169 research outputs found

    Towards practicalization of blockchain-based decentralized applications

    Get PDF
    Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main functionalities. Among them, the IoT and CSM applications involve the design of blockchain-based robust storage and management while the P2P CDN requires reliable computation. Such general design principles derived from disparate application scenarios have the potential to realize practicalization of many other blockchain-enabled decentralized applications. In the IoT application, blockchain-based decentralized data management is capable of handling faulty nodes, as designed in the cybersecurity application. But an important issue lies in the interaction between external network and blockchain network, i.e., external clients must rely on a relay node to communicate with the full nodes in the blockchain. Compromization of such relay nodes may result in a security breach and even a blockage of IoT sensors from the network. Therefore, a censorship-resistant blockchain-based decentralized IoT management system is proposed. Experimental results from proof-of-concept implementation and deployment in a real distributed environment show the feasibility and effectiveness in achieving censorship resistance. The CSM application incorporates blockchain to provide robust storage of historical cybersecurity data so that with a certain level of cyber intelligence, a defender can determine if a network has been compromised and to what extent. The CSM functions can be categorized into three classes: Network-centric (N-CSM), Tools-centric (T-CSM) and Application-centric (A-CSM). The cyber intelligence identifies new attackers, victims, or defense capabilities. Moreover, a decentralized storage network (DSN) is integrated to reduce on-chain storage costs without undermining its robustness. Experiments with the prototype implementation and real-world cyber datasets show that the blockchain-based CSM solution is effective and efficient. The P2P CDN application explores and utilizes the functionality of reliable computation that blockchain empowers. Particularly, P2P CDN is promising to provide benefits including cost-saving and scalable peak-demand handling compared with centralized CDNs. However, reliable P2P delivery requires proper enforcement of delivery fairness. Unfortunately, most existing studies on delivery fairness are based on non-cooperative game-theoretic assumptions that are arguably unrealistic in the ad-hoc P2P setting. To address this issue, an expressive security requirement for desired fair P2P content delivery is defined and two efficient approaches based on blockchain for P2P downloading and P2P streaming are proposed. The proposed system guarantees the fairness for each party even when all others collude to arbitrarily misbehave and achieves asymptotically optimal on-chain costs and optimal delivery communication

    External characteristic analysis and stator parameter optimization for a torque converter

    Get PDF
    The performance of a flattened hydraulic torque converter is optimized with orthogonal experiment and response surface method, considering parameters of its stator blade, defined with nonuniform rotational B-splines. The optimization model, with maximum of the stalling torque ratio as an objective, is determined through an external characteristic statistical analysis under the new European Driving Cycle condition. The optimization results show that the stall torque ratio is increased by 10.83%, while the highest efficiency is above 84%

    Dynamic changes in enzyme activities and phenolic content during in vitro rooting of tree peony (Paeonia suffruticosa Andr.) plantlets

    Get PDF
    The dynamic changes of phenolic content and peroxidase (POD), polyphenol oxidase (PPO), indole-3-acetic acid oxidase (IAAO) and phenylalanine ammonia lyase (PAL) activities were assessed during the in vitro rooting process of three cultivars of tree peony (Paeonia suffruticosa Andr.). These changes in enzyme-related activity and phenolic content__observed at the level of the whole plant__differed during the first 20 days of the rooting process in easy-to-root ‘Feng Dan Bai’ cultivar and difficult-to-root ‘Wu Long Peng Sheng’ and ‘Tai Ping Hong’ cultivars, and in most cases they were actually opposite. The ease with which ‘Feng Dan Bai’ was able to root was closely related to the activity of all four enzymes (POD, PPO, IAAO, PAL) as well as to the phenolic content

    Knowledge Restore and Transfer for Multi-label Class-Incremental Learning

    Full text link
    Current class-incremental learning research mainly focuses on single-label classification tasks while multi-label class-incremental learning (MLCIL) with more practical application scenarios is rarely studied. Although there have been many anti-forgetting methods to solve the problem of catastrophic forgetting in class-incremental learning, these methods have difficulty in solving the MLCIL problem due to label absence and information dilution. In this paper, we propose a knowledge restore and transfer (KRT) framework for MLCIL, which includes a dynamic pseudo-label (DPL) module to restore the old class knowledge and an incremental cross-attention(ICA) module to save session-specific knowledge and transfer old class knowledge to the new model sufficiently. Besides, we propose a token loss to jointly optimize the incremental cross-attention module. Experimental results on MS-COCO and PASCAL VOC datasets demonstrate the effectiveness of our method for improving recognition performance and mitigating forgetting on multi-label class-incremental learning tasks

    Microalgal diversity enhances water purification efficiency in experimental microcosms

    Get PDF
    The losses of biodiversity have impaired functioning and provision of ecosystem services, and the relationship between biodiversity and ecosystem functioning has emerged as a central issue in environmental sciences. However, the majority of relevant studies are conducted in terrestrial ecosystems, and they focus predominantly on the relationship between community diversity and biomass production of terrestrial vegetation. At present, water eutrophication represents an increasingly serious problem worldwide, and the use of aquatic organisms for improving water quality represents a promising approach. However, more focus is placed on the selection of certain aquatic organisms with good performance, but neglects the effects of biodiversity in the process of water purification and the underlying mechanisms. In the present study, five microalgal species commonly found in freshwater ecosystems were used to assembly experimental microcosms with varying microalgal richness and composition. We analyzed the relationship between microalgal diversity and nitrogen removal efficiency based on mixed-effect models, and further explored the underlying mechanism of microalgal diversity in the process of water quality improvement. The results showed that with an increase in microalgal diversity, nitrogen removal efficiency of microalgal communities also increased. A further analysis of the impacts of microalgal diversity showed that the complementarity effect increased while the selection effect decreased with an increase in microalgal diversity. Meanwhile, there was a significantly positive relationship between microalgal diversity and the total abundance of microalgae. On the one hand, the present study clearly demonstrates two positive diversity-ecosystem functioning relationships. On the other hand, the present study also reveals the underlying mechanism by which microalgal diversity influences nitrogen removal efficiency, namely, high-diversity microalgal communities could use limiting nutrients such as nitrogen in a more efficient and complementary manner (e.g., stronger complementarity effect in high-diversity communities), convert them into higher aggregate community properties (e.g., higher total abundance of microalge in high-diversity communities), and thus exhibit higher purification capacity (e.g., higher nitrogen removal efficiency in high-diversity communities). Under the scenario that global ecosystems are experiencing high rates of anthropogenic nutrient inputs, the use of diverse microalgal species with proper management may help provide a promising approach for improving water quality

    Exposing Fine-Grained Adversarial Vulnerability of Face Anti-Spoofing Models

    Full text link
    Face anti-spoofing aims to discriminate the spoofing face images (e.g., printed photos) from live ones. However, adversarial examples greatly challenge its credibility, where adding some perturbation noise can easily change the predictions. Previous works conducted adversarial attack methods to evaluate the face anti-spoofing performance without any fine-grained analysis that which model architecture or auxiliary feature is vulnerable to the adversary. To handle this problem, we propose a novel framework to expose the fine-grained adversarial vulnerability of the face anti-spoofing models, which consists of a multitask module and a semantic feature augmentation (SFA) module. The multitask module can obtain different semantic features for further evaluation, but only attacking these semantic features fails to reflect the discrimination-related vulnerability. We then design the SFA module to introduce the data distribution prior for more discrimination-related gradient directions for generating adversarial examples. Comprehensive experiments show that SFA module increases the attack success rate by nearly 40%\% on average. We conduct this fine-grained adversarial analysis on different annotations, geometric maps, and backbone networks (e.g., Resnet network). These fine-grained adversarial examples can be used for selecting robust backbone networks and auxiliary features. They also can be used for adversarial training, which makes it practical to further improve the accuracy and robustness of the face anti-spoofing models.Comment: Accepted by IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshop, 202

    The Hidden Treasure in Apical Papilla: The Potential Role in Pulp/Dentin Regeneration and BioRoot Engineering

    Get PDF
    Some clinical case reports have shown that immature permanent teeth with periradicular periodontitis or abscess can undergo apexogenesis after conservative endodontic treatment. A call for a paradigm shift and new protocol for the clinical management of these cases has been brought to attention. Concomitantly, a new population of mesenchymal stem cells residing in the apical papilla of permanent immature teeth recently has been discovered and was termed stem cells from the apical papilla (SCAP). These stem cells appear to be the source of odontoblasts that are responsible for the formation of root dentin. Conservation of these stem cells when treating immature teeth may allow continuous formation of the root to completion. This article reviews current findings on the isolation and characterization of these stem cells. The potential role of these stem cells in the following respects will be discussed: (1) their contribution in continued root maturation in endodontically treated immature teeth with periradicular periodontitis or abscess and (2) their potential utilization for pulp/dentin regeneration and bioroot engineering
    corecore