Solid or liquid waste containing a high concentration of nicotine can pollute sediment in rivers and lakes, and may destroy the ecological balance if it is directly discharged into the environment without any treatmen...Solid or liquid waste containing a high concentration of nicotine can pollute sediment in rivers and lakes, and may destroy the ecological balance if it is directly discharged into the environment without any treatment. In this study, the polymerase chain reaction (PCR) and denaturing gradient gel electrophoresis (DGGE) method was used to analyze the variation of the microbial community structure in the control and nicotinecontaminated sediment samples with nicotine concentration and time of exposure. The results demonstrated that the growth of some bacterial species in the nicotine-contaminated sediment samples was inhibited during the exposure. Some bacteria decreased in species diversity and in quantity with the increase of nicotine concentration or time of exposure, while other bacteria were enriched under the effect of nicotine, and their DGGE bands changed from undertones to deep colors. The microbial community structure, however, showed a wide variation in the nicotine- contaminated sediment samples, especially in the sediment samples treated with high-concentration nicotine. The Jaccard index was only 35.1% between the initial sediment sample and the sediment sample with a nicotine concentration of 0.030 μg/g after 28 d of exposure. Diversity indices showed that the contaminated groups had a similar trend over time. The diversity indices of contaminated groups all decreased in the first 7 d after exposure, then increased until day 42. It has been found that nicotine decreased the diversity of the microbial community in the sediment.展开更多
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16...Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.展开更多
With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication...With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach.展开更多
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.展开更多
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma...This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.展开更多
Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)w...Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies.展开更多
Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF ide...Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700.展开更多
Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessme...Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessment of natural medicines is essential for any therapeutic or health care applications,as their therapeutic potential varies between different geographic origins,plant species,and varieties.Classification of herbal medicines based on a limited number of secondary metabolites is not an ideal approach.Their quality should be considered based on a complete metabolic profile,as their pharmacological activity is not due to a few specific secondary metabolites but rather a larger group of bioactive compounds.A holistic and integrative approach using rapid and nondestructive analytical strategies for the screening of herbal medicines is required for robust characterization.In this study,a rapid and effective quality assessment system for geographical traceability,species,and variety-specific authenticity of the widely used natural medicines turmeric,Ocimum,and Withania somnifera was investigated using Fourier transform near-infrared(FT-NIR)spectroscopy-based metabolic fingerprinting.Four different geographical origins of turmeric,five different Ocimum species,and three different varieties of roots and leaves of Withania somnifera were studied with the aid of machine learning approaches.Extremely good discrimination(R^(2)>0.98,Q^(2)>0.97,and accuracy=1.0)with sensitivity and specificity of 100%was achieved using this metabolic fingerprinting strategy.Our study demonstrated that FT-NIR-based rapid metabolic fingerprinting can be used as a robust analytical method to authenticate several important medicinal herbs.展开更多
With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each ...With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before.展开更多
The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety.One key system that needs protection is the passive key entry system(PKES).To prevent attacks aimed at ...The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety.One key system that needs protection is the passive key entry system(PKES).To prevent attacks aimed at defeating the PKES,we propose a novel radio frequency(RF)fingerprinting method.Our method extracts the cepstral coefficient feature as a fingerprint of a radio frequency signal.This feature is then analyzed using a convolutional neural network(CNN)for device identification.In evaluation,we conducted experiments to determine the effectiveness of different cepstral coefficient features and the convolutional neural network-based model.Our experimental results revealed that the Gammatone Frequency Cepstral Coefficient(GFCC)was the most compelling feature compared to Mel-Frequency Cepstral Coefficient(MFCC),Inverse Mel-Frequency Cepstral Coefficient(IMFCC),Linear-Frequency Cepstral Coefficient(LFCC),and Bark-Frequency Cepstral Coefficient(BFCC).Additionally,we experimented with evaluating the effectiveness of our method in comparison to existing approaches that are similar to ours.展开更多
International trade intensifies the process of globalization which has extended to the entire planet and extends to the entire planet. In view of the difficulties of installing these documentary systems in developing ...International trade intensifies the process of globalization which has extended to the entire planet and extends to the entire planet. In view of the difficulties of installing these documentary systems in developing countries, in particularly the countries of sub-Saharan Africa, the new strategies of traceability emerge. Among the new tools of tracing the products of vegetable origin, a "biological code bar" based on the analysis of the DNA of micro-organisms present on the fruits is an interesting tool. A molecular technique employing 26S rDNA profiles generated by PCR-DGGE was used to detect the variation in yeast community structures of Shea tree fruits (Vitellaria paradoxa) from Senegal, Ghana and Mali. When the 26S rDNA profiles were analyzed by image analysis and multivariate analysis, distinct microbial communities were detected on Shea tree fruits. The band profiles of yeasts from different countries were specific for each location and could be used as a bar code to discriminate the origin of the fruits. This method is a new traceability tool which provides fruit products with an unique biological bar code and makes it possible to trace back the fruits to their original location.展开更多
With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-base...With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC)....This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data.展开更多
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r...Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.展开更多
[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with diffe...[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different.展开更多
Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this ...Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed.展开更多
Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the i...Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition.展开更多
The inheritance of chloroplast DNA (cpDNA) in sweet potato (Ipomoea batatas Lain.) was analyzed using DNA restriction fingerprinting. The cpDNA fingerprints of hybrids from reciprocal crosses between Xushu18 and AB78-...The inheritance of chloroplast DNA (cpDNA) in sweet potato (Ipomoea batatas Lain.) was analyzed using DNA restriction fingerprinting. The cpDNA fingerprints of hybrids from reciprocal crosses between Xushu18 and AB78-1 were found to be identical to those of their female parents, which reveals that cpDNA of sweet potato is maternally inherited in this intervarietal crossing. This maternal cpDNA transmission pattern does not accord with the putative one based on former cytological studies. The plastid inheritance in Convolvulaceae has been briefly reviewed in this study, and the utility of DNA restriction fingerprinting analysis in the study of plastid inheritance is also discussed.展开更多
基金supported by the National Natural Science Foundation of China(Grants No.51378175 and 41323001)the Special Fund of the State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering(Grant No.20145028212)
文摘Solid or liquid waste containing a high concentration of nicotine can pollute sediment in rivers and lakes, and may destroy the ecological balance if it is directly discharged into the environment without any treatment. In this study, the polymerase chain reaction (PCR) and denaturing gradient gel electrophoresis (DGGE) method was used to analyze the variation of the microbial community structure in the control and nicotinecontaminated sediment samples with nicotine concentration and time of exposure. The results demonstrated that the growth of some bacterial species in the nicotine-contaminated sediment samples was inhibited during the exposure. Some bacteria decreased in species diversity and in quantity with the increase of nicotine concentration or time of exposure, while other bacteria were enriched under the effect of nicotine, and their DGGE bands changed from undertones to deep colors. The microbial community structure, however, showed a wide variation in the nicotine- contaminated sediment samples, especially in the sediment samples treated with high-concentration nicotine. The Jaccard index was only 35.1% between the initial sediment sample and the sediment sample with a nicotine concentration of 0.030 μg/g after 28 d of exposure. Diversity indices showed that the contaminated groups had a similar trend over time. The diversity indices of contaminated groups all decreased in the first 7 d after exposure, then increased until day 42. It has been found that nicotine decreased the diversity of the microbial community in the sediment.
基金This work was supported by the Scientific Research Foundation for High Level Talents of Qingdao Agricultural University,China(665-1120015)the National Program for Quality and Safety Risk Assessment of Agricultural Products of China(GJFP2019011)the National Natural Science Foundation of China(42207017).
文摘Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.
文摘With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach.
基金the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
文摘Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.
文摘This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats.
文摘Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies.
基金supported by Innovation Talents Promotion Program of Shaanxi Province,China(No.2021TD08)。
文摘Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700.
基金Department of Science and Technology-SERB-SRG research grant(Grant No.:SRG/2021/000750-G)and Department of Biotechnology for Ramalingaswami grant(Grant No.:BT/RLF/Re-entry/21/2020)Director,Prabodh Kumar Trivedi,of CSIR-CIMAP for providing infrastructure,facility,and funding support from CSIR,India(Grant Nos.:FC2020-23/NMITLI/TLP0001&TLP0002)We acknowledge Dr.Ritu Trivedi(CSIR-CDRI Lucknow,India)for support and Dr.Abolie Girme and Dr.Lal Hingorani(Pharmanza herbal Pvt.Ltd,India)for providing Withania somnifera samples.We acknowledge Dr.Neerja Tiwari for FT-NIR access,Ms.Manju Yadav and Ms.Namita Gupta for HPLC access,and Ms.Anju Yadav for GC-MS access.Authors would like to thank Aroma mission HCP-0007,India for funding support.Prof.Christopher T.Elliott would like to thank Bualuang ASEAN Chair Professor Fund,UK and Queen's University Belfast Fund,UK.
文摘Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessment of natural medicines is essential for any therapeutic or health care applications,as their therapeutic potential varies between different geographic origins,plant species,and varieties.Classification of herbal medicines based on a limited number of secondary metabolites is not an ideal approach.Their quality should be considered based on a complete metabolic profile,as their pharmacological activity is not due to a few specific secondary metabolites but rather a larger group of bioactive compounds.A holistic and integrative approach using rapid and nondestructive analytical strategies for the screening of herbal medicines is required for robust characterization.In this study,a rapid and effective quality assessment system for geographical traceability,species,and variety-specific authenticity of the widely used natural medicines turmeric,Ocimum,and Withania somnifera was investigated using Fourier transform near-infrared(FT-NIR)spectroscopy-based metabolic fingerprinting.Four different geographical origins of turmeric,five different Ocimum species,and three different varieties of roots and leaves of Withania somnifera were studied with the aid of machine learning approaches.Extremely good discrimination(R^(2)>0.98,Q^(2)>0.97,and accuracy=1.0)with sensitivity and specificity of 100%was achieved using this metabolic fingerprinting strategy.Our study demonstrated that FT-NIR-based rapid metabolic fingerprinting can be used as a robust analytical method to authenticate several important medicinal herbs.
文摘With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before.
基金supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MIST)(No.2022-0-01022,Development of Collection and Integrated Analysis Methods of Automotive Inter/Intra System Artifacts through Construction of Event-Based Experimental System).
文摘The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety.One key system that needs protection is the passive key entry system(PKES).To prevent attacks aimed at defeating the PKES,we propose a novel radio frequency(RF)fingerprinting method.Our method extracts the cepstral coefficient feature as a fingerprint of a radio frequency signal.This feature is then analyzed using a convolutional neural network(CNN)for device identification.In evaluation,we conducted experiments to determine the effectiveness of different cepstral coefficient features and the convolutional neural network-based model.Our experimental results revealed that the Gammatone Frequency Cepstral Coefficient(GFCC)was the most compelling feature compared to Mel-Frequency Cepstral Coefficient(MFCC),Inverse Mel-Frequency Cepstral Coefficient(IMFCC),Linear-Frequency Cepstral Coefficient(LFCC),and Bark-Frequency Cepstral Coefficient(BFCC).Additionally,we experimented with evaluating the effectiveness of our method in comparison to existing approaches that are similar to ours.
文摘International trade intensifies the process of globalization which has extended to the entire planet and extends to the entire planet. In view of the difficulties of installing these documentary systems in developing countries, in particularly the countries of sub-Saharan Africa, the new strategies of traceability emerge. Among the new tools of tracing the products of vegetable origin, a "biological code bar" based on the analysis of the DNA of micro-organisms present on the fruits is an interesting tool. A molecular technique employing 26S rDNA profiles generated by PCR-DGGE was used to detect the variation in yeast community structures of Shea tree fruits (Vitellaria paradoxa) from Senegal, Ghana and Mali. When the 26S rDNA profiles were analyzed by image analysis and multivariate analysis, distinct microbial communities were detected on Shea tree fruits. The band profiles of yeasts from different countries were specific for each location and could be used as a bar code to discriminate the origin of the fruits. This method is a new traceability tool which provides fruit products with an unique biological bar code and makes it possible to trace back the fruits to their original location.
文摘With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by Hunan 2011 Collaborative Innovation Center of Chemical Engineering&Technology with Environmental Benignity and Effective Resource Utilization,Hunan Province Natural Science Fund,China(Grant Nos.:2020JJ4569,2023JJ60378)Hunan Province College Students'Innovation and Entrepreneurship Training Program,China(Grant Nos.:S202110530044,S202210530048).
文摘This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data.
基金supported in part by the National Science Foundation of China under Grants U22B2027,62172297,62102262,61902276 and 62272311,Tianjin Intelligent Manufacturing Special Fund Project under Grant 20211097the China Guangxi Science and Technology Plan Project(Guangxi Science and Technology Base and Talent Special Project)under Grant AD23026096(Application Number 2022AC20001)+1 种基金Hainan Provincial Natural Science Foundation of China under Grant 622RC616CCF-Nsfocus Kunpeng Fund Project under Grant CCF-NSFOCUS202207.
文摘Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition.
基金Supported by General Program of Guangxi Natural Science Foundation(2022GXNSFAA035599).
文摘[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different.
基金This study was supported by the National Natural Science Foundation of China(No.81573586).
文摘Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed.
文摘Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition.
文摘The inheritance of chloroplast DNA (cpDNA) in sweet potato (Ipomoea batatas Lain.) was analyzed using DNA restriction fingerprinting. The cpDNA fingerprints of hybrids from reciprocal crosses between Xushu18 and AB78-1 were found to be identical to those of their female parents, which reveals that cpDNA of sweet potato is maternally inherited in this intervarietal crossing. This maternal cpDNA transmission pattern does not accord with the putative one based on former cytological studies. The plastid inheritance in Convolvulaceae has been briefly reviewed in this study, and the utility of DNA restriction fingerprinting analysis in the study of plastid inheritance is also discussed.