Due to ever-growing soccer data collection approaches and progressing artificial intelligence(AI) methods, soccer analysis, evaluation, and decision-making have received increasing interest from not only the professio...Due to ever-growing soccer data collection approaches and progressing artificial intelligence(AI) methods, soccer analysis, evaluation, and decision-making have received increasing interest from not only the professional sports analytics realm but also the academic AI research community. AI brings gamechanging approaches for soccer analytics where soccer has been a typical benchmark for AI research. The combination has been an emerging topic. In this paper, soccer match analytics are taken as a complete observation-orientation-decision-action(OODA) loop.In addition, as in AI frameworks such as that for reinforcement learning, interacting with a virtual environment enables an evolving model. Therefore, both soccer analytics in the real world and virtual domains are discussed. With the intersection of the OODA loop and the real-virtual domains, available soccer data, including event and tracking data, and diverse orientation and decisionmaking models for both real-world and virtual soccer matches are comprehensively reviewed. Finally, some promising directions in this interdisciplinary area are pointed out. It is claimed that paradigms for both professional sports analytics and AI research could be combined. Moreover, it is quite promising to bridge the gap between the real and virtual domains for soccer match analysis and decision-making.展开更多
The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts ...The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality.展开更多
Humans are experiencing the inclusion of artificial agents in their lives,such as unmanned vehicles,service robots,voice assistants,and intelligent medical care.If the artificial agents cannot align with social values...Humans are experiencing the inclusion of artificial agents in their lives,such as unmanned vehicles,service robots,voice assistants,and intelligent medical care.If the artificial agents cannot align with social values or make ethical decisions,they may not meet the expectations of humans.Traditionally,an ethical decision-making framework is constructed by rule-based or statistical approaches.In this paper,we propose an ethical decision-making framework based on incremental ILP(Inductive Logic Programming),which can overcome the brittleness of rule-based approaches and little interpretability of statistical approaches.As the current incremental ILP makes it difficult to solve conflicts,we propose a novel ethical decision-making framework considering conflicts in this paper,which adopts our proposed incremental ILP system.The framework consists of two processes:the learning process and the deduction process.The first process records bottom clauses with their score functions and learns rules guided by the entailment and the score function.The second process obtains an ethical decision based on the rules.In an ethical scenario about chatbots for teenagers’mental health,we verify that our framework can learn ethical rules and make ethical decisions.Besides,we extract incremental ILP from the framework and compare it with the state-of-the-art ILP systems based on ASP(Answer Set Programming)focusing on conflict resolution.The results of comparisons show that our proposed system can generate better-quality rules than most other systems.展开更多
Stroke is a chronic cerebrovascular disease that carries a high risk.Stroke risk assessment is of great significance in preventing,reversing and reducing the spread and the health hazards caused by stroke.Aiming to ob...Stroke is a chronic cerebrovascular disease that carries a high risk.Stroke risk assessment is of great significance in preventing,reversing and reducing the spread and the health hazards caused by stroke.Aiming to objectively predict and identify strokes,this paper proposes a new stroke risk assessment decision-making model named Logistic-AdaBoost(Logistic-AB)based on machine learning.First,the categorical boosting(CatBoost)method is used to perform feature selection for all features of stroke,and 8 main features are selected to form a new index evaluation system to predict the risk of stroke.Second,the borderline synthetic minority oversampling technique(SMOTE)algorithm is applied to transform the unbalanced stroke dataset into a balanced dataset.Finally,the stroke risk assessment decision-makingmodel Logistic-AB is constructed,and the overall prediction performance of this new model is evaluated by comparing it with ten other similar models.The comparison results show that the new model proposed in this paper performs better than the two single algorithms(logistic regression and AdaBoost)on the four indicators of recall,precision,F1 score,and accuracy,and the overall performance of the proposed model is better than that of common machine learning algorithms.The Logistic-AB model presented in this paper can more accurately predict patients’stroke risk.展开更多
With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The networ...With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data.展开更多
Spherical q-linearDiophantine fuzzy sets(Sq-LDFSs)provedmore effective for handling uncertainty and vagueness in multi-criteria decision-making(MADM).It does not only cover the data in two variable parameters but is a...Spherical q-linearDiophantine fuzzy sets(Sq-LDFSs)provedmore effective for handling uncertainty and vagueness in multi-criteria decision-making(MADM).It does not only cover the data in two variable parameters but is also beneficial for three parametric data.By Pythagorean fuzzy sets,the difference is calculated only between two parameters(membership and non-membership).According to human thoughts,fuzzy data can be found in three parameters(membership uncertainty,and non-membership).So,to make a compromise decision,comparing Sq-LDFSs is essential.Existing measures of different fuzzy sets do,however,can have several flaws that can lead to counterintuitive results.For instance,they treat any increase or decrease in the membership degree as the same as the non-membership degree because the uncertainty does not change,even though each parameter has a different implication.In the Sq-LDFSs comparison,this research develops the differentialmeasure(DFM).Themain goal of the DFM is to cover the unfair arguments that come from treating different types of FSs opposing criteria equally.Due to their relative positions in the attribute space and the similarity of their membership and non-membership degrees,two Sq-LDFSs formthis preference connectionwhen the uncertainty remains same in both sets.According to the degree of superiority or inferiority,two Sq-LDFSs are shown as identical,equivalent,superior,or inferior over one another.The suggested DFM’s fundamental characteristics are provided.Based on the newly developed DFM,a unique approach tomultiple criterion group decision-making is offered.Our suggestedmethod verifies the novel way of calculating the expert weights for Sq-LDFSS as in PFSs.Our proposed technique in three parameters is applied to evaluate solid-state drives and choose the optimum photovoltaic cell in two applications by taking uncertainty parameter zero.The method’s applicability and validity shown by the findings are contrasted with those obtained using various other existing approaches.To assess its stability and usefulness,a sensitivity analysis is done.展开更多
Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons,including leisure,pleasure,or business.A recent study has proposed a unique mathema...Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons,including leisure,pleasure,or business.A recent study has proposed a unique mathematical concept called a q−Rung orthopair fuzzy hypersoft set(q−ROFHS)to enhance the formal representation of human thought processes and evaluate tourism carrying capacity.This approach can capture the imprecision and ambiguity often present in human perception.With the advanced mathematical tools in this field,the study has also incorporated the Einstein aggregation operator and score function into the q−ROFHS values to supportmultiattribute decision-making algorithms.By implementing this technique,effective plans can be developed for social and economic development while avoiding detrimental effects such as overcrowding or environmental damage caused by tourism.A case study of selected tourism carrying capacity will demonstrate the proposed methodology.展开更多
Patients and physicians understand the importance of self-care following spinal cord injury (SCI), yet many individuals with SCI do not adhere to recommended self-care activities despite logistical supports. Neurobeha...Patients and physicians understand the importance of self-care following spinal cord injury (SCI), yet many individuals with SCI do not adhere to recommended self-care activities despite logistical supports. Neurobehavioral determinants of SCI self-care behavior, such as impulsivity, are not widely studied, yet understanding them could inform efforts to improve SCI self-care. We explored associations between impulsivity and self-care in an observational study of 35 US adults age 18 - 50 who had traumatic SCI with paraplegia at least six months before assessment. The primary outcome measure was self-reported self-care. In LASSO regression models that included all neurobehavioral measures and demographics as predictors of self-care, dispositional measures of greater impulsivity (negative urgency, lack of premeditation, lack of perseverance), and reduced mindfulness were associated with reduced self-care. Outcome (magnitude) sensitivity, a latent decision-making parameter derived from computationally modeling successive choices in a gambling task, was also associated with self-care behavior. These results are preliminary;more research is needed to demonstrate the utility of these findings in clinical settings. Information about associations between impulsivity and poor self-care in people with SCI could guide the development of interventions to improve SCI self-care and help patients with elevated risks related to self-care and secondary health conditions.展开更多
This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assist...This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner.展开更多
To effectively deal with fuzzy and uncertain information in public engineering emergencies,an emergency decision-making method based on multi-granularity language information is proposed.Firstly,decision makers select...To effectively deal with fuzzy and uncertain information in public engineering emergencies,an emergency decision-making method based on multi-granularity language information is proposed.Firstly,decision makers select the appropriate language phrase set according to their own situation,give the preference information of the weight of each key indicator,and then transform the multi-granularity language information through consistency.On this basis,the sequential optimization technology of the approximately ideal scheme is introduced to obtain the weight coefficient of each key indicator.Subsequently,the weighted average operator is used to aggregate the preference information of each alternative scheme with the relative importance of decision-makers and the weight of key indicators in sequence,and the comprehensive evaluation value of each scheme is obtained to determine the optimal scheme.Lastly,the effectiveness and practicability of the method are verified by taking the earthwork collapse accident in the construction of a reservoir as an example.展开更多
In the developmental dilemma of artificial intelligence(AI)-assisted judicial decision-making,the technical architecture of AI determines its inherent lack of transparency and interpretability,which is challenging to ...In the developmental dilemma of artificial intelligence(AI)-assisted judicial decision-making,the technical architecture of AI determines its inherent lack of transparency and interpretability,which is challenging to fundamentally improve.This can be considered a true challenge in the realm of AI-assisted judicial decision-making.By examining the court’s acceptance,integration,and trade-offs of AI technology embedded in the judicial field,the exploration of potential conflicts,interactions,and even mutual shaping between the two will not only reshape their conceptual connotations and intellectual boundaries but also strengthen the cognition and re-interpretation of the basic principles and core values of the judicial trial system.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
BACKGROUND:To promote the shared decision-making(SDM)between patients and doctors in pediatric outpatient departments,this study was designed to validate artificial intelligence(AI)-initiated medical tests for childre...BACKGROUND:To promote the shared decision-making(SDM)between patients and doctors in pediatric outpatient departments,this study was designed to validate artificial intelligence(AI)-initiated medical tests for children with fever.METHODS:We designed an AI model,named Xiaoyi,to suggest necessary tests for a febrile child before visiting a pediatric outpatient clinic.We calculated the sensitivity,specificity,and F1 score to evaluate the efficacy of Xiaoyi’s recommendations.The patients were divided into the rejection and acceptance groups.Then we analyzed the rejected examination items in order to obtain the corresponding reasons.RESULTS:We recruited a total of 11,867 children with fever who had used Xiaoyi in outpatient clinics.The recommended examinations given by Xiaoyi for 10,636(89.6%)patients were qualified.The average F1 score reached 0.94.A total of 58.4%of the patients accepted Xiaoyi’s suggestions(acceptance group),and 41.6%refused(rejection group).Imaging examinations were rejected by most patients(46.7%).The tests being time-consuming were rejected by 2,133 patients(43.2%),including rejecting pathogen studies in 1,347 patients(68.5%)and image studies in 732 patients(31.8%).The difficulty of sampling was the main reason for rejecting routine tests(41.9%).CONCLUSION:Our model has high accuracy and acceptability in recommending medical tests to febrile pediatric patients,and is worth promoting in facilitating SDM.展开更多
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu...As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.展开更多
This paper presents an operational framework of unstructured decision-making approach involving quality function deployment(QFD)in an uncertain linguistic context.Firstly,QFD is extended to the multi-enterprise paradi...This paper presents an operational framework of unstructured decision-making approach involving quality function deployment(QFD)in an uncertain linguistic context.Firstly,QFD is extended to the multi-enterprise paradigm in a real-world manufacturing environment.Secondly,hesitant fuzzy linguistic term sets(HFLTSs),which facilitate the management and handling of information equivocality,are designed to construct a house of quality(HoQ)in the product planning process.The technique of computing with words is applied to bridge the gap between mechanisms of the human brain and machine processes with fuzzy linguistic term sets.Thirdly,a multi-enterprise QFD pattern is formulated as an unstructured decision-making problem for alternative infrastructure project selection in a manufacturing organization.The inter-relationships of cooperative partners are directly matched with a back propagation neural network(BPNN)to construct the multi-enterprise manufacturing network.The resilience of the manufacturing organization is considered by formulating an outranking method on the basis of HFLTSs to decide on infrastructure project alternatives.Finally,a real-world example,namely,the prototype manufacturing of an automatic transmission for a vehicle,is provided to illustrate the effectiveness of the proposed decision-making approach.展开更多
AIM:To determine whether an antisense RNA corresponding to the human Alu transposable element(Aluas RNA)can protect human lens epithelial cells(HLECs)from methylglyoxal-induced apoptosis.METHODS:Cell counting kit-8(CC...AIM:To determine whether an antisense RNA corresponding to the human Alu transposable element(Aluas RNA)can protect human lens epithelial cells(HLECs)from methylglyoxal-induced apoptosis.METHODS:Cell counting kit-8(CCK-8)and 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide(MTT)assays were used to assess HLEC viability.HLEC viability/death was detected using a Calcein-AM/PI double staining kit;the annexin V-FITC method was used to detect HLEC apoptosis.The cytosolic reactive oxygen species(ROS)levels in HLECs were determined using a reactive species assay kit.The levels of malondialdehyde(MDA)and the antioxidant activities of total-superoxide dismutase(T-SOD)and glutathione peroxidase(GSH-Px)were assessed in HLECs using their respective kits.RT-q PCR and Western blotting were used to measure m RNA and protein expression levels of the genes.RESULTS:Aluas RNA rescued methylglyoxal-induced apoptosis in HLECs and ameliorated both the methylglyoxalinduced decrease in Bcl-2 m RNA and the methylglyoxalinduced increase in Bax m RNA.In addition,Aluas RNA inhibited the methylglyoxal-induced increase in Alu sense RNA expression.Aluas RNA inhibited the production of ROS induced by methylglyoxal,restored T-SOD and GSHPx activity,and moderated the increase in MDA content after treatment with methylglyoxal.Aluas RNA significantly restored the methylglyoxal-induced down-regulation of Nrf2 gene and antioxidant defense genes,including glutathione peroxidase,heme oxygenase 1,γ-glutamylcysteine synthetase and quinone oxidoreductase 1.Aluas RNA ameliorated methylglyoxal-induced increases of the m RNA and protein expression of Keap1 that is the negative regulator of Nrf2.CONCLUSION:Aluas RNA reduces apoptosis induced by methylglyoxal by enhancing antioxidant defense.展开更多
The ubiquitous lipid-derived molecules N-acylethanolamines(NAEs)have multiple immune functions in mammals,but their roles and mechanisms in plant defense response during changing environment remain largely unclear.Her...The ubiquitous lipid-derived molecules N-acylethanolamines(NAEs)have multiple immune functions in mammals,but their roles and mechanisms in plant defense response during changing environment remain largely unclear.Here,we found that exogenous NAE18:0 and NAE18:2 promoted defense against the necrotrophic pathogen Botrytis cinerea but suppressed defense to the hemi-biotrophic pathogen Pseudomonas syringae pv.tomato(Pst)DC3000 in tomato.The knocking-down and overexpression function analysis of the pathogen-responsive NAE synthetic gene PHOSPHOLIPASE Dγ(PLDγ)and hydrolytic gene FATTY ACID AMID HYDROLASE 1(FAAH1)revealed that the NAE pathway is crucial for plant defense response.Using exogenous applications and SA-abolished NahG plants,we unveiled the antagonistic relationship between NAE and SA in plant defense response.Elevated CO_(2) and temperature significantly changed the NAE pathway in response to pathogens,while inhibition of the NAE pathway led to the alternation of environment-mediated defense variations against Pst DC3000 in tomato,indicating that NAE pathway is associated with plant defense variations in response to elevated CO_(2) and temperature.The results herein reveal a new function of NAE in plant defense,and its involvement in environment-mediated defense variation in tomato.These findings shed light on the NAE-based plant defense,which may have relevance to crop disease management in future changing climate.展开更多
Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassificatio...Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training.展开更多
The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L.infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts.Solan...The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L.infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts.Solanum lycopersicum plantlets were transplanted 15 days after the emergency.Five days after transplanting,Beauveria bassiana spores were applied at a concentration of 1×10^(7)spores mL^(−1)onto soil(along with A.indica(N)and P.auritum(H)leaf extracts)where S.lycopersicum plants were planted.Eight days after transplanting,spores of F.oxysporum strain were applied at a concentration of 1×10^(6)spores mL^(−1)to soil where S.lycopersicum plants were growing.The development of S.lycopersicum plants was monitored for 114 days,whereby a randomized complete block treatment design was used,the roots of the plants were crushed with liquid nitrogen,after which UV/VIS spectrophotometry was used to determine protein concentration,as well as the activity ofβ-1,3-glucanases,peroxidases(POX,EC1.11.1.7),catalase and chitinases.The treatments combining B.bassiana and A.indica and P.auritum extracts,had a significant difference in enzymatic activity levels,thus contributing to better defense mechanisms and a greater protection to S.lycopersicum plants in the presence of F.oxysporum.The application of B.bassiana and plant extracts to the ground mitigated damage caused by F.oxysporum on S.lycopersicum plants.展开更多
With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive o...With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment(WTA)model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony(MOABC)algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance(IGD)index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space.展开更多
基金supported by the National Key Research,Development Program of China (2020AAA0103404)the Beijing Nova Program (20220484077)the National Natural Science Foundation of China (62073323)。
文摘Due to ever-growing soccer data collection approaches and progressing artificial intelligence(AI) methods, soccer analysis, evaluation, and decision-making have received increasing interest from not only the professional sports analytics realm but also the academic AI research community. AI brings gamechanging approaches for soccer analytics where soccer has been a typical benchmark for AI research. The combination has been an emerging topic. In this paper, soccer match analytics are taken as a complete observation-orientation-decision-action(OODA) loop.In addition, as in AI frameworks such as that for reinforcement learning, interacting with a virtual environment enables an evolving model. Therefore, both soccer analytics in the real world and virtual domains are discussed. With the intersection of the OODA loop and the real-virtual domains, available soccer data, including event and tracking data, and diverse orientation and decisionmaking models for both real-world and virtual soccer matches are comprehensively reviewed. Finally, some promising directions in this interdisciplinary area are pointed out. It is claimed that paradigms for both professional sports analytics and AI research could be combined. Moreover, it is quite promising to bridge the gap between the real and virtual domains for soccer match analysis and decision-making.
基金funded by the National Natural Science Foundation of China (Nos. 31970427 and 32270526 to WL)。
文摘The interactions between avian brood parasites and their hosts provide an informative and easy-to-handle system for studying coevolution.Avian brood parasitism reduces the reproductive success of hosts,and thus,hosts have evolved anti-parasitic strategies,such as rejecting parasitic eggs and adopting aggressive nest defense strategies,to avoid the cost brought on by brood parasitism.To test whether host anti-parasitic strategies are adjusted with the risk of being parasitized when the breeding seasons of brood parasites and hosts are not synchronous,we conducted a field experiment assessing nest defense and egg recognition behaviors of the Isabelline Shrike(Lanius isabellinus),a host of the Common Cuckoo(Cuculus canorus).In the local area,the host Isabelline Shrike begins to breed in April,whereas the summer migratory Common Cuckoo migrates to the local area in May and begins to lay parasitic eggs.Results showed that nest defense behaviors of the Isabelline Shrike increases significantly after cuckoo arrival,showing higher aggressiveness to cuckoo dummies,with no significant difference in attack rates among cuckoo,sparrowhawk and dove dummies,but their egg rejection did not change significantly.These results imply that Isabelline Shrikes may adjust their nest defense behavior,but not egg rejection behavior,with seasonality.
基金This work was funded by the National Natural Science Foundation of China Nos.U22A2099,61966009,62006057the Graduate Innovation Program No.YCSW2022286.
文摘Humans are experiencing the inclusion of artificial agents in their lives,such as unmanned vehicles,service robots,voice assistants,and intelligent medical care.If the artificial agents cannot align with social values or make ethical decisions,they may not meet the expectations of humans.Traditionally,an ethical decision-making framework is constructed by rule-based or statistical approaches.In this paper,we propose an ethical decision-making framework based on incremental ILP(Inductive Logic Programming),which can overcome the brittleness of rule-based approaches and little interpretability of statistical approaches.As the current incremental ILP makes it difficult to solve conflicts,we propose a novel ethical decision-making framework considering conflicts in this paper,which adopts our proposed incremental ILP system.The framework consists of two processes:the learning process and the deduction process.The first process records bottom clauses with their score functions and learns rules guided by the entailment and the score function.The second process obtains an ethical decision based on the rules.In an ethical scenario about chatbots for teenagers’mental health,we verify that our framework can learn ethical rules and make ethical decisions.Besides,we extract incremental ILP from the framework and compare it with the state-of-the-art ILP systems based on ASP(Answer Set Programming)focusing on conflict resolution.The results of comparisons show that our proposed system can generate better-quality rules than most other systems.
基金supported by the National Natural Science Foundation of China (No.72071150).
文摘Stroke is a chronic cerebrovascular disease that carries a high risk.Stroke risk assessment is of great significance in preventing,reversing and reducing the spread and the health hazards caused by stroke.Aiming to objectively predict and identify strokes,this paper proposes a new stroke risk assessment decision-making model named Logistic-AdaBoost(Logistic-AB)based on machine learning.First,the categorical boosting(CatBoost)method is used to perform feature selection for all features of stroke,and 8 main features are selected to form a new index evaluation system to predict the risk of stroke.Second,the borderline synthetic minority oversampling technique(SMOTE)algorithm is applied to transform the unbalanced stroke dataset into a balanced dataset.Finally,the stroke risk assessment decision-makingmodel Logistic-AB is constructed,and the overall prediction performance of this new model is evaluated by comparing it with ten other similar models.The comparison results show that the new model proposed in this paper performs better than the two single algorithms(logistic regression and AdaBoost)on the four indicators of recall,precision,F1 score,and accuracy,and the overall performance of the proposed model is better than that of common machine learning algorithms.The Logistic-AB model presented in this paper can more accurately predict patients’stroke risk.
基金This work was supported by the National Natural Science Foundation of China(U2133208,U20A20161).
文摘With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data.
基金the Deanship of Scientific Research at Umm Al-Qura University(Grant Code:22UQU4310396DSR65).
文摘Spherical q-linearDiophantine fuzzy sets(Sq-LDFSs)provedmore effective for handling uncertainty and vagueness in multi-criteria decision-making(MADM).It does not only cover the data in two variable parameters but is also beneficial for three parametric data.By Pythagorean fuzzy sets,the difference is calculated only between two parameters(membership and non-membership).According to human thoughts,fuzzy data can be found in three parameters(membership uncertainty,and non-membership).So,to make a compromise decision,comparing Sq-LDFSs is essential.Existing measures of different fuzzy sets do,however,can have several flaws that can lead to counterintuitive results.For instance,they treat any increase or decrease in the membership degree as the same as the non-membership degree because the uncertainty does not change,even though each parameter has a different implication.In the Sq-LDFSs comparison,this research develops the differentialmeasure(DFM).Themain goal of the DFM is to cover the unfair arguments that come from treating different types of FSs opposing criteria equally.Due to their relative positions in the attribute space and the similarity of their membership and non-membership degrees,two Sq-LDFSs formthis preference connectionwhen the uncertainty remains same in both sets.According to the degree of superiority or inferiority,two Sq-LDFSs are shown as identical,equivalent,superior,or inferior over one another.The suggested DFM’s fundamental characteristics are provided.Based on the newly developed DFM,a unique approach tomultiple criterion group decision-making is offered.Our suggestedmethod verifies the novel way of calculating the expert weights for Sq-LDFSS as in PFSs.Our proposed technique in three parameters is applied to evaluate solid-state drives and choose the optimum photovoltaic cell in two applications by taking uncertainty parameter zero.The method’s applicability and validity shown by the findings are contrasted with those obtained using various other existing approaches.To assess its stability and usefulness,a sensitivity analysis is done.
基金the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2021R1A4A1031509).
文摘Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons,including leisure,pleasure,or business.A recent study has proposed a unique mathematical concept called a q−Rung orthopair fuzzy hypersoft set(q−ROFHS)to enhance the formal representation of human thought processes and evaluate tourism carrying capacity.This approach can capture the imprecision and ambiguity often present in human perception.With the advanced mathematical tools in this field,the study has also incorporated the Einstein aggregation operator and score function into the q−ROFHS values to supportmultiattribute decision-making algorithms.By implementing this technique,effective plans can be developed for social and economic development while avoiding detrimental effects such as overcrowding or environmental damage caused by tourism.A case study of selected tourism carrying capacity will demonstrate the proposed methodology.
文摘Patients and physicians understand the importance of self-care following spinal cord injury (SCI), yet many individuals with SCI do not adhere to recommended self-care activities despite logistical supports. Neurobehavioral determinants of SCI self-care behavior, such as impulsivity, are not widely studied, yet understanding them could inform efforts to improve SCI self-care. We explored associations between impulsivity and self-care in an observational study of 35 US adults age 18 - 50 who had traumatic SCI with paraplegia at least six months before assessment. The primary outcome measure was self-reported self-care. In LASSO regression models that included all neurobehavioral measures and demographics as predictors of self-care, dispositional measures of greater impulsivity (negative urgency, lack of premeditation, lack of perseverance), and reduced mindfulness were associated with reduced self-care. Outcome (magnitude) sensitivity, a latent decision-making parameter derived from computationally modeling successive choices in a gambling task, was also associated with self-care behavior. These results are preliminary;more research is needed to demonstrate the utility of these findings in clinical settings. Information about associations between impulsivity and poor self-care in people with SCI could guide the development of interventions to improve SCI self-care and help patients with elevated risks related to self-care and secondary health conditions.
文摘This paper introduces a novel multi-tiered defense architecture to protect language models from adversarial prompt attacks. We construct adversarial prompts using strategies like role emulation and manipulative assistance to simulate real threats. We introduce a comprehensive, multi-tiered defense framework named GUARDIAN (Guardrails for Upholding Ethics in Language Models) comprising a system prompt filter, pre-processing filter leveraging a toxic classifier and ethical prompt generator, and pre-display filter using the model itself for output screening. Extensive testing on Meta’s Llama-2 model demonstrates the capability to block 100% of attack prompts. The approach also auto-suggests safer prompt alternatives, thereby bolstering language model security. Quantitatively evaluated defense layers and an ethical substitution mechanism represent key innovations to counter sophisticated attacks. The integrated methodology not only fortifies smaller LLMs against emerging cyber threats but also guides the broader application of LLMs in a secure and ethical manner.
文摘To effectively deal with fuzzy and uncertain information in public engineering emergencies,an emergency decision-making method based on multi-granularity language information is proposed.Firstly,decision makers select the appropriate language phrase set according to their own situation,give the preference information of the weight of each key indicator,and then transform the multi-granularity language information through consistency.On this basis,the sequential optimization technology of the approximately ideal scheme is introduced to obtain the weight coefficient of each key indicator.Subsequently,the weighted average operator is used to aggregate the preference information of each alternative scheme with the relative importance of decision-makers and the weight of key indicators in sequence,and the comprehensive evaluation value of each scheme is obtained to determine the optimal scheme.Lastly,the effectiveness and practicability of the method are verified by taking the earthwork collapse accident in the construction of a reservoir as an example.
文摘In the developmental dilemma of artificial intelligence(AI)-assisted judicial decision-making,the technical architecture of AI determines its inherent lack of transparency and interpretability,which is challenging to fundamentally improve.This can be considered a true challenge in the realm of AI-assisted judicial decision-making.By examining the court’s acceptance,integration,and trade-offs of AI technology embedded in the judicial field,the exploration of potential conflicts,interactions,and even mutual shaping between the two will not only reshape their conceptual connotations and intellectual boundaries but also strengthen the cognition and re-interpretation of the basic principles and core values of the judicial trial system.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
基金This study was supported by the Science and Technology Innovation-Biomedical Supporting Program of Shanghai Science and Technology Committee(19441904400)Program for artificial intelligence innovation and development of Shanghai Municipal Commission of Economy and Informatization(2020-RGZN-02048).
文摘BACKGROUND:To promote the shared decision-making(SDM)between patients and doctors in pediatric outpatient departments,this study was designed to validate artificial intelligence(AI)-initiated medical tests for children with fever.METHODS:We designed an AI model,named Xiaoyi,to suggest necessary tests for a febrile child before visiting a pediatric outpatient clinic.We calculated the sensitivity,specificity,and F1 score to evaluate the efficacy of Xiaoyi’s recommendations.The patients were divided into the rejection and acceptance groups.Then we analyzed the rejected examination items in order to obtain the corresponding reasons.RESULTS:We recruited a total of 11,867 children with fever who had used Xiaoyi in outpatient clinics.The recommended examinations given by Xiaoyi for 10,636(89.6%)patients were qualified.The average F1 score reached 0.94.A total of 58.4%of the patients accepted Xiaoyi’s suggestions(acceptance group),and 41.6%refused(rejection group).Imaging examinations were rejected by most patients(46.7%).The tests being time-consuming were rejected by 2,133 patients(43.2%),including rejecting pathogen studies in 1,347 patients(68.5%)and image studies in 732 patients(31.8%).The difficulty of sampling was the main reason for rejecting routine tests(41.9%).CONCLUSION:Our model has high accuracy and acceptability in recommending medical tests to febrile pediatric patients,and is worth promoting in facilitating SDM.
基金supported by National Natural Science Foundation of China(Grant Nos.62162022 and 62162024)Young Talents’Science and Technology Innovation Project of Hainan Association for Science and Technology(Grant No.QCXM202007)Hainan Provincial Natural Science Foundation of China(Grant Nos.2019RC098 and 621RC612).
文摘As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.
基金supported by the National Key Research and Development Program of China(2016YFD0700605)the National Natural Science Foundation of China(51875151)Hefei Municipal Natural Science Foundation(2021029)。
文摘This paper presents an operational framework of unstructured decision-making approach involving quality function deployment(QFD)in an uncertain linguistic context.Firstly,QFD is extended to the multi-enterprise paradigm in a real-world manufacturing environment.Secondly,hesitant fuzzy linguistic term sets(HFLTSs),which facilitate the management and handling of information equivocality,are designed to construct a house of quality(HoQ)in the product planning process.The technique of computing with words is applied to bridge the gap between mechanisms of the human brain and machine processes with fuzzy linguistic term sets.Thirdly,a multi-enterprise QFD pattern is formulated as an unstructured decision-making problem for alternative infrastructure project selection in a manufacturing organization.The inter-relationships of cooperative partners are directly matched with a back propagation neural network(BPNN)to construct the multi-enterprise manufacturing network.The resilience of the manufacturing organization is considered by formulating an outranking method on the basis of HFLTSs to decide on infrastructure project alternatives.Finally,a real-world example,namely,the prototype manufacturing of an automatic transmission for a vehicle,is provided to illustrate the effectiveness of the proposed decision-making approach.
基金Supported by the National Natural Science Foundation of China(No.81771499)the Natural Science Foundation of Hebei Province,China(No.H2018206099,No.H2021206460)。
文摘AIM:To determine whether an antisense RNA corresponding to the human Alu transposable element(Aluas RNA)can protect human lens epithelial cells(HLECs)from methylglyoxal-induced apoptosis.METHODS:Cell counting kit-8(CCK-8)and 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide(MTT)assays were used to assess HLEC viability.HLEC viability/death was detected using a Calcein-AM/PI double staining kit;the annexin V-FITC method was used to detect HLEC apoptosis.The cytosolic reactive oxygen species(ROS)levels in HLECs were determined using a reactive species assay kit.The levels of malondialdehyde(MDA)and the antioxidant activities of total-superoxide dismutase(T-SOD)and glutathione peroxidase(GSH-Px)were assessed in HLECs using their respective kits.RT-q PCR and Western blotting were used to measure m RNA and protein expression levels of the genes.RESULTS:Aluas RNA rescued methylglyoxal-induced apoptosis in HLECs and ameliorated both the methylglyoxalinduced decrease in Bcl-2 m RNA and the methylglyoxalinduced increase in Bax m RNA.In addition,Aluas RNA inhibited the methylglyoxal-induced increase in Alu sense RNA expression.Aluas RNA inhibited the production of ROS induced by methylglyoxal,restored T-SOD and GSHPx activity,and moderated the increase in MDA content after treatment with methylglyoxal.Aluas RNA significantly restored the methylglyoxal-induced down-regulation of Nrf2 gene and antioxidant defense genes,including glutathione peroxidase,heme oxygenase 1,γ-glutamylcysteine synthetase and quinone oxidoreductase 1.Aluas RNA ameliorated methylglyoxal-induced increases of the m RNA and protein expression of Keap1 that is the negative regulator of Nrf2.CONCLUSION:Aluas RNA reduces apoptosis induced by methylglyoxal by enhancing antioxidant defense.
基金This work was supported by the Key Research and Development Program of Zhejiang Province(2021C02040)the National Natural Science Foundation of China(32172650,31902097)+1 种基金the Natural Science Foundation of Zhejiang Province(LR19C150001)the Starry Night Science Fund of Zhejiang University Shanghai Insti-tute for Advanced Study(SN-ZJU-SIAS-0011).
文摘The ubiquitous lipid-derived molecules N-acylethanolamines(NAEs)have multiple immune functions in mammals,but their roles and mechanisms in plant defense response during changing environment remain largely unclear.Here,we found that exogenous NAE18:0 and NAE18:2 promoted defense against the necrotrophic pathogen Botrytis cinerea but suppressed defense to the hemi-biotrophic pathogen Pseudomonas syringae pv.tomato(Pst)DC3000 in tomato.The knocking-down and overexpression function analysis of the pathogen-responsive NAE synthetic gene PHOSPHOLIPASE Dγ(PLDγ)and hydrolytic gene FATTY ACID AMID HYDROLASE 1(FAAH1)revealed that the NAE pathway is crucial for plant defense response.Using exogenous applications and SA-abolished NahG plants,we unveiled the antagonistic relationship between NAE and SA in plant defense response.Elevated CO_(2) and temperature significantly changed the NAE pathway in response to pathogens,while inhibition of the NAE pathway led to the alternation of environment-mediated defense variations against Pst DC3000 in tomato,indicating that NAE pathway is associated with plant defense variations in response to elevated CO_(2) and temperature.The results herein reveal a new function of NAE in plant defense,and its involvement in environment-mediated defense variation in tomato.These findings shed light on the NAE-based plant defense,which may have relevance to crop disease management in future changing climate.
基金Taif University,Taif,Saudi Arabia through Taif University Researchers Supporting Project Number(TURSP-2020/115).
文摘Neural networks play a significant role in the field of image classification.When an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the images.Researchers have demonstrated these attacks to make production self-driving cars misclassify StopRoad signs as 45 Miles Per Hour(MPH)road signs and a turtle being misclassified as AK47.Three primary types of defense approaches exist which can safeguard against such attacks i.e.,Gradient Masking,Robust Optimization,and Adversarial Example Detection.Very few approaches use Generative Adversarial Networks(GAN)for Defense against Adversarial Attacks.In this paper,we create a new approach to defend against adversarial attacks,dubbed Chained Dual-Generative Adversarial Network(CD-GAN)that tackles the defense against adversarial attacks by minimizing the perturbations of the adversarial image using iterative oversampling and undersampling using GANs.CD-GAN is created using two GANs,i.e.,CDGAN’s Sub-ResolutionGANandCDGAN’s Super-ResolutionGAN.The first is CDGAN’s Sub-Resolution GAN which takes the original resolution input image and oversamples it to generate a lower resolution neutralized image.The second is CDGAN’s Super-Resolution GAN which takes the output of the CDGAN’s Sub-Resolution and undersamples,it to generate the higher resolution image which removes any remaining perturbations.Chained Dual GAN is formed by chaining these two GANs together.Both of these GANs are trained independently.CDGAN’s Sub-Resolution GAN is trained using higher resolution adversarial images as inputs and lower resolution neutralized images as output image examples.Hence,this GAN downscales the image while removing adversarial attack noise.CDGAN’s Super-Resolution GAN is trained using lower resolution adversarial images as inputs and higher resolution neutralized images as output images.Because of this,it acts as an Upscaling GAN while removing the adversarial attak noise.Furthermore,CD-GAN has a modular design such that it can be prefixed to any existing classifier without any retraining or extra effort,and 2542 CMC,2023,vol.74,no.2 can defend any classifier model against adversarial attack.In this way,it is a Generalized Defense against adversarial attacks,capable of defending any classifier model against any attacks.This enables the user to directly integrate CD-GANwith an existing production deployed classifier smoothly.CD-GAN iteratively removes the adversarial noise using a multi-step approach in a modular approach.It performs comparably to the state of the arts with mean accuracy of 33.67 while using minimal compute resources in training.
基金funded by the Tecnológico Nacional de México(TECNM):Project No.6602.18-P.
文摘The objective to this work was to evaluate the enzymatic activity in the culture of Solanum lycopersicum L.infected with Fusarium oxysporum after the combined application of Beauveria bassiana and plant extracts.Solanum lycopersicum plantlets were transplanted 15 days after the emergency.Five days after transplanting,Beauveria bassiana spores were applied at a concentration of 1×10^(7)spores mL^(−1)onto soil(along with A.indica(N)and P.auritum(H)leaf extracts)where S.lycopersicum plants were planted.Eight days after transplanting,spores of F.oxysporum strain were applied at a concentration of 1×10^(6)spores mL^(−1)to soil where S.lycopersicum plants were growing.The development of S.lycopersicum plants was monitored for 114 days,whereby a randomized complete block treatment design was used,the roots of the plants were crushed with liquid nitrogen,after which UV/VIS spectrophotometry was used to determine protein concentration,as well as the activity ofβ-1,3-glucanases,peroxidases(POX,EC1.11.1.7),catalase and chitinases.The treatments combining B.bassiana and A.indica and P.auritum extracts,had a significant difference in enzymatic activity levels,thus contributing to better defense mechanisms and a greater protection to S.lycopersicum plants in the presence of F.oxysporum.The application of B.bassiana and plant extracts to the ground mitigated damage caused by F.oxysporum on S.lycopersicum plants.
基金supported by the National Natural Science Foundation of China(71771216).
文摘With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment(WTA)model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony(MOABC)algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance(IGD)index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space.