The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness...The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things.展开更多
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized...Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives.展开更多
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow...Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.展开更多
In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten hum...In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten human health reported by the World Health Organization,food allergy ranks fourth,and food allergy has become a global security problem.As of now,no definitive treatment for food allergies exists,making the avoidance of allergen-containing foods the most effective prevention method.Consequently,labeling foods with allergen information serves as a crucial warning for allergic populations.Moreover,to enhance comprehension of food allergies,this article provides a brief overview of their definition and sensitization mechanisms.The main focus lies in highlighting the structure of primary allergens found in eight commonly allergenic foods and the resulting clinical symptoms they cause.Additionally,a summary of commonly employed allergen detection techniques is presented,with an analysis of their principles,advantages,and limitations.Looking ahead,the integration of diverse technological approaches to establish an efficient,accurate,and affordable allergen detection method remains a significant trend.This article has certain reference value for understanding the direction of food allergies.展开更多
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr...Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset.展开更多
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second...This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.展开更多
Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal sea...Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal seams and in front of excavated roadways. Survey devices, working methods and techniques as well as data processing and interpretation are discussed systematically. In addition, the direction of mini-wireframe emission electromagnetic wave of the full space transient electromagnetism technique was verified by an underground borehole for water detection and drainage. The result indicates that this technique can detect both horizontal and vertical development rules of abnormal water bodies to a certain depth below the floor of coal seams and can also detect the abnormal, low resistance water bodies within a certain distance of roofs. Furthermore, it can detect such abnormal bodies in ahead of the excavated roadway front. Limited by the underground environment, the full space transient electromagnetism technique can detect to a depth of only 120 m or so.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
This research study predominantly emphases on spatiotemporal extensions of urban area of Peshawar;its adverse impacts and contributions to climate and environment during 1931 to 2011. To probe these interventions, met...This research study predominantly emphases on spatiotemporal extensions of urban area of Peshawar;its adverse impacts and contributions to climate and environment during 1931 to 2011. To probe these interventions, meteorological data, Satellite’s temporal imagery of Landsat ETM+ and TM, anthropogenic and demographic secondary data were congregated. In relation to map out land cover changes, maximum likelihood classification algorithm and followed by change detection techniques were applied to study area. The outcome of this process was further subjected through Geographic Information System (GIS) overlay analysis which suggested a clear straggle in urban area. Auxiliary data (Population growth rate, transportation, electricity connections, etc.) also support the fact of urban area extension. This study proposes that severs contributions of massive heat energy and CO<sub>2</sub> have been added to local climate and environment ensuing substantial increment in temperature drawn out from the trends. Consequently, Remote Sensing, GIS and allied data were found to be effective to gauge such variations. To eliminate anomalies in sprawl and environment, few suggestions and recommendation are made in latter part of this study.展开更多
Ⅰ The Indexes of Detecting Oil and Gas Resources The deeply buried reservoir which in a dynamic equilibrium state has a great pressure inside, and between it and earth surface there is a great difference of pressure....Ⅰ The Indexes of Detecting Oil and Gas Resources The deeply buried reservoir which in a dynamic equilibrium state has a great pressure inside, and between it and earth surface there is a great difference of pressure. Therefore the hydrocarbon must spread and move vertically to the surface along the pressure gradient orientation. Hydrocarbons in the reservoir along some small rifts, cracks, joints and cleavages penetrate the overlying strata and seepage onto the surface. Thus the hydrocarbons become unvisble oil and gas signs. This process is called the phenomena of hydrocarbon microseepage of reservoir. Hydrocarbons microseepage in the process展开更多
BACKGROUND: It is proved that the onset of Parkinson disease companies with neuronal apoptosis of dopamine in substantia nigra of midbrain. Previous researches on neuronal apoptosis of dopamine were analyzed on their...BACKGROUND: It is proved that the onset of Parkinson disease companies with neuronal apoptosis of dopamine in substantia nigra of midbrain. Previous researches on neuronal apoptosis of dopamine were analyzed on their consecutive tissue sections with immunohistochemical single-labeling method, immunofluorescence and electron microscope, and there are significant differences.OBJECTIVE : To observe the feasibility of neuronal apoptosis of dopamine with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique.DESIGN : Controlled study.SETTING: College of Pharmacology of Taishan Medical College; College of Management of Taishan Medical College. MATERIALS : Wistar rats with 2 weeks old and of clean grade were provided by the Animal Center of Taishan Medical College. In situ end labeling kit (terminal deoxynucleotidyl transferase, mixed reactive solution of nucleotide, transfusion-POD), monoclonal antibody of rat antibody against tyrosine hydroxylase (Boehriuser). METHODS: The experiment was completed at the Pharmacological Laboratory of Taishan Medical College from February to December 2005. Tissue from midbrain of rats was taken out to make paraffin sections to observe the neuronal apoptosis of dopamine under microscope with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique.MAIN OUTCOME MEASURES : Neuronal apoptosis of dopamine with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique. RESULTS: ① After double-labeling staining, two kinks of positive products were observed in neurons of dopamine which were suffered from apoptosis. One stained with tyrosine hydroxylase was hyacinthine, and the other stained with in situ end labeling was buffy. Cells of positive products stained with in situ end labeling shaped as strap and bend and was distributed in clustering. Cytoplasm was hyacinthine, staining was symmetrical, and cellular ecphyma was observed. Nucleus was stained vacantly which was coincidence with form of neurons of dopamine. ②Apoptosis showed strictly in cytoplasm and nucleus at the aspect of morphology. Cytoplasm stained with in situ end labeling was hardly to recognize because of the usage of double-labeling staining technique, but nucleus was still characterized by apoptosis. The behavior of positive products stained with in situ end labeling was described as following: nucleus was buffy; karyopycnosis was round and irregular; caryotin was integrated into clump which was distributed at the border of nucleus and shaped as demilune and anular; positive signals were limited in nucleus and coincidence with morphological changes of apoptosis. However, blue and positive products were observed in cytoplasm of neurons of dopamine which did not occur apoptosis, and the nucleus was not labeled. Therefore, processing apoptosis of neurons of dopamine could be recognized. CONCULSION: Double-labeling staining technique can be used to correctly reveal histological and morphological changes of neuronal apoptosis of dopamine during its onset and development.展开更多
Objective To develop an in situ PCR in combination with flow cytometry (ISPCR-FCM) for monitoring cholera toxin positive Vibrio cholerae. Methods In running this method, 4% paraformaldehyde was used to fix the Vibri...Objective To develop an in situ PCR in combination with flow cytometry (ISPCR-FCM) for monitoring cholera toxin positive Vibrio cholerae. Methods In running this method, 4% paraformaldehyde was used to fix the Vibrio cholerae cells and 1 mg/mL lysozyme for 20 min to permeabilize the cells. Before the PCR thermal cycling, 2.5% glycerol was added into the PCR reaction mixture in order to protect the integrality of the cells. Results A length of 1037bp DNA sequence was amplified, which is specific for the cholera toxin gene (ctxAB gene). Cells subjected to ISPCR showed the presences of ctxAB gene both in epifluorescence microscopy and in flow cytometric analysis. The specificity and sensitivity of the method were investigated. The sensitivity was relatively low (10^5 cells/mL), while the specificity was high. Conclusion We have successfully developed a new technique for detection of toxigenic Vibrio cholerae strains. Further study is needed to enhance its sensitivities. ISPCR-FCM shows a great promise in monitoring specific bacteria and their physiological states in environmental samples.展开更多
Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access...Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes.展开更多
Metastasis usually presents in the different courses of tumor diseases and associates with poor prognosis.Circulating tumor cells(CTC) are considered to be essential for conforming metastasis and can be detected in tu...Metastasis usually presents in the different courses of tumor diseases and associates with poor prognosis.Circulating tumor cells(CTC) are considered to be essential for conforming metastasis and can be detected in tumor patients' peripheral blood.CTC are not easily detected by conventional cytology methods because of their low frequency in peripheral blood.Our article reviews the recent research results on this subject,and also discusses the problems and prospects in this area.展开更多
A real-time pedestrian detection and tracking system using a single video camera was developed to monitor pedestrians. This system contained six modules: video flow capture, pre-processing, movement detection, shadow ...A real-time pedestrian detection and tracking system using a single video camera was developed to monitor pedestrians. This system contained six modules: video flow capture, pre-processing, movement detection, shadow removal, tracking, and object classification. The Gaussian mixture model was utilized to extract the moving object from an image sequence segmented by the mean-shift technique in the pre-processing module. Shadow removal was used to alleviate the negative impact of the shadow to the detected objects. A model-free method was adopted to identify pedestrians. The maximum and minimum integration methods were developed to integrate multiple cues into the mean-shift algorithm and the initial tracking iteration with the competent integrated probability distribution map for object tracking. A simple but effective algorithm was proposed to handle full occlusion cases. The system was tested using real traffic videos from different sites. The results of the test confirm that the system is reliable and has an overall accuracy of over 85%.展开更多
The concept of health monitoring is a key aspect of the field of medicine that has been practiced for a long time. A commonly used diagnostic and health monitoring practice is pulse diagnosis, which can be traced back...The concept of health monitoring is a key aspect of the field of medicine that has been practiced for a long time. A commonly used diagnostic and health monitoring practice is pulse diagnosis, which can be traced back approximately five thousand years in the recorded history of China. With advances in the development of modern technology, the concept of health monitoring of a variety of engineering structures in several applications has begun to attract widespread attention. Of particular interest in this study is the health monitoring of civil structures. It seem natural, and even beneficial, that these two health-monitoring methods, one as applies to the human body and the other to civil structures, should be analyzed and compared. In this paper, the basic concepts and theories of the two monitoring methods are first discussed. Similarities are then summarized and commented upon. It is hoped that this correlation analysis may help provide structural engineers with some insights into the intrinsic concept of using pulse diagnosis in human health monitoring, which may of be some benefit in the development of modern structural health monitoring methods.展开更多
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our...Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.展开更多
Biogenic amine is one of the main categories of hazardous compounds in meat and meat products,making its detection methods vital for the assurance of edible safety.In this sense,many biogenic amine detection technique...Biogenic amine is one of the main categories of hazardous compounds in meat and meat products,making its detection methods vital for the assurance of edible safety.In this sense,many biogenic amine detection techniques such as chromatographic,electrophoretic,and electrochemical methods have been developed,which play an irreplaceable role in ensuring the safety of meat and meat products.Due to the increasing demand for fast and on-site detection techniques,visual detection methods have been gradually developed compared with non-visual methods such as chromatography and electrophoresis.Herein,we comprehensively review the mechanism and the latest progress of these biogenic amine detection methods;besides,we put forward the prospects for the future development of biogenic amine detection techniques,with a view to providing support for the establishment of more accurate and efficient detection,prevention and control strategies of biogenic amines.展开更多
Among over 170 different types of chemical modifications on RNA nucleobases identified so far,RNA methylation is the major type of epitranscriptomic modifications existing on almost all types of RNAs,and has been demo...Among over 170 different types of chemical modifications on RNA nucleobases identified so far,RNA methylation is the major type of epitranscriptomic modifications existing on almost all types of RNAs,and has been demonstrated to participate in the entire process of RNA metabolism,including transcription,pre-mRNA alternative splicing and maturation,mRNA nucleus export,mRNA degradation and stabilization,mRNA translation.Attributing to the development of high-throughput detection technologies and the identification of both dynamic regulators and recognition proteins,mechanisms of RNA methylation modification in regulating the normal development of the organism as well as various disease occurrence and developmental abnormalities upon RNA methylation dysregulation have become increasingly clear.Here,we particularly focus on three types of RNA methylations:N^(6)-methylcytosine(m^(6)A),5-methylcytosine(m^(5)C),and N^(7)-methyladenosine(m^(7)G).We summarize the elements related to their dynamic installment and removal,specific binding proteins,and the development of high-throughput detection technologies.Then,for a comprehensive understanding of their biological significance,we also overview the latest knowledge on the underlying mechanisms and key roles of these three mRNA methylation modifications in gametogenesis,embryonic development,immune system development,as well as disease and tumor progression.展开更多
The ultrasonic testing for the defects of complete disbond in multi-layered structure with lower acoustic impedance beneath a high acoustic impedance overburden is one of the difficult problems in ultrasonic nondestru...The ultrasonic testing for the defects of complete disbond in multi-layered structure with lower acoustic impedance beneath a high acoustic impedance overburden is one of the difficult problems in ultrasonic nondestructive testing field. A model of a multi-layered steel-rubber composite plate is depicted. Because the acoustic impedance of the steel differs far from that of the couplant water and the rubber, the energy of the signal reflected from the debonded rubber layers is very weak. More over, the flaw echoes are masked by the strong echoes reverberated in the steel plate. It's nearly impossible to identify the debonding echoes directly. The subband adaptive filtering method is discussed in the paper, where the subband decomposition is performed by mutual wavelet packets decomposition on the criterion of maximizing the cross-correlation between the signals. The simulations on both synthetic and real signals are presented. The echoes from the delaminated flaw at the depth of 5 mm in the rubber from the calculated signal, and echoes from the flaw at the depth of 3 mm from the real signal are extracted successfully.展开更多
文摘The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things.
基金Supported by Special Project of the Central Government in Guidance of Local Science and Technology Development (Scientific and Technological Innovation Base Project) (226Z5504G)The Fourth Batch of High-end Talent Project in Hebei Province.
文摘Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives.
文摘Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.
文摘In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten human health reported by the World Health Organization,food allergy ranks fourth,and food allergy has become a global security problem.As of now,no definitive treatment for food allergies exists,making the avoidance of allergen-containing foods the most effective prevention method.Consequently,labeling foods with allergen information serves as a crucial warning for allergic populations.Moreover,to enhance comprehension of food allergies,this article provides a brief overview of their definition and sensitization mechanisms.The main focus lies in highlighting the structure of primary allergens found in eight commonly allergenic foods and the resulting clinical symptoms they cause.Additionally,a summary of commonly employed allergen detection techniques is presented,with an analysis of their principles,advantages,and limitations.Looking ahead,the integration of diverse technological approaches to establish an efficient,accurate,and affordable allergen detection method remains a significant trend.This article has certain reference value for understanding the direction of food allergies.
文摘Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset.
文摘This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.
文摘Based on the transmitting theory of "smoke ring effect", the transient electromagnetism technique was used in coal mines to detect abnormal areas of aquiferous structures in both roofs and floors of coal seams and in front of excavated roadways. Survey devices, working methods and techniques as well as data processing and interpretation are discussed systematically. In addition, the direction of mini-wireframe emission electromagnetic wave of the full space transient electromagnetism technique was verified by an underground borehole for water detection and drainage. The result indicates that this technique can detect both horizontal and vertical development rules of abnormal water bodies to a certain depth below the floor of coal seams and can also detect the abnormal, low resistance water bodies within a certain distance of roofs. Furthermore, it can detect such abnormal bodies in ahead of the excavated roadway front. Limited by the underground environment, the full space transient electromagnetism technique can detect to a depth of only 120 m or so.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.
文摘This research study predominantly emphases on spatiotemporal extensions of urban area of Peshawar;its adverse impacts and contributions to climate and environment during 1931 to 2011. To probe these interventions, meteorological data, Satellite’s temporal imagery of Landsat ETM+ and TM, anthropogenic and demographic secondary data were congregated. In relation to map out land cover changes, maximum likelihood classification algorithm and followed by change detection techniques were applied to study area. The outcome of this process was further subjected through Geographic Information System (GIS) overlay analysis which suggested a clear straggle in urban area. Auxiliary data (Population growth rate, transportation, electricity connections, etc.) also support the fact of urban area extension. This study proposes that severs contributions of massive heat energy and CO<sub>2</sub> have been added to local climate and environment ensuing substantial increment in temperature drawn out from the trends. Consequently, Remote Sensing, GIS and allied data were found to be effective to gauge such variations. To eliminate anomalies in sprawl and environment, few suggestions and recommendation are made in latter part of this study.
文摘Ⅰ The Indexes of Detecting Oil and Gas Resources The deeply buried reservoir which in a dynamic equilibrium state has a great pressure inside, and between it and earth surface there is a great difference of pressure. Therefore the hydrocarbon must spread and move vertically to the surface along the pressure gradient orientation. Hydrocarbons in the reservoir along some small rifts, cracks, joints and cleavages penetrate the overlying strata and seepage onto the surface. Thus the hydrocarbons become unvisble oil and gas signs. This process is called the phenomena of hydrocarbon microseepage of reservoir. Hydrocarbons microseepage in the process
文摘BACKGROUND: It is proved that the onset of Parkinson disease companies with neuronal apoptosis of dopamine in substantia nigra of midbrain. Previous researches on neuronal apoptosis of dopamine were analyzed on their consecutive tissue sections with immunohistochemical single-labeling method, immunofluorescence and electron microscope, and there are significant differences.OBJECTIVE : To observe the feasibility of neuronal apoptosis of dopamine with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique.DESIGN : Controlled study.SETTING: College of Pharmacology of Taishan Medical College; College of Management of Taishan Medical College. MATERIALS : Wistar rats with 2 weeks old and of clean grade were provided by the Animal Center of Taishan Medical College. In situ end labeling kit (terminal deoxynucleotidyl transferase, mixed reactive solution of nucleotide, transfusion-POD), monoclonal antibody of rat antibody against tyrosine hydroxylase (Boehriuser). METHODS: The experiment was completed at the Pharmacological Laboratory of Taishan Medical College from February to December 2005. Tissue from midbrain of rats was taken out to make paraffin sections to observe the neuronal apoptosis of dopamine under microscope with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique.MAIN OUTCOME MEASURES : Neuronal apoptosis of dopamine with in situ end labeling and tyrosine-hydroxylase antibody immunohistochemical double-labeling staining technique. RESULTS: ① After double-labeling staining, two kinks of positive products were observed in neurons of dopamine which were suffered from apoptosis. One stained with tyrosine hydroxylase was hyacinthine, and the other stained with in situ end labeling was buffy. Cells of positive products stained with in situ end labeling shaped as strap and bend and was distributed in clustering. Cytoplasm was hyacinthine, staining was symmetrical, and cellular ecphyma was observed. Nucleus was stained vacantly which was coincidence with form of neurons of dopamine. ②Apoptosis showed strictly in cytoplasm and nucleus at the aspect of morphology. Cytoplasm stained with in situ end labeling was hardly to recognize because of the usage of double-labeling staining technique, but nucleus was still characterized by apoptosis. The behavior of positive products stained with in situ end labeling was described as following: nucleus was buffy; karyopycnosis was round and irregular; caryotin was integrated into clump which was distributed at the border of nucleus and shaped as demilune and anular; positive signals were limited in nucleus and coincidence with morphological changes of apoptosis. However, blue and positive products were observed in cytoplasm of neurons of dopamine which did not occur apoptosis, and the nucleus was not labeled. Therefore, processing apoptosis of neurons of dopamine could be recognized. CONCULSION: Double-labeling staining technique can be used to correctly reveal histological and morphological changes of neuronal apoptosis of dopamine during its onset and development.
基金This work was supported by the Natural Sciences Foundation of China (Grant No. NSFC. 40176036).
文摘Objective To develop an in situ PCR in combination with flow cytometry (ISPCR-FCM) for monitoring cholera toxin positive Vibrio cholerae. Methods In running this method, 4% paraformaldehyde was used to fix the Vibrio cholerae cells and 1 mg/mL lysozyme for 20 min to permeabilize the cells. Before the PCR thermal cycling, 2.5% glycerol was added into the PCR reaction mixture in order to protect the integrality of the cells. Results A length of 1037bp DNA sequence was amplified, which is specific for the cholera toxin gene (ctxAB gene). Cells subjected to ISPCR showed the presences of ctxAB gene both in epifluorescence microscopy and in flow cytometric analysis. The specificity and sensitivity of the method were investigated. The sensitivity was relatively low (10^5 cells/mL), while the specificity was high. Conclusion We have successfully developed a new technique for detection of toxigenic Vibrio cholerae strains. Further study is needed to enhance its sensitivities. ISPCR-FCM shows a great promise in monitoring specific bacteria and their physiological states in environmental samples.
基金supported by a National Research Foundation of Korea(NRF)Grant funded by the Korean government(MSIT)(No.NRF-2017R1E1A1A01075110).
文摘Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes.
文摘Metastasis usually presents in the different courses of tumor diseases and associates with poor prognosis.Circulating tumor cells(CTC) are considered to be essential for conforming metastasis and can be detected in tumor patients' peripheral blood.CTC are not easily detected by conventional cytology methods because of their low frequency in peripheral blood.Our article reviews the recent research results on this subject,and also discusses the problems and prospects in this area.
基金Project(50778015)supported by the National Natural Science Foundation of ChinaProject(2012CB725403)supported by the Major State Basic Research Development Program of China
文摘A real-time pedestrian detection and tracking system using a single video camera was developed to monitor pedestrians. This system contained six modules: video flow capture, pre-processing, movement detection, shadow removal, tracking, and object classification. The Gaussian mixture model was utilized to extract the moving object from an image sequence segmented by the mean-shift technique in the pre-processing module. Shadow removal was used to alleviate the negative impact of the shadow to the detected objects. A model-free method was adopted to identify pedestrians. The maximum and minimum integration methods were developed to integrate multiple cues into the mean-shift algorithm and the initial tracking iteration with the competent integrated probability distribution map for object tracking. A simple but effective algorithm was proposed to handle full occlusion cases. The system was tested using real traffic videos from different sites. The results of the test confirm that the system is reliable and has an overall accuracy of over 85%.
基金the National Science Foundation through the International Collaboration Supplement of Grant No.CMS-0202320the HongKong Research Grants Council via the Competitive Earmarked Research Grant HKUST6220/01E
文摘The concept of health monitoring is a key aspect of the field of medicine that has been practiced for a long time. A commonly used diagnostic and health monitoring practice is pulse diagnosis, which can be traced back approximately five thousand years in the recorded history of China. With advances in the development of modern technology, the concept of health monitoring of a variety of engineering structures in several applications has begun to attract widespread attention. Of particular interest in this study is the health monitoring of civil structures. It seem natural, and even beneficial, that these two health-monitoring methods, one as applies to the human body and the other to civil structures, should be analyzed and compared. In this paper, the basic concepts and theories of the two monitoring methods are first discussed. Similarities are then summarized and commented upon. It is hoped that this correlation analysis may help provide structural engineers with some insights into the intrinsic concept of using pulse diagnosis in human health monitoring, which may of be some benefit in the development of modern structural health monitoring methods.
文摘Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.
基金This work was financially supported by the National Risk Assessment Laboratory of Agro-products Processing Quality and Safety,Ministry of Agriculture and Rural Affairs of the People’s Republic of China(S2021KFKT-14)the National Natural Science Foundation of China(32102079+2 种基金32072290)the Key Project of Zhejiang Provincial Natural Science Foundation of China(LZ22C200003)Zhejiang Provincial Department of Agriculture and Rural Affairs(2022SNJF020,2022SNJF069).
文摘Biogenic amine is one of the main categories of hazardous compounds in meat and meat products,making its detection methods vital for the assurance of edible safety.In this sense,many biogenic amine detection techniques such as chromatographic,electrophoretic,and electrochemical methods have been developed,which play an irreplaceable role in ensuring the safety of meat and meat products.Due to the increasing demand for fast and on-site detection techniques,visual detection methods have been gradually developed compared with non-visual methods such as chromatography and electrophoresis.Herein,we comprehensively review the mechanism and the latest progress of these biogenic amine detection methods;besides,we put forward the prospects for the future development of biogenic amine detection techniques,with a view to providing support for the establishment of more accurate and efficient detection,prevention and control strategies of biogenic amines.
基金supported by the National Natural Science Foundation of China(32121001,32201213)。
文摘Among over 170 different types of chemical modifications on RNA nucleobases identified so far,RNA methylation is the major type of epitranscriptomic modifications existing on almost all types of RNAs,and has been demonstrated to participate in the entire process of RNA metabolism,including transcription,pre-mRNA alternative splicing and maturation,mRNA nucleus export,mRNA degradation and stabilization,mRNA translation.Attributing to the development of high-throughput detection technologies and the identification of both dynamic regulators and recognition proteins,mechanisms of RNA methylation modification in regulating the normal development of the organism as well as various disease occurrence and developmental abnormalities upon RNA methylation dysregulation have become increasingly clear.Here,we particularly focus on three types of RNA methylations:N^(6)-methylcytosine(m^(6)A),5-methylcytosine(m^(5)C),and N^(7)-methyladenosine(m^(7)G).We summarize the elements related to their dynamic installment and removal,specific binding proteins,and the development of high-throughput detection technologies.Then,for a comprehensive understanding of their biological significance,we also overview the latest knowledge on the underlying mechanisms and key roles of these three mRNA methylation modifications in gametogenesis,embryonic development,immune system development,as well as disease and tumor progression.
基金This work was supported by the National Science Foundation of China (No. 19974063) and the President Foundation of the Institute of Acoustics, Chinese Academy of Sciences.
文摘The ultrasonic testing for the defects of complete disbond in multi-layered structure with lower acoustic impedance beneath a high acoustic impedance overburden is one of the difficult problems in ultrasonic nondestructive testing field. A model of a multi-layered steel-rubber composite plate is depicted. Because the acoustic impedance of the steel differs far from that of the couplant water and the rubber, the energy of the signal reflected from the debonded rubber layers is very weak. More over, the flaw echoes are masked by the strong echoes reverberated in the steel plate. It's nearly impossible to identify the debonding echoes directly. The subband adaptive filtering method is discussed in the paper, where the subband decomposition is performed by mutual wavelet packets decomposition on the criterion of maximizing the cross-correlation between the signals. The simulations on both synthetic and real signals are presented. The echoes from the delaminated flaw at the depth of 5 mm in the rubber from the calculated signal, and echoes from the flaw at the depth of 3 mm from the real signal are extracted successfully.