815 research outputs found

    Interactions between dietary chicory, gut microbiota and immune responses

    Get PDF
    This thesis provides a better understanding of interactions between diet, gut microbiota, and immune responses to a specific dietary fiber source, chicory (Cichorium intybus L). This was achieved by examining the impact of chicory fiber on animal performance, digestibility, gut development, commensal bacteria community structure in small and large intestine, and follow-up reactions with specific immune components, cytoprotective heat shock protein (HSP) 27 and 72, in vivo and in vitro. The impacts of dietary chicory on nutrient utilization, performance, and gut environment and morphology were investigated in chickens and young pigs. One-day-old chicks were fed cereal-based diets with inclusion of 60 or 120 g/kg chicory forage and/or root, with each forage diet derived from two harvests. Growing pigs were fed diets without and with inclusion of 80 or 160 g/kg chicory forage and/or root. The results showed that chicory inclusion maintained good animal performance and was accompanied by changes in gut morphology. Total tract apparent digestibility of non-starch polysaccharides (NSP) and uronic acid in broilers decreased with inclusion of 120 g/kg chicory, but not with inclusion of 60 g/kg. This indicates that chicory can be used as a palatable fiber source for broiler chickens and young pigs. Gut microbiota complexity and dietary NSP-induced changes in pigs were examined using terminal restriction fragment length polymorphism (T-RFLP). The analysis revealed four primary microbiota clusters: luminal and mucosal ileal microbiota and luminal and mucosal colonic microbiota. In the ileum, lactic acid bacteria (LAB) were dominant and responsive to inulin-type fructan. In the colon, bacteria belonging to clostridial cluster IV and XIVa responded to chicory pectin, whereas Prevotella was related to cereal xylan. Mapping of cytoprotective HSP27 and HSP72 occurrence in porcine gut revealed region- and cell type-specific features. Physiological expression of HSP72 was correlated with LAB, representing an important interplay between HSPs and commensal microbes. In-depth studies of interactions between lactobacilli and gut mucosa and their effects on barrier function and HSP expression revealed protective effects from lactobacilli by enhancing HSP and tight junction protein expression under pathogen challenge

    Solar Tracker

    Get PDF
    The purpose of this project is to find how to maximize the amount of time that the solar panels receive direct sunlight or the nearest possible sunlight angles. The solar tracker is a device that can change the position of solar panels in both vertical and horizontal direction to increase solar energy absorption. The device uses a gear motor to drive the shaft that is fixed to the solar panel, so the solar panel can rotate in vertical direction. Based on the vertical sun position in Ellensburg, 85o E in the morning, 180o S in the noon, and 276o W in the evening. The motor, which is controlled by Arduino control chip will change the position of solar panel with a fixed angle to increase to amount of time solar panel faces direct sunlight. At the end of the day, Arduino control chip will control the motor to drive the solar panel back to the original position that will face the incoming morning sunlight for next day. Moreover, the horizontal direction of the solar panel faces have to change by hand since it only change a small angle each month. The testing result showed the panel to be perpendicular (90o) to incoming sunlight, with 2o deviation. This device increased the energy absorption by 20%

    NetSentry: A deep learning approach to detecting incipient large-scale network attacks

    Get PDF
    Machine Learning (ML) techniques are increasingly adopted to tackle ever-evolving high-profile network attacks, including DDoS, botnet, and ransomware, due to their unique ability to extract complex patterns hidden in data streams. These approaches are however routinely validated with data collected in the same environment, and their performance degrades when deployed in different network topologies and/or applied on previously unseen traffic, as we uncover. This suggests malicious/benign behaviors are largely learned superficially and ML-based Network Intrusion Detection System (NIDS) need revisiting, to be effective in practice. In this paper we dive into the mechanics of large-scale network attacks, with a view to understanding how to use ML for Network Intrusion Detection (NID) in a principled way. We reveal that, although cyberattacks vary significantly in terms of payloads, vectors and targets, their early stages, which are critical to successful attack outcomes, share many similarities and exhibit important temporal correlations. Therefore, we treat NID as a time-sensitive task and propose NetSentry, perhaps the first of its kind NIDS that builds on Bidirectional Asymmetric LSTM (Bi-ALSTM), an original ensemble of sequential neural models, to detect network threats before they spread. We cross-evaluate NetSentry using two practical datasets, training on one and testing on the other, and demonstrate F1 score gains above 33% over the state-of-the-art, as well as up to 3 times higher rates of detecting attacks such as XSS and web bruteforce. Further, we put forward a novel data augmentation technique that boosts the generalization abilities of a broad range of supervised deep learning algorithms, leading to average F1 score gains above 35%

    Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08

    Get PDF
    International audienceIn PKC'08, Plantard, Susilo and Win proposed a lattice-based signature scheme, whose security is based on the hardness of the closest vector problem with the infinity norm (CVP∞). This signature scheme was proposed as a countermeasure against the Nguyen-Regev attack, which improves the security and the efficiency of the Goldreich, Goldwasser and Halevi scheme (GGH). Furthermore, to resist potential side channel attacks, the authors suggested modifying the determinis-tic signing algorithm to be randomized. In this paper, we propose a chosen message attack against the randomized version. Note that the randomized signing algorithm will generate different signature vectors in a relatively small cube for the same message, so the difference of any two signature vectors will be relatively short lattice vector. Once collecting enough such short difference vectors, we can recover the whole or the partial secret key by lattice reduction algorithms, which implies that the randomized version is insecure under the chosen message attack

    A Survey on Surrogate-assisted Efficient Neural Architecture Search

    Full text link
    Neural architecture search (NAS) has become increasingly popular in the deep learning community recently, mainly because it can provide an opportunity to allow interested users without rich expertise to benefit from the success of deep neural networks (DNNs). However, NAS is still laborious and time-consuming because a large number of performance estimations are required during the search process of NAS, and training DNNs is computationally intensive. To solve the major limitation of NAS, improving the efficiency of NAS is essential in the design of NAS. This paper begins with a brief introduction to the general framework of NAS. Then, the methods for evaluating network candidates under the proxy metrics are systematically discussed. This is followed by a description of surrogate-assisted NAS, which is divided into three different categories, namely Bayesian optimization for NAS, surrogate-assisted evolutionary algorithms for NAS, and MOP for NAS. Finally, remaining challenges and open research questions are discussed, and promising research topics are suggested in this emerging field.Comment: 18 pages, 7 figure

    Concentration inequalities of MLE and robust MLE

    Full text link
    The Maximum Likelihood Estimator (MLE) serves an important role in statistics and machine learning. In this article, for i.i.d. variables, we obtain constant-specified and sharp concentration inequalities and oracle inequalities for the MLE only under exponential moment conditions. Furthermore, in a robust setting, the sub-Gaussian type oracle inequalities of the log-truncated maximum likelihood estimator are derived under the second-moment condition

    On the system-based design for steel frames using inelastic analysis

    Get PDF
    Design by inelastic analysis of overall system behaviour is permitted in several steel design specifications worldwide (e.g., the American Specification AISC360-10 and the Australian Specification AS4100-1998). Advanced inelastic analysis is better able to capture the system behavioural characteristics as they currently are understood. This paper presents a case study of the design of three planar steel structures using different design methods, including the Direct Analysis method in AISC360-10, the inelastic design method in AISC360-10, and the inelastic method (“advanced analysis”) in AS4100. The effects of structural ductility (capacity of load redistribution) and failure modes on the design results are discussed
    corecore