106 research outputs found

    Development of Tannic acid/Al (III) Nanoparticles for Controlled Release of Liraglutide: Preparation and In Vivo Evaluation

    Get PDF
    Liraglutide is a GLP-1 agonist recently approved for treating Type-II diabetes. Its clinical application for treating Type II diabetes has been very limited due to its short half-life time of around 13 h. In this study, we developed a ternary component nanoparticle platform of liraglutide/tannic acid/Al3+ for sustained release of liraglutide, where tannic acid and liraglutide form complexes and Al3+ served as an additional crosslinking agent. Liraglutide was encapsulated with a high efficiency (98%) and size uniformity of nanoparticles with a z-average size of 55 nm and a PDI of 0.16 using flash nanocomplexation (FNC) method. This method enables the turbulent mixing that prevented the aggregation of nanoparticles during the preparation. The optimized nanoparticles showed a sustained release profile for 7 days in vitro and 6 days in vivo following intraperitoneal injection; and it was capable of suppressing the glucose level of T2D mice under 50% of original level for 84 hours. Notably, by controlling the amount of tannic acid incorporated in the nanoparticles, the release behavior was tunable and led to significant difference of treatment outcomes in T2D mice. The scalable production capability of this manufacturing process and tunable release profile render these liraglutide/tannic acid/Al3+ ternary nanoparticles a promising system in future clinical translation

    DRL-RNP: deep reinforcement learning-based optimized RNP flight procedure execution.

    Get PDF
    The required navigation performance (RNP) procedure is one of the two basic navigation specifications for the performance-based navigation (PBN) procedure as proposed by the International Civil Aviation Organization (ICAO) through an integration of the global navigation infrastructures to improve the utilization efficiency of airspace and reduce flight delays and the dependence on ground navigation facilities. The approach stage is one of the most important and difficult stages in the whole flying. In this study, we proposed deep reinforcement learning (DRL)-based RNP procedure execution, DRL-RNP. By conducting an RNP approach procedure, the DRL algorithm was implemented, using a fixed-wing aircraft to explore a path of minimum fuel consumption with reward under windy conditions in compliance with the RNP safety specifications. The experimental results have demonstrated that the six degrees of freedom aircraft controlled by the DRL algorithm can successfully complete the RNP procedure whilst meeting the safety specifications for protection areas and obstruction clearance altitude in the whole procedure. In addition, the potential path with minimum fuel consumption can be explored effectively. Hence, the DRL method can be used not only to implement the RNP procedure with a simulated aircraft but also to help the verification and evaluation of the RNP procedure

    Exposing image forgery by detecting traces of feather operation

    Get PDF
    Powerful digital image editing tools make it very easy to produce a perfect image forgery. The feather operation is necessary when tampering an image by copy–paste operation because it can help the boundary of pasted object to blend smoothly and unobtrusively with its surroundings. We propose a blind technique capable of detecting traces of feather operation to expose image forgeries. We model the feather operation, and the pixels of feather region will present similarity in their gradient phase angle and feather radius. An effectual scheme is designed to estimate each feather region pixel׳s gradient phase angle and feather radius, and the pixel׳s similarity to its neighbor pixels is defined and used to distinguish the feathered pixels from un-feathered pixels. The degree of image credibility is defined, and it is more acceptable to evaluate the reality of one image than just using a decision of YES or NO. Results of experiments on several forgeries demonstrate the effectiveness of the technique

    Mobile Platform for livestock monitoring and inspection.

    Get PDF
    Livestock keepers acquire and manage information (e.g. identification numbers, images, etc.) about livestock to identify and keep track of livestock using systems with capabilities to extract such information. Examples of such systems are Radio Frequency Identification (RFID) systems which are used to collect and transmit livestock's information to host devices. Sophisticated RFID readers are very expensive, and more functional than the cheap ones whose use are mostly limited to reading and transmission of tag IDs. Cross-platform mobile applications will allow monitoring of livestock irrespective of the platform on which mobile devices are being operated. Farmers' secured access to records via web services is not limited to a device as they can login on any mobile device with the installed application. In this work, a mobile platform which consists of a cross-platform mobile application, webservice and database is developed to cost-effectively manage and exploit records of livestock acquired using a cheap RFID reader. The mobile application was developed using a Xamarin form framework. The programming language and development environment used are C# and Visual studio respectively. Records of livestock were acquired, posted, updated, deleted and retrieved from the database via a web service. Additional advantages offer by the solution implemented include, exporting of animals’ records via email and SMS, viewing of animal's record by scanning their tags or QR code of animals' passports, and login system to sign users in and out of the application. Development of RFID readers with sensors to acquire health-related parameters for health monitoring is recommended

    Fusion of block and keypoints based approaches for effective copy-move image forgery detection

    Get PDF
    Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency

    An unsupervised domain adaptation method towards multi-level features and decision boundaries for cross-scene hyperspectral image classification.

    Get PDF
    Despite success in the same-scene hyperspectral image classification (HSIC), for the cross-scene classification, samples between source and target scenes are not drawn from the independent and identical distribution, resulting in significant performance degradation. To tackle this issue, a novel unsupervised domain adaptation (UDA) framework toward multilevel features and decision boundaries (ToMF-B) is proposed for the cross-scene HSIC, which can align task-related features and learn task-specific decision boundaries in parallel. Based on the maximum classifier discrepancy, a two-stage alignment scheme is proposed to bridge the interdomain gap and generate discriminative decision boundaries. In addition, to fully learn task-related and domain-confusing features, a convolutional neural network (CNN) and Transformer-based multilevel features extractor (generator) is developed to enrich the feature representation of two domains. Furthermore, to alleviate the harm even the negative transfer to UDA caused by task-irrelevant features, a task-oriented feature decomposition method is leveraged to enhance the task-related features while suppressing task-irrelevant features, and enabling the aligned domain-invariant features can be contributed to the classification task explicitly. Extensive experiments on three cross-scene HSI benchmarks have validated the effectiveness of the proposed framework

    Cryptanalysis of optical ciphers integrating double random phase encoding with permutation

    Full text link
    This paper presents the cryptanalysis of optical ciphers combining double random phase encoding with permutation techniques, and shows its vulnerability against plaintext attack regardless of the implementation order of the two procedures. The equivalent secret keys of both the combination fashions can be retrieved, instead of the recovery of random phase masks and permutation matrix. Numerical simulations are also given for validation

    Insights into the vertical stratification of microbial ecological roles across the deepest seawater column on Earth

    Get PDF
    The Earth’s oceans are a huge body of water with physicochemical properties and microbial community profiles that change with depth, which in turn influences their biogeochemical cycling potential. The differences between microbial communities and their functional potential in surface to hadopelagic water samples are only beginning to be explored. Here, we used metagenomics to investigate the microbial communities and their potential to drive biogeochemical cycling in seven different water layers down the vertical profile of the Challenger Deep (0–10,500 m) in the Mariana Trench, the deepest natural point in the Earth’s oceans. We recovered 726 metagenome-assembled genomes (MAGs) affiliated to 27 phyla. Overall, biodiversity increased in line with increased depth. In addition, the genome size of MAGs at ≥4000 m layers was slightly larger compared to those at 0–2000 m. As expected, surface waters were the main source of primary production, predominantly from Cyanobacteria. Intriguingly, microbes conducting an unusual form of nitrogen metabolism were identified in the deepest waters (>10,000 m), as demonstrated by an enrichment of genes encoding proteins involved in dissimilatory nitrate to ammonia conversion (DNRA), nitrogen fixation and urea transport. These likely facilitate the survival of ammonia-oxidizing archaea α lineage, which are typically present in environments with a high ammonia concentration. In addition, the microbial potential for oxidative phosphorylation and the glyoxylate shunt was enhanced in >10,000 m waters. This study provides novel insights into how microbial communities and their genetic potential for biogeochemical cycling differs through the Challenger deep water column, and into the unique adaptive lifestyle of microbes in the Earth’s deepest seawater

    Potential of Core-Collapse Supernova Neutrino Detection at JUNO

    Get PDF
    JUNO is an underground neutrino observatory under construction in Jiangmen, China. It uses 20kton liquid scintillator as target, which enables it to detect supernova burst neutrinos of a large statistics for the next galactic core-collapse supernova (CCSN) and also pre-supernova neutrinos from the nearby CCSN progenitors. All flavors of supernova burst neutrinos can be detected by JUNO via several interaction channels, including inverse beta decay, elastic scattering on electron and proton, interactions on C12 nuclei, etc. This retains the possibility for JUNO to reconstruct the energy spectra of supernova burst neutrinos of all flavors. The real time monitoring systems based on FPGA and DAQ are under development in JUNO, which allow prompt alert and trigger-less data acquisition of CCSN events. The alert performances of both monitoring systems have been thoroughly studied using simulations. Moreover, once a CCSN is tagged, the system can give fast characterizations, such as directionality and light curve

    Detection of the Diffuse Supernova Neutrino Background with JUNO

    Get PDF
    As an underground multi-purpose neutrino detector with 20 kton liquid scintillator, Jiangmen Underground Neutrino Observatory (JUNO) is competitive with and complementary to the water-Cherenkov detectors on the search for the diffuse supernova neutrino background (DSNB). Typical supernova models predict 2-4 events per year within the optimal observation window in the JUNO detector. The dominant background is from the neutral-current (NC) interaction of atmospheric neutrinos with 12C nuclei, which surpasses the DSNB by more than one order of magnitude. We evaluated the systematic uncertainty of NC background from the spread of a variety of data-driven models and further developed a method to determine NC background within 15\% with {\it{in}} {\it{situ}} measurements after ten years of running. Besides, the NC-like backgrounds can be effectively suppressed by the intrinsic pulse-shape discrimination (PSD) capabilities of liquid scintillators. In this talk, I will present in detail the improvements on NC background uncertainty evaluation, PSD discriminator development, and finally, the potential of DSNB sensitivity in JUNO
    • …
    corecore