Soil contamination by heavy metals is a problem in agricultural irrigation systems.To assess the accumulation and sources of heavy metals in the Yongji irrigation district of the Hetao area,Inner Mongolia,China,195 so...Soil contamination by heavy metals is a problem in agricultural irrigation systems.To assess the accumulation and sources of heavy metals in the Yongji irrigation district of the Hetao area,Inner Mongolia,China,195 soil samples from 39 sites(0–100 cm)were collected,and Zn,Cu,Pb,Cr,and Cd concentrations were analyzed.The mean concentrations were 107.17,32.48,12.31,53.53,and 0.22 mg kg-1,respectively,with no significant differences between soil depths(P>0.05).Concentrations of Zn,Cu,and Cd were higher than the background levels,with moderate accumulation;the contamination factor(CF)values were 1.9,1.7,and 1.9,respectively,and the geoaccumulation index(Igeo)was>0.Concentrations of Pb and Cr were lower than,or close to,the background levels(CF<1,Igeo<0),indicating that they originated from a natural source.The monomial potential ecological risk index(Eri)for Zn,Cu,Pb,and Cr was low;Eri for Cd was 55.73,implying a moderate risk.The grade of potential ecological risk index of the five heavy metals(RI)was low,declining from south to north.The studied soils were contaminated with Zn,Cu,and Cd;principal component(PC)analysis implicated the enrichment of Cd and partial Cu(high loading in PC 2)was related to agricultural activities;Zn and partial Cu,closely associated with PC 3,may have originated from irrigation water from the Yellow River.Future agricultural development should focus on fertilizer and pesticide application and the quality of irrigation water.展开更多
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom...Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.展开更多
This paper proposes novel multi-layer neural networks based on Independent Component Analysis for feature extraction of fault modes. By the use of ICA, invariable features embedded in multi-channel vibration measureme...This paper proposes novel multi-layer neural networks based on Independent Component Analysis for feature extraction of fault modes. By the use of ICA, invariable features embedded in multi-channel vibration measurements under different operating conditions (rotating speed and/or load) can be captured together.Thus, stable MLP classifiers insensitive to the variation of operation conditions are constructed. The successful results achieved by selected experiments indicate great potential of ICA in health condition monitoring of rotating machines.展开更多
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software econom...Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.展开更多
[ Objective] This study aimed to investigate the preparation of red component in secondary metabolites of recombinant Hansenula anomala strain N6076 and its GC-MS detection. [ Method] Thin-layer chromatography method ...[ Objective] This study aimed to investigate the preparation of red component in secondary metabolites of recombinant Hansenula anomala strain N6076 and its GC-MS detection. [ Method] Thin-layer chromatography method was applied for large-scale preparation of red component in the secondary metabolites of re- combinant H. anomala strain N6076. The red component was dissolved in anhydrous ethanol for GC-MS detection and chemical structure comparison in the data- base to identify its type. [ Resultl The red component is preliminarily identified as a quinane compound, while no compound with exactly the same structure as the red component has been found in WILEY, Nist and Nbs compound libraries. [ Conclusion] This study laid the foundation for further NMR structure identification of the obtained red component and investigation of the relationship between its structure and biolo#cal effects.展开更多
In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model o...In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model of a reservoir of an oil field exploration area,we used a high-order staggered-grid difference technology to simulate many shots of seismic records of nonzero offset shots,implemented multi-wave seismic data processing to acquire the CMP of P waves and converted waves,NMO traces of CCP pre stacks,including AVA information and superposition profiles.Based on the AVA calculation of the model,the layer parameters of the model and the forwarding wave field relations of the P-S wave,we also compared and studied the correspondence between P waves and converted waves.The results of our analysis show that the results from simulation and from the AVO analysis are consistent.Significant wave field differences between P waves and converted waves in the same reservoir were found,which are helpful in recognizing and interpreting the multi-wave information in this area.We made use of the multi-wave data to provide the important guidelines for reservoir prediction.展开更多
基金financially supported by the Independent Open Projects of Key Laboratory for Palygorskite Science and Applied Technology of Jiangsu Province,Huaiyin Institute of Technology,China(No.HPK201705)the Independent Fund of Jiangsu Academy of Agricultural Sciences,China(No.6111637)。
文摘Soil contamination by heavy metals is a problem in agricultural irrigation systems.To assess the accumulation and sources of heavy metals in the Yongji irrigation district of the Hetao area,Inner Mongolia,China,195 soil samples from 39 sites(0–100 cm)were collected,and Zn,Cu,Pb,Cr,and Cd concentrations were analyzed.The mean concentrations were 107.17,32.48,12.31,53.53,and 0.22 mg kg-1,respectively,with no significant differences between soil depths(P>0.05).Concentrations of Zn,Cu,and Cd were higher than the background levels,with moderate accumulation;the contamination factor(CF)values were 1.9,1.7,and 1.9,respectively,and the geoaccumulation index(Igeo)was>0.Concentrations of Pb and Cr were lower than,or close to,the background levels(CF<1,Igeo<0),indicating that they originated from a natural source.The monomial potential ecological risk index(Eri)for Zn,Cu,Pb,and Cr was low;Eri for Cd was 55.73,implying a moderate risk.The grade of potential ecological risk index of the five heavy metals(RI)was low,declining from south to north.The studied soils were contaminated with Zn,Cu,and Cd;principal component(PC)analysis implicated the enrichment of Cd and partial Cu(high loading in PC 2)was related to agricultural activities;Zn and partial Cu,closely associated with PC 3,may have originated from irrigation water from the Yellow River.Future agricultural development should focus on fertilizer and pesticide application and the quality of irrigation water.
基金The work described in this paper was supported by the Research Grants Council of the Hong Kong Special Administrative Region,China(No.CUHK 14210717 of the General Research Fund).
文摘Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.
文摘This paper proposes novel multi-layer neural networks based on Independent Component Analysis for feature extraction of fault modes. By the use of ICA, invariable features embedded in multi-channel vibration measurements under different operating conditions (rotating speed and/or load) can be captured together.Thus, stable MLP classifiers insensitive to the variation of operation conditions are constructed. The successful results achieved by selected experiments indicate great potential of ICA in health condition monitoring of rotating machines.
基金supported by the Research Grants Council of the Hong Kong Special Administrative Region,China(No.CUHK 14210717 of the General Research Fund).
文摘Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowadays,this problem becomes even harder as the software economy becomes more diversified.Inspired by the classic idea of layered security for risk management,we propose layered obfuscation as a promising way to realize reliable software obfuscation.Our concept is based on the fact that real-world software is usually complicated.Merely applying one or several obfuscation approaches in an ad-hoc way cannot achieve good obscurity.Layered obfuscation,on the other hand,aims to mitigate the risks of reverse software engineering by integrating different obfuscation techniques as a whole solution.In the paper,we conduct a systematic review of existing obfuscation techniques based on the idea of layered obfuscation and develop a novel taxonomy of obfuscation techniques.Following our taxonomy hierarchy,the obfuscation strategies under different branches are orthogonal to each other.In this way,it can assist developers in choosing obfuscation techniques and designing layered obfuscation solutions based on their specific requirements.
基金Supported by National Natural Science Foundation of China (30960006)Natural Science Fund of Xinjiang University (BS080120)Postdoctoral Station of Geography from Xinjiang University
文摘[ Objective] This study aimed to investigate the preparation of red component in secondary metabolites of recombinant Hansenula anomala strain N6076 and its GC-MS detection. [ Method] Thin-layer chromatography method was applied for large-scale preparation of red component in the secondary metabolites of re- combinant H. anomala strain N6076. The red component was dissolved in anhydrous ethanol for GC-MS detection and chemical structure comparison in the data- base to identify its type. [ Resultl The red component is preliminarily identified as a quinane compound, while no compound with exactly the same structure as the red component has been found in WILEY, Nist and Nbs compound libraries. [ Conclusion] This study laid the foundation for further NMR structure identification of the obtained red component and investigation of the relationship between its structure and biolo#cal effects.
基金the Doctor Research Fund for Universities of China (No.20070616004)the National High Technology Research and Development Program of China (No.2007AA060505)
文摘In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model of a reservoir of an oil field exploration area,we used a high-order staggered-grid difference technology to simulate many shots of seismic records of nonzero offset shots,implemented multi-wave seismic data processing to acquire the CMP of P waves and converted waves,NMO traces of CCP pre stacks,including AVA information and superposition profiles.Based on the AVA calculation of the model,the layer parameters of the model and the forwarding wave field relations of the P-S wave,we also compared and studied the correspondence between P waves and converted waves.The results of our analysis show that the results from simulation and from the AVO analysis are consistent.Significant wave field differences between P waves and converted waves in the same reservoir were found,which are helpful in recognizing and interpreting the multi-wave information in this area.We made use of the multi-wave data to provide the important guidelines for reservoir prediction.