presence of flavonoids.phytosterols.amino acids,fatty acids,vitamins and minerals.The review summarizes the information on various aspects of traditional information,taxonomic description,medicinal properties and importantly nutritional value.展开更多
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by sem...To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by semantic annotation of the elements in a Web service description language(WSDL) document with concepts of geographic ontology, and then a common under-standing about service semantics between customers and providers of Web services is built. Based on the decomposition and formalization of customer requirements, the discovery, composition and execution of GI Web services are explained in detail, and then a chaining of GI Web services is built and used to achieve the customer's requirement. Finally, an example based on Web ontology language for service (OWL-S) is provided for testing the feasibility of this method.展开更多
Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in...Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors.This paper proposes a new end-to-end selfsupervised training deep learning network.The network uses a backbone feature encoder to extract multi-level feature maps,then performs joint image keypoint detection and description in a forward pass.On the one hand,in order to enhance the localization accuracy of keypoints and restore the local shape structure,the detector detects keypoints on feature maps of the same resolution as the original image.On the other hand,in order to enhance the ability to percept local shape details,the network utilizes multi-level features to generate robust feature descriptors with rich local shape information.A detailed comparison with traditional feature-based methods Scale Invariant Feature Transform(SIFT),Speeded Up Robust Features(SURF)and deep learning methods on HPatches proves the effectiveness and robustness of the method proposed in this paper.展开更多
From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 a...From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 annual report of A-share listed companies in Shanghai and Shenzhen Security Exchange,we found that Chinese enterprises' carbon disclosure scattered,industry structure quite different characteristics,quantity information and quality information asymmetry.展开更多
In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be comp...In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.展开更多
Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–Th...Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–The approach follows and extends the idea presented in Xu and Feng(2004),which applies DLs to classifying paths in an ER schema.To verify whether the information content of a data construct(e.g.a path)covers a semantic relation(which formulates a piece of information requirement),the principle of IBC under the source-bearer-receiver framework is presented.It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors(e.g.quantifiers).Findings–Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC.The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema.Originality/value–This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle.It is a new point of view for evaluation of data representation,which looks at the information borne by data but not data dependencies.展开更多
为快速生成准确描述图片内容的语句,提出语义分割和卷积神经网络(convolutional neural network,CNN)相结合的图像描述方法。将图像分类模型和语义分割模型结合为编码器,增强对图像语义信息的利用,采用CNN代替长短时记忆网络(long short...为快速生成准确描述图片内容的语句,提出语义分割和卷积神经网络(convolutional neural network,CNN)相结合的图像描述方法。将图像分类模型和语义分割模型结合为编码器,增强对图像语义信息的利用,采用CNN代替长短时记忆网络(long short term memory,LSTM)作为解码器生成完整描述性语句。通过在MSCOCO数据集上与5种主流算法的对比实验可知,以CNN作为解码器能够大幅提高解码速度,语义信息的增强能够有效提高实验精度,验证了该方法的有效性和可行性。展开更多
基金Supported by University Grant Commission,New Delhi,India[Grant No.F.14-2(SC)/2010(SA-Ⅲ)]
文摘Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful items.The fruit pulp,seeds,leaves,flowers.roots,and bark of baobab are edible and they have been studied by scientists for their useful properties.The fruit pulp have very high vitamin C.calcium,phosphorus,carbohydrates,fibers,potassium,proteins and lipids content,which can be used in seasoning as an appetizer and also make juices.Seeds contain appreciable quantities of phosphorus,magnesium,zinc,sodium,iron,manganese,whereas they have high levels of lysine,thiamine,calcium and iron.Baobab has numerous biological properties including antimicrobial,anti-malarial,diarrhoea,anaemia,asthma,antiviral,anti-oxidant and anti-inflammatory activities amongst others.Phytochemical investigation revealed the presence of flavonoids.phytosterols.amino acids,fatty acids,vitamins and minerals.The review summarizes the information on various aspects of traditional information,taxonomic description,medicinal properties and importantly nutritional value.
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
基金the National Natural Science Fundation ofChina (60774041)
文摘To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by semantic annotation of the elements in a Web service description language(WSDL) document with concepts of geographic ontology, and then a common under-standing about service semantics between customers and providers of Web services is built. Based on the decomposition and formalization of customer requirements, the discovery, composition and execution of GI Web services are explained in detail, and then a chaining of GI Web services is built and used to achieve the customer's requirement. Finally, an example based on Web ontology language for service (OWL-S) is provided for testing the feasibility of this method.
基金This work was supported by the National Natural Science Foundation of China(61871046,SM,http://www.nsfc.gov.cn/).
文摘Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors.This paper proposes a new end-to-end selfsupervised training deep learning network.The network uses a backbone feature encoder to extract multi-level feature maps,then performs joint image keypoint detection and description in a forward pass.On the one hand,in order to enhance the localization accuracy of keypoints and restore the local shape structure,the detector detects keypoints on feature maps of the same resolution as the original image.On the other hand,in order to enhance the ability to percept local shape details,the network utilizes multi-level features to generate robust feature descriptors with rich local shape information.A detailed comparison with traditional feature-based methods Scale Invariant Feature Transform(SIFT),Speeded Up Robust Features(SURF)and deep learning methods on HPatches proves the effectiveness and robustness of the method proposed in this paper.
文摘From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 annual report of A-share listed companies in Shanghai and Shenzhen Security Exchange,we found that Chinese enterprises' carbon disclosure scattered,industry structure quite different characteristics,quantity information and quality information asymmetry.
基金Project supported by the National Natural Science Foundation of China.
文摘In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.
基金This work has been funded by Scientific Research Common Program of Beijing Municipal Commission of Education(No.KM201311417011)the Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions(No.CIT&TCD201404089)Funding project of Beijing Philosophy and Social Science Research Program(No.11JGB039).
文摘Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–The approach follows and extends the idea presented in Xu and Feng(2004),which applies DLs to classifying paths in an ER schema.To verify whether the information content of a data construct(e.g.a path)covers a semantic relation(which formulates a piece of information requirement),the principle of IBC under the source-bearer-receiver framework is presented.It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors(e.g.quantifiers).Findings–Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC.The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema.Originality/value–This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle.It is a new point of view for evaluation of data representation,which looks at the information borne by data but not data dependencies.
文摘为快速生成准确描述图片内容的语句,提出语义分割和卷积神经网络(convolutional neural network,CNN)相结合的图像描述方法。将图像分类模型和语义分割模型结合为编码器,增强对图像语义信息的利用,采用CNN代替长短时记忆网络(long short term memory,LSTM)作为解码器生成完整描述性语句。通过在MSCOCO数据集上与5种主流算法的对比实验可知,以CNN作为解码器能够大幅提高解码速度,语义信息的增强能够有效提高实验精度,验证了该方法的有效性和可行性。