Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambi...Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambiguity(IBA) increases as the directional difference between beams becomes smaller.An adaptive antenna activation based beamforming scheme was proposed to mitigate IBA.In the district near the base station(BS),all antenna elements(AEs) were activated to generate two beams.As the distance from the train to the BS increased,only the minimum number of AEs satisfying the resolution criterion would be activated.At the cell edge,one beam was switched off due to intolerable IBA.The proposed scheme can achieve SE gain to the non-adaptive scheme and show more robustness against the direction-of-arrival(DOA) estimation error.展开更多
Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastruc...Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.展开更多
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and contr...Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and control of membrane antenna are challenging.To maintain the working performance of the antenna,the pointing and surface accuracies must be strictly maintained.Therefore,the accurate dynamic modeling and effective active control of large-scale space membrane antennas have great theoretical significance and practical value,and have attracted considerable interest in recent years.This paper reviews the dynamics and active control of large-scale space membrane antennas.First,the development and status of large-scale space membrane antennas are summarized.Subsequently,the key problems in the dynamics and active control of large membrane antennas,including the dynamics of wrinkled membranes,large-amplitude nonlinear vibration,nonlinear model reduction,rigid-flexible-thermal coupling dynamic modeling,on-orbit modal parameter identification,active vibration control,and wave-based vibration control,are discussed in detail.Finally,the research outlook and future trends are presented.展开更多
In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with th...In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with this heat wave over Northeast China are analyzed using station temperature data and NCEP–NCAR reanalysis data.The results indicate that strong anomalous positive geopotential height centers existed from the lower to upper levels over Northeast China,and the related downward motions were directly responsible for the extreme high-temperature anomalies.The northwestward shift of the western Pacific subtropical high(WPSH)and the northeastward shift of the South Asian high concurrently reinforced the geopotential height anomalies and descending flow over Northeast China.In addition,an anomalous Pacific–Japan pattern in the lower troposphere led to the northwestward shift of the WPSH,jointly favoring the anomalous geopotential height over Northeast China.Two wave trains emanating from the Atlantic region propagated eastwards along high latitudes and midlatitudes,respectively,and converged over Northeast China,leading to the enhancement of the geopotential height anomalies.展开更多
Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined acti...Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water.展开更多
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl...Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.展开更多
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or tru...We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.展开更多
<span style="font-family:""><span style="font-family:Verdana;">In Nagaland ~70% of population lives in rural areas and depends on forest products for livelihood. Being part of the ...<span style="font-family:""><span style="font-family:Verdana;">In Nagaland ~70% of population lives in rural areas and depends on forest products for livelihood. Being part of the biodiversity hotspot, state is rich in biodiversity. The present study was an attempt made to understand the nutritional properties of 22 popular underutilized edible plants (UEP) Kohima, Phek, Tuensang districts. Results revealed moisture content of 22 studied plants ranged between 4.8 to 88.15 g/100g, while protein content varied be</span><span style="font-family:Verdana;">tween 0.00269</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:""><span style="font-family:Verdana;">0.773 g/100g with highest in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (0.773</span></span><span style="font-family:""><span style="font-family:Verdana;"> g/100g) fruit while lowest protein content was in </span><i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (0.00269 g/100g). To</span><span style="font-family:Verdana;">tal carbohydrate content was between 0.198</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">5.212 g/100g with highest in</span><span style="font-family:""> <i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (5.212 g/100g) and lowest in </span><i><span style="font-family:Verdana;">Juglans regia</span></i><span style="font-family:Verdana;"> (0.198 g/100g). Of </span><span><span style="font-family:Verdana;">the 22 samples, maximum antioxidant activity was in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i></span><span style="font-family:Verdana;"> fruits (37.49 μg/ml) followed by </span><i><span style="font-family:Verdana;">Clerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (65.29 μg/ml) leaves, </span><i><span style="font-family:Verdana;">Phyllanthus emblica </span></i><span style="font-family:Verdana;">(79.08 μg/ml) fruits against Trolox (96.89 μg/ml). Highest total phenol content (TPC) was recorded in </span><i><span style="font-family:Verdana;">Terminalia</span></i> <i><span style="font-family:Verdana;">chebula</span></i><span style="font-family:Verdana;"> (53.11 mg GAE/g) and </span><i><span style="font-family:Verdana;">Rhus chinensis</span></i><span style="font-family:Verdana;"> (43.99 mg</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g) while in other 20 crops the values varied from 0.09</span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">8.44 mg</span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g. Total flavonoid content (TFC) varied between 0.004</span><span style="font-family:""> </span><span style="font-family:Verdana;">-</span><span style="font-family:""> </span><span style="font-family:Verdana;">43.67 mg</span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g with c</span><i><span style="font-family:Verdana;">lerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (43.67 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) and </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (27.78 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) were found to be highest among the 22 plant samples. Findings suggest that these underutilized edible plants should be popularized as they can contribute to nutritional support to </span><span style="font-family:Verdana;">different region of the state for health improvement and cultivated them</span><span style="font-family:Verdana;"> commercially to help and develop various value added local product to improve the livelihood status of the rural population and also add to the economy of the state and region.展开更多
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic...This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.展开更多
基金supported partially by the 973 Program under the Grant 2012CB316100
文摘Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambiguity(IBA) increases as the directional difference between beams becomes smaller.An adaptive antenna activation based beamforming scheme was proposed to mitigate IBA.In the district near the base station(BS),all antenna elements(AEs) were activated to generate two beams.As the distance from the train to the BS increased,only the minimum number of AEs satisfying the resolution criterion would be activated.At the cell edge,one beam was switched off due to intolerable IBA.The proposed scheme can achieve SE gain to the non-adaptive scheme and show more robustness against the direction-of-arrival(DOA) estimation error.
文摘Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.
基金the National Natural Science Foundation of China(Grant Nos.12102252 and 12172214)Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQ-MSX0761).
文摘Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and control of membrane antenna are challenging.To maintain the working performance of the antenna,the pointing and surface accuracies must be strictly maintained.Therefore,the accurate dynamic modeling and effective active control of large-scale space membrane antennas have great theoretical significance and practical value,and have attracted considerable interest in recent years.This paper reviews the dynamics and active control of large-scale space membrane antennas.First,the development and status of large-scale space membrane antennas are summarized.Subsequently,the key problems in the dynamics and active control of large membrane antennas,including the dynamics of wrinkled membranes,large-amplitude nonlinear vibration,nonlinear model reduction,rigid-flexible-thermal coupling dynamic modeling,on-orbit modal parameter identification,active vibration control,and wave-based vibration control,are discussed in detail.Finally,the research outlook and future trends are presented.
基金supported by the National Natural Science Foundation of China under Grant 41775073
文摘In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with this heat wave over Northeast China are analyzed using station temperature data and NCEP–NCAR reanalysis data.The results indicate that strong anomalous positive geopotential height centers existed from the lower to upper levels over Northeast China,and the related downward motions were directly responsible for the extreme high-temperature anomalies.The northwestward shift of the western Pacific subtropical high(WPSH)and the northeastward shift of the South Asian high concurrently reinforced the geopotential height anomalies and descending flow over Northeast China.In addition,an anomalous Pacific–Japan pattern in the lower troposphere led to the northwestward shift of the WPSH,jointly favoring the anomalous geopotential height over Northeast China.Two wave trains emanating from the Atlantic region propagated eastwards along high latitudes and midlatitudes,respectively,and converged over Northeast China,leading to the enhancement of the geopotential height anomalies.
基金supported by the Universiti Kebangsaan Malaysia Grant(Grant No.GUP-2014-077)
文摘Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water.
基金This work was partially supported by the National Natural Science Foundation of China(No.61802034)National Key Research and Development Program of China(No.2019YFC1509602)Chongqing Natural Science Foundation(cstc2019jcyj-msxmX0264).
文摘Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
文摘We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.
文摘<span style="font-family:""><span style="font-family:Verdana;">In Nagaland ~70% of population lives in rural areas and depends on forest products for livelihood. Being part of the biodiversity hotspot, state is rich in biodiversity. The present study was an attempt made to understand the nutritional properties of 22 popular underutilized edible plants (UEP) Kohima, Phek, Tuensang districts. Results revealed moisture content of 22 studied plants ranged between 4.8 to 88.15 g/100g, while protein content varied be</span><span style="font-family:Verdana;">tween 0.00269</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:""><span style="font-family:Verdana;">0.773 g/100g with highest in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (0.773</span></span><span style="font-family:""><span style="font-family:Verdana;"> g/100g) fruit while lowest protein content was in </span><i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (0.00269 g/100g). To</span><span style="font-family:Verdana;">tal carbohydrate content was between 0.198</span></span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">5.212 g/100g with highest in</span><span style="font-family:""> <i><span style="font-family:Verdana;">Setaria italica</span></i><span style="font-family:Verdana;"> (5.212 g/100g) and lowest in </span><i><span style="font-family:Verdana;">Juglans regia</span></i><span style="font-family:Verdana;"> (0.198 g/100g). Of </span><span><span style="font-family:Verdana;">the 22 samples, maximum antioxidant activity was in </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i></span><span style="font-family:Verdana;"> fruits (37.49 μg/ml) followed by </span><i><span style="font-family:Verdana;">Clerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (65.29 μg/ml) leaves, </span><i><span style="font-family:Verdana;">Phyllanthus emblica </span></i><span style="font-family:Verdana;">(79.08 μg/ml) fruits against Trolox (96.89 μg/ml). Highest total phenol content (TPC) was recorded in </span><i><span style="font-family:Verdana;">Terminalia</span></i> <i><span style="font-family:Verdana;">chebula</span></i><span style="font-family:Verdana;"> (53.11 mg GAE/g) and </span><i><span style="font-family:Verdana;">Rhus chinensis</span></i><span style="font-family:Verdana;"> (43.99 mg</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g) while in other 20 crops the values varied from 0.09</span><span style="font-family:Verdana;"> - </span><span style="font-family:Verdana;">8.44 mg</span><span style="font-family:""> </span><span style="font-family:Verdana;">GAE/g. Total flavonoid content (TFC) varied between 0.004</span><span style="font-family:""> </span><span style="font-family:Verdana;">-</span><span style="font-family:""> </span><span style="font-family:Verdana;">43.67 mg</span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g with c</span><i><span style="font-family:Verdana;">lerodendrum glandulosum</span></i><span style="font-family:Verdana;"> (43.67 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) and </span><i><span style="font-family:Verdana;">Terminalia chebula</span></i><span style="font-family:Verdana;"> (27.78 mg</span></span><span style="font-family:""> </span><span style="font-family:""><span style="font-family:Verdana;">QE/g) were found to be highest among the 22 plant samples. Findings suggest that these underutilized edible plants should be popularized as they can contribute to nutritional support to </span><span style="font-family:Verdana;">different region of the state for health improvement and cultivated them</span><span style="font-family:Verdana;"> commercially to help and develop various value added local product to improve the livelihood status of the rural population and also add to the economy of the state and region.
文摘This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.