Of 27 amino acids studied, most had some antioxidant activity when added in aqueous solution to either safflower oil or a mixture of sunflower and cottonseed oil (active oxygen and storage methods). Cysteine-HCl, glutamic acid-HCl (in the mixture), and glutamic acid-HCl (in safflower oil) behaved as prooxidants. When added as a solid, most amino acids were ineffective. The protection factors of these amino acids were less than 1.3 in safflower oil with methionine, proline, lysine and cysteine providing the highest activ-ity. In the oil mixture (which had a higher metal content) lysine, arginine, glutamic acid, methionine, and hydroxyproline were anti-oxidant with protection factors of up to 1.85. Chelation of metals by amino acids was presumably responsible for the antioxidant activity. The increase in cysteine concentration up to 1% has more than doubled the protection factor in Bint oil (compared with the 0.01% level), whereas with some other amino acids the increase was either small or slight. 相似文献
The assignment and scheduling problem is inherently multiobjective. It generally involves multiple conflicting objectives and large and highly complex search spaces. The problem allows the determination of an efficient allocation of a set of limited and shared resources to perform tasks, and an efficient arrangement scheme of a set of tasks over time, while fulfilling spatiotemporal constraints. The main objective is to minimize the project makespan as well as the total cost. Finding a good approximation set is the result of trade‐offs between diversity of solutions and convergence toward the Pareto‐optimal front. It is difficult to achieve such a balance with NP‐hard problems. In this respect, and in order to efficiently explore the search space, a hybrid bidirectional ant‐based approach is proposed in this paper, which is an improvement of a bi‐colony ant‐based approach. Its main characteristic is that it combines a solution construction developed for a more complicated problem with a Pareto‐guided local search engine. 相似文献
Developing new watermarking approaches that consider special features of medical images become increasingly necessary. This paper proposes a new watermarking approach to ensure medical images authenticity, using MinEigen value features, chaotic sequence, and Quantization Index Modulation (QIM) in the spatial domain. The idea is to choose the 3?×?3 non overlapping blocks around MinEigen values points, then embed the watermark bits in these blocks using a novel blind way based on chaotic sequence and QIM. The proposed technique is purely blind and fast in terms of execution time. Experimental results demonstrate that the proposed approach is robust against all DICOM JPEG compression attacks while keeping high imperceptibility.
Automated techniques for Arabic content recognition are at a beginning period contrasted with their partners for the Latin and Chinese contents recognition. There is a bulk of handwritten Arabic archives available in libraries, data centers, historical centers, and workplaces. Digitization of these documents facilitates (1) to preserve and transfer the country’s history electronically, (2) to save the physical storage space, (3) to proper handling of the documents, and (4) to enhance the retrieval of information through the Internet and other mediums. Arabic handwritten character recognition (AHCR) systems face several challenges including the unlimited variations in human handwriting and the leakage of large and public databases. In the current study, the segmentation and recognition phases are addressed. The text segmentation challenges and a set of solutions for each challenge are presented. The convolutional neural network (CNN), deep learning approach, is used in the recognition phase. The usage of CNN leads to significant improvements across different machine learning classification algorithms. It facilitates the automatic feature extraction of images. 14 different native CNN architectures are proposed after a set of try-and-error trials. They are trained and tested on the HMBD database that contains 54,115 of the handwritten Arabic characters. Experiments are performed on the native CNN architectures and the best-reported testing accuracy is 91.96%. A transfer learning (TF) and genetic algorithm (GA) approach named “HMB-AHCR-DLGA” is suggested to optimize the training parameters and hyperparameters in the recognition phase. The pre-trained CNN models (VGG16, VGG19, and MobileNetV2) are used in the later approach. Five optimization experiments are performed and the best combinations are reported. The highest reported testing accuracy is 92.88%.
Highly porous free-standing co-poly(vinylidene fluoride)/modacrylic/SiO2 nanofibrous membrane was developed using electrically-assisted solution blow spinning method. The performance and the potential of the membrane as a lithium-ion battery separator were investigated. The addition of modacrylic enhanced the solution spinnability that resulted in defect-free membranes. Moreover, the presence of modacrylic enhanced the dimensional and thermal stabilities, while the addition of hydrophilic SiO2 nanoparticle enhanced both mechanical property and ionic conductivity. Combustion test results illustrated that the presence of modacrylic provide flame retarding property over a set of different polymeric-based membranes. Electrochemical performance results showed that the developed membrane can increase the battery capacity compared with the commercial separator. 相似文献
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.
Wireless Personal Communications - In this paper, we propose a new reputation approach, called I-WD (improved WatchDog). We attempt to eliminate selective dropping attack that ensue when malicious... 相似文献
Quality of service (QoS) provisioning generally assumes more than one QoS measure that implies that QoS routing can be categorized
as an instance of routing subject to multiple constraints: delay jitter, bandwidth, cost, etc. We study the problem of constructing
multicast trees to meet the QoS requirements of real-time interactive applications where it is necessary to provide bounded
delays and bounded delay variation among the source and all destinations while keeping overall cost of the multicast tree
low. The main contribution of our work is a new strategy for constructing multiconstrained multicast trees. We first derive
mathematically a new delay-variation estimation scheme and prove its efficiency. Thereafter, we propose a simple and competitive
(in terms of running time) heuristic algorithm, for delay and delay variation constrained routing problem based on the proposed
delay-variation estimation scheme and using the Extended Prim-Dijkstra tradeoffs’ algorithm. Our contribution also extends
previous works in providing some properties and analyses of delay bounded paths satisfying delay variation constraints. Extensive
simulation results show that our algorithm outperforms DVDMR in terms of multicast delay variation with the same time complexity
as DVDMR. 相似文献
We present two new classifiers for two-class classification problems using a new Beta-SVM kernel transformation and an iterative
algorithm to concurrently select the support vectors for a support vector machine (SVM) and the hidden units for a single
hidden layer neural network to achieve a better generalization performance. To construct the classifiers, the contributing
data points are chosen on the basis of a thresholding scheme of the outputs of a single perceptron trained using all training
data samples. The chosen support vectors are used to construct a new SVM classifier that we call Beta-SVN. The number of chosen
support vectors is used to determine the structure of the hidden layer in a single hidden layer neural network that we call
Beta-NN. The Beta-SVN and Beta-NN structures produced by our method outperformed other commonly used classifiers when tested
on a 2-dimensional non-linearly separable data set. 相似文献
Crisp input and output data are fundamentally indispensable in traditional data envelopment analysis (DEA). However, the input and output data in real-world problems are often imprecise or ambiguous. Some researchers have proposed interval DEA (IDEA) and fuzzy DEA (FDEA) to deal with imprecise and ambiguous data in DEA. Nevertheless, many real-life problems use linguistic data that cannot be used as interval data and a large number of input variables in fuzzy logic could result in a significant number of rules that are needed to specify a dynamic model. In this paper, we propose an adaptation of the standard DEA under conditions of uncertainty. The proposed approach is based on a robust optimization model in which the input and output parameters are constrained to be within an uncertainty set with additional constraints based on the worst case solution with respect to the uncertainty set. Our robust DEA (RDEA) model seeks to maximize efficiency (similar to standard DEA) but under the assumption of a worst case efficiency defied by the uncertainty set and it’s supporting constraint. A Monte-Carlo simulation is used to compute the conformity of the rankings in the RDEA model. The contribution of this paper is fourfold: (1) we consider ambiguous, uncertain and imprecise input and output data in DEA; (2) we address the gap in the imprecise DEA literature for problems not suitable or difficult to model with interval or fuzzy representations; (3) we propose a robust optimization model in which the input and output parameters are constrained to be within an uncertainty set with additional constraints based on the worst case solution with respect to the uncertainty set; and (4) we use Monte-Carlo simulation to specify a range of Gamma in which the rankings of the DMUs occur with high probability. 相似文献