706 research outputs found

    A simple and efficient procedure for Knoevenagel reaction promoted by imidazolium-based ionic liquids

    Get PDF
    Various room temperature ionic liquids (RTILs), notably, 1-methoxyethyl-3-methylimidazolium trifluoroacetate [MeOEtMIM]+[CF3COO]ˉ , have been used to promote the Knoevenagel condensation to afford substituted olefins. All reactions proceeded effectively in the absence of any other catalysts or co-solvents with good to excellent yields. This method is simple and applicable to reactions involving a wide range of aldehydes and ketones with methylene compounds. The ionic liquid can be recycled without noticeable reduction of its catalytic activity. A plausible reaction mechanism is proposed

    Improved Ant Colony Optimization for Seafood Product Delivery Routing Problem

    Get PDF
    This paper deals with a real-life vehicle delivery routing problem, which is a seafood product delivery routing problem. Considering the features of the seafood product delivery routing problem, this paper formulated this problem as a multi-depot open vehicle routing problem. Since the multi-depot open vehicle routing problem is a very complex problem, a method is used to reduce the complexity of the problem by changing the multi-depot open vehicle routing problem into an open vehicle routing problem with a dummy central depot in this paper. Then, ant colony optimization is used to solve the problem. To improve the performance of the algorithm, crossover operation and some adaptive strategies are used. Finally, the computational results for the benchmark problems of the multi-depot vehicle routing problem indicate that the proposed ant colony optimization is an effective method to solve the multi-depot vehicle routing problem. Furthermore, the computation results of the seafood product delivery problem from Dalian, China also suggest that the proposed ant colony optimization is feasible to solve the seafood product delivery routing problem

    Measurement of the Usage of Web Clips in Underground Economy

    Full text link
    In this paper, we study the ecosystem of the abused Web Clips in underground economy. Through this study, we find the Web Clips is wildly used by perpetrators to penetrate iOS devices to gain profit. This work starts with 1,800 user complaint documents about cyber crimes over Web Clips. We firstly look into the ecosystem of abused Web Clips and point out the main participants and workflow. In addition, what is the Web Clips used for is demystified. Then the main participants, including creators, distributors, and operators are deeply studied based on our dataset. We try to reveal the prominent features of the illicit Web Clips and give some mitigation measures. Analysis reveals that 1) SSL certificate is overwhelmingly preferred for signing Web Clips instances compared with certificate issued by Apple. The wildly used SSL certificates can be aggregated into a limited group. 2) The content of the abused Web Clips falls into a few categories, `Gambling', `Fraud', and `Pornography' are among the top categories. 3) Instant messenger (IM) and live streaming platform are the most popular medium to trick victims into deploying the Web Clips. 4) The Web Clips are operated by a small amount of perpetrators, and the perpetrators tend to evade detection by taking technical approach, such as registering domain names through oversea domain name service provider, preferring easy-to-acquire new gTLD (global Top Level Domain), and deploying anti-crawler tricks. Our study gives hints on investigation of cyber crime over Web Clips, we hope that this work can help stakeholders to stay ahead of the threat

    Dynamical Variations of the Global COVID-19 Pandemic Based on a SEICR Disease Model: A New Approach of Yi Hua Jie Mu

    Get PDF
    The ongoing coronavirus disease 2019 (COVID-19) pandemic has caused more than 150 million cases of infection to date and poses a serious threat to global public health. In this study, global COVID-19 data were used to examine the dynamical variations from the perspectives of immunity and contact of 84 countries across the five climate regions: tropical, arid, temperate, and cold. A new approach named Yi Hua Jie Mu is proposed to obtain the transmission rates based on the COVID-19 data between the countries with the same climate region over the Northern Hemisphere and Southern Hemisphere. Our results suggest that the COVID-19 pandemic will persist over a long period of time or enter into regular circulation in multiple periods of 1–2 years. Moreover, based on the simulated results by the COVID-19 data, it is found that the temperate and cold climate regions have higher infection rates than the tropical and arid climate regions, which indicates that climate may modulate the transmission of COVID-19. The role of the climate on the COVID-19 variations should be concluded with more data and more cautions. The non-pharmaceutical interventions still play the key role in controlling and prevention this global pandemic

    Elucidation of the mechanisms and molecular targets of Yiqi Shexue formula for treatment of primary immune thrombocytopenia based on network pharmacology

    Get PDF
    Yiqi Shexue formula (YQSX) is traditionally used to treat primary immune thrombocytopenia (ITP) in clinical practice of traditional Chinese medicine. However, its mechanisms of action and molecular targets for treatment of ITP are not clear. The active compounds of YQSX were collected and their targets were identified. ITP-related targets were obtained by analyzing the differential expressed genes between ITP patients and healthy individuals. Protein-protein interaction (PPI) data were then obtained and PPI networks of YQSX putative targets and ITP-related targets were visualized and merged to identify the candidate targets for YQSX against ITP. Gene ontology and Kyoto Encyclopedia of Genes and Genomes pathway analysis were carried out. The gene-pathway network was constructed to screen the key target genes. In total, 177 active compounds and 251 targets of YQSX were identified. Two hundred and thirty differential expressed genes with an P value 1 were identified between ITP patient and control groups. One hundred and eighty-three target genes associated with ITP were finally identified. The functional annotations of target genes were found to be related to transcription, cytosol, protein binding, and so on. Twenty-four pathways including cell cycle, estrogen signaling pathway, and MAPK signaling pathway were significantly enriched. MDM2 was the core gene and other several genes including TP53, MAPK1, CDKN1A, MYC, and DDX5 were the key gens in the gene-pathway network of YQSX for treatment of ITP. The results indicated that YQSX's effects against ITP may relate to regulation of immunological function through the specific biological processes and the related pathways. This study demonstrates the application of network pharmacology in evaluating mechanisms of action and molecular targets of complex herbal formulations

    Masked Language Model Based Textual Adversarial Example Detection

    Full text link
    Adversarial attacks are a serious threat to the reliable deployment of machine learning models in safety-critical applications. They can misguide current models to predict incorrectly by slightly modifying the inputs. Recently, substantial work has shown that adversarial examples tend to deviate from the underlying data manifold of normal examples, whereas pre-trained masked language models can fit the manifold of normal NLP data. To explore how to use the masked language model in adversarial detection, we propose a novel textual adversarial example detection method, namely Masked Language Model-based Detection (MLMD), which can produce clearly distinguishable signals between normal examples and adversarial examples by exploring the changes in manifolds induced by the masked language model. MLMD features a plug and play usage (i.e., no need to retrain the victim model) for adversarial defense and it is agnostic to classification tasks, victim model's architectures, and to-be-defended attack methods. We evaluate MLMD on various benchmark textual datasets, widely studied machine learning models, and state-of-the-art (SOTA) adversarial attacks (in total 344=483*4*4 = 48 settings). Experimental results show that MLMD can achieve strong performance, with detection accuracy up to 0.984, 0.967, and 0.901 on AG-NEWS, IMDB, and SST-2 datasets, respectively. Additionally, MLMD is superior, or at least comparable to, the SOTA detection defenses in detection accuracy and F1 score. Among many defenses based on the off-manifold assumption of adversarial examples, this work offers a new angle for capturing the manifold change. The code for this work is openly accessible at \url{https://github.com/mlmddetection/MLMDdetection}.Comment: 13 pages,3 figure

    A Novel Assembly Line Scheduling Algorithm Based on CE-PSO

    Get PDF
    With the widespread application of assembly line in enterprises, assembly line scheduling is an important problem in the production since it directly affects the productivity of the whole manufacturing system. The mathematical model of assembly line scheduling problem is put forward and key data are confirmed. A double objective optimization model based on equipment utilization and delivery time loss is built, and optimization solution strategy is described. Based on the idea of solution strategy, assembly line scheduling algorithm based on CE-PSO is proposed to overcome the shortcomings of the standard PSO. Through the simulation experiments of two examples, the validity of the assembly line scheduling algorithm based on CE-PSO is proved

    Laser Pulse Bidirectional Reflectance from CALIPSO Mission

    Get PDF
    In this Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation (CALIPSO) study, we present a simple way of determining laser pulse bidirectional reflectance over snow/ice surface using the Cloud-Aerosol LIdar with Orthogonal Polarization (CALIOP) 532 nanometer polarization channels' measurements. The saturated laser pulse returns from snow and ice surfaces are recovered based on surface tail information. The method overview and initial assessment of the method performance will be presented. The retrieved snow surface bidirectional reflectance is compared with reflectance from both CALIOP cloud cover regions and Moderate Resolution Imaging Spectroradiometer (Earth Observing System (EOS)) (MODIS) Bi-directional Reflectance Distribution Function (BRDF) / Albedo model parameters. The comparisons show that the snow surface bidirectional reflectance over Antarctica for saturation region are generally reliable with a mean value of about 0.90 plus or minus 0.10, while the mean surface reflectance from cloud cover region is about 0.84 plus or minus 0.13 and the calculated MODIS reflectance at 555 nanometers from the BRDF / Albedo model with near nadir illumination and viewing angles is about 0.96 plus or minus 0.04. The comparisons here demonstrate that the snow surface reflectance underneath the cloud with cloud optical depth of about 1 is significantly lower than that for a clear sky condition
    corecore