117 results on '"Zhao, Niu"'
Search Results
2. Experimental Study on Performance and Emission of an Electric Turbocharged Hydrogen Direct Injection Engine
- Author
-
Zhao, Niu, primary, Liu, Zongfa, additional, Wang, Li, additional, Pan, Jinyuan, additional, and Huang, Zhaoming, additional
- Published
- 2024
- Full Text
- View/download PDF
3. Local Enhancement and Bidirectional Feature Refinement Network for Single-Shot Detector.
- Author
-
Pengxiang Ouyang, Jiaqi Zhu, Chaogang Fan, Zhao Niu, and Shu Zhan
- Published
- 2022
- Full Text
- View/download PDF
4. Whole-genome sequencing to characterize the genetic structure and transmission risk of Mycobacterium tuberculosis in Yichang city of China
- Author
-
Lv Ji, Feng-Xi Tao, Yun-Fang Yu, Jian-Hua Liu, Feng-Hua Yu, Chun-Lin Bai, Zheng-Yang Wan, Xiao-Bo Yang, Jing Ma, Pan Zhou, Zhao Niu, Ping Zhou, Hong Xiang, Ming Chen, Zhou Xiang, Fang-Qiong Zhang, Qi Jiang, and Xiao-Jun Liu
- Subjects
Mycobacterium tuberculosis ,multidrug-resistant tuberculosis ,whole genome sequencing ,transmission ,Chinese rural area ,Public aspects of medicine ,RA1-1270 - Abstract
ObjectiveThe burden of both general and drug-resistant tuberculosis in rural areas is higher than that in urban areas in China. To characterize the genetic structure and transmission risk of Mycobacterium tuberculosis in rural China, we used whole genome sequencing to analyze clinical strains collected from patients in two counties of Yichang for three consecutive years.MethodsFrom 2018 to 2020, sputum samples were collected for cultures from patients with suspected tuberculosis in Yidu and Zigui county, and DNA was extracted from the positive strains for genome sequencing. The online SAM-TB platform was used to identify the genotypes and drug resistance-related mutations of each strain, establish a phylogenetic tree, and calculated the genetic distances between pairwise strains. Twelve single nucleotide polymorphisms (SNPs) were used as thresholds to identify transmission clusters. The risk of related factors was estimated by univariable and multivariable logistic regression.ResultsA total of 161 out of the collected 231 positive strains were enrolled for analysis, excluding non-tuberculous mycobacterium and duplicate strains from the same patient. These strains belonged to Lineage 2 (92, 57.1%) and Lineage 4 (69, 42.9%), respectively. A total of 49 (30.4%) strains were detected with known drug resistance-related mutations, including 6 (3.7%) multidrug-resistant-TB (MDR-TB) strains and 11 (6.8%) RIF-resistant INH-susceptible TB (Rr-TB) strains. Six of the MDR/Rr-TB (35.3%) were also resistant to fluoroquinolones, which made them pre-extensively drug-resistant TB (pre-XDR-TB). There were another seven strains with mono-resistance to fluoroquinolones and one strain with resistance to both INH and fluoroquinolones, making the overall rate of fluoroquinolones resistance 8.7% (14/161). A total of 50 strains (31.1%) were identified as transmission clusters. Patients under 45 years old (adjusted odds ratio 3.46 [95% confidential intervals 1.28–9.35]), treatment-naive patients (6.14 [1.39–27.07]) and patients infected by lineage 4 strains (2.22 [1.00–4.91]) had a higher risk of transmission.ConclusionThe drug resistance of tuberculosis in rural China, especially to the second-line drug fluoroquinolones, is relatively serious. The standardized treatment for patients and the clinical use of fluoroquinolones warrant attention. At the same time, the recent transmission risk of tuberculosis is high, and rapid diagnosis and treatment management at the primary care needs to be strengthened.
- Published
- 2023
- Full Text
- View/download PDF
5. Independent or Correlative: When the Betweenness Centrality Encounters Degree in the Networks?
- Author
-
Huaixi Wang, Chen Wang, Nina Shu, Zhao Niu, Chao Chang, and Peijia Shen
- Published
- 2021
- Full Text
- View/download PDF
6. User Identity Matching for Multisource Location Data.
- Author
-
Chunlai Ma, Chao Chang, Tao Ma, Jun Huang, and Zhao Niu
- Published
- 2021
- Full Text
- View/download PDF
7. Pixelwise Complex-Valued Neural Network Based on 1D FFT of Hyperspectral Data to Improve Green Pepper Segmentation in Agriculture
- Author
-
Xinzhi Liu, Jun Yu, Toru Kurihara, Congzhong Wu, Zhao Niu, and Shu Zhan
- Subjects
remote sensing ,hyperspectral imaging ,complex-valued neural network ,discrete Fourier transform ,agriculture ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
It seems difficult to recognize an object from its background with similar color using conventional segmentation methods. An efficient way is to utilize hyperspectral images that contain more wave bands and richer information than only RGB components. Particularly in our task, we aim to separate a pepper from densely packed green leaves for automatic picking in agriculture. Given that hyperspectral imaging can be regarded as a kind of wave propagation process, we make a novel attempt of introducing a complex neural network tailored for wave-related problems. Due to the lack of hyperspectral data, pixelwise training is deployed, and 1D fast Fourier transform of the hyperspectral data is used for the construction of complex input. Experimental results have showcased that a complex neural network outperforms a real-valued one in terms of detection accuracy by 3.9% and F1 score by 1.33%. Moreover, it enables the ability to select frequency bands used such as low-frequency components to boost performance as well as prevent overfitting problems for learning more generalization features. Thus, we put forward a lightweight pixelwise complex model for hyperspectral-related problems and provide an efficient way for green pepper automatic picking in agriculture using small datasets.
- Published
- 2023
- Full Text
- View/download PDF
8. Identification of Critical Nodes in Ad Hoc Network Based on the Analysis of Network Partition.
- Author
-
Zhao Niu, Tao Ma, Nina Shu, and Huaixi Wang
- Published
- 2019
- Full Text
- View/download PDF
9. Interference Sources Localization and Communication Relationship Inference With Cognitive Radio IoT Networks.
- Author
-
Zhao Niu, Tao Ma, Nina Shu, and Hong Shan
- Published
- 2020
- Full Text
- View/download PDF
10. Identification of Critical Nodes for Enhanced Network Defense in MANET-IoT Networks.
- Author
-
Zhao Niu, Qiang Li, Chunlai Ma, Haozhu Li, Hong Shan, and Fang Yang
- Published
- 2020
- Full Text
- View/download PDF
11. Jammer Location-Aware Method in Wireless Sensor Networks Based on Fibonacci Branch Search
- Author
-
Fang Yang, Nina Shu, Chenxi Hu, Jun Huang, and Zhao Niu
- Subjects
Control and Systems Engineering ,Electrical and Electronic Engineering ,Instrumentation - Abstract
Due to the sharing and open-access characteristics of the wireless medium, wireless sensor networks (WSNs) can be easily attacked by jammers. To mitigate the effects of a jamming attack, one reliable solution is to locate and remove the jammer from the deployed area within the WSN. To realize the jammer’s localization in the WSN, many range-free methods have been proposed. However, most of these methods are sensitive to the distribution of nodes and the parameters of the jammer. For this reason, a jammer location-aware method based on Fibonacci branch search (FBS) is proposed in this article. First, the interference region is estimated by using the interference region mapping service of sensors in wireless sensor networks. Then, the search point is selected in the jamming area and the fitness function is designed according to the average distance from the search point to the boundary sensor. According to the basic branch structure and interactive search rules, the global optimal solution is obtained in the jamming area. Finally, the position of the search point with the best fitness value is used as the estimation of the jammer position. Compared with the existing typical range-free methods, rich simulation experiments demonstrate that the FBS algorithm is superior in the location-aware method for jammers with a higher precision and a lower sensitivity to the distribution of nodes and the parameters of the jammer, respectively.
- Published
- 2023
12. NMR Assignments of Six Asymmetrical N-Nitrosamine Isomers Determined in an Active Pharmaceutical Ingredient by DFT Calculations
- Author
-
Hao-Yue Guan, Yu-Fei Feng, Bai-Hao Sun, Jian-Zhao Niu, and Qing-Sheng Zhang
- Subjects
asymmetrical N-nitrosamines ,isomers ,NMR assignment ,density functional theory calculation ,variable temperature 1H-NMR experiments ,Organic chemistry ,QD241-441 - Abstract
N-nitrosamines, which are well-known pro-mutagens, are found in drugs, pickled food and tobacco. Therefore, controlling their concentrations is very important. When an HPLC, GC or NMR analysis is conducted to investigate certain asymmetrical N-nitrosamines, two sets of signals attributed to the asymmetric N-nitrosamine isomers are usually observed. However, few reports on the NMR assignment of asymmetrical N-nitrosamine isomers have been published. In this study, we investigated the NMR assignments of the Z/E isomers of six asymmetrical N-nitrosamines by means of density functional theory (DFT) calculations. The configuration of the major isomer of asymmetrical N-nitrosamine 3 was the Z-configuration. The configuration of the major isomers of asymmetrical N-nitrosamines 4–7 was the E-configuration. Then, we determined the Z/E ratios of these asymmetrical N-nitrosamines by means of variable temperature (VT) and room temperature (RT) 1H-NMR experiments. The ratios of the Z/E isomer 3 quickly increased beyond 100% in the VT 1H NMR experiments. The ratios of Z/E isomers 4–7 were increased in the range of 10–60% in the VT 1H NMR experiments. The results of this study indicate that identifying the isomers of asymmetrical N-nitrosamine is necessary to control the quality of N-nitrosamines for active pharmaceutical ingredients (APIs).
- Published
- 2022
- Full Text
- View/download PDF
13. Fructus Ligustri Lucidi modulates estrogen receptor expression with no uterotrophic effect in ovariectomized rats
- Author
-
Yu-qing Tang, Cheng Li, Xue-jiao Sun, Yi Liu, Xi-ting Wang, Yu-bo Guo, Li-li Wang, Ru-feng Ma, Jian-zhao Niu, Min Fu, Dong-wei Zhang, and Yu Li
- Subjects
Fructus Ligustri Lucidi (FLL) ,Osteoporosis ,Estrogen receptor ,Femurs ,Tibias ,Uteri ,Other systems of medicine ,RZ201-999 - Abstract
Abstract Background Accumulating evidence suggests that Fructus Ligustri Lucidi (FLL) plays a beneficial role in preventing the development of osteoporosis. However, the effects of FLL on estrogen receptor (ER) α and ERβ expressions remain unknown. Therefore, in the current study we attempted to probe into the effects of FLL on ERα and ERβ expressions in femurs, tibias and uteri of ovariectomized (OVX) rats. Methods The OVX rats were orally administrated with FLL water extract (3.5 g/kg/day) for 12 weeks. The uteri, femurs, tibias and serum were harvested from rats. The serum levels of estrogen (E2), luteinizing hormone (LH) and follicle-stimulating hormone (FSH) were determined by ELISA. The expressions of ERα and ERβ in the femurs and tibias as well as uteri were analysed by western blot and immunohistochemical staining. Results FLL treatment did not increase uterus relative weight in OVX rats. Further, FLL treatment increased ERα expression in the femurs and tibias, and enhanced ERβ expression in the uteri of OVX rats. However, the resulted expression of ERα was stronger than that of ERβ in OVX rats in response to FLL treatment. Meanwhile, administration with FLL to OVX rats increased FSH and LH but did not increase E2 level in the serum. Conclusion FLL treatment shows tissue selection on ERα and ERβ expressions in the femurs and tibias as well as uteri of OVX rats without uterotrophic effect, which may offer the scientific evidence of the efficiency and safety of its clinical application.
- Published
- 2018
- Full Text
- View/download PDF
14. The Preparation of Novel Amino Acid Imidazole Ionic Liquids and Their Application as Stationary Phase for Capillary Gas Chromatographic Separations
- Author
-
Wu, Weilong, primary, Ba, Mengyi, additional, Zhang, Wei, additional, Zhang, Huike, additional, Zhao, Niu, additional, Liu, Yiyi, additional, Wang, Xinxin, additional, Cai, Zhiqiang, additional, and Sun, Tao, additional
- Published
- 2023
- Full Text
- View/download PDF
15. Iridium Catalysts with f‑Amphbinol Ligands: Highly Stereoselective Hydrogenation of a Variety of Ketones.
- Author
-
Wu, Weilong, Zhao, Niu, Liu, Yiyi, Du, Shenshen, Wang, Xinxin, Mo, Wenzhi, Yan, Xianghe, Xu, Chunying, Zhou, Yan, and Ji, Baoming
- Published
- 2023
- Full Text
- View/download PDF
16. Learning an optical filter for green pepper automatic picking in agriculture.
- Author
-
Xinzhi Liu, Jun Yu 0007, Toru Kurihara, Ke Li, Zhao Niu, and Shu Zhan
- Published
- 2021
- Full Text
- View/download PDF
17. A Wireless Fingerprint Positioning Method Based on Wavelet Transform and Deep Learning.
- Author
-
Da Li and Zhao Niu
- Published
- 2021
- Full Text
- View/download PDF
18. Study on axial compression property of thin walled tube filled with negative Poisson’s ratio lattice
- Author
-
Sun, Xiaodong, primary, Huang, Zhaoming, additional, Wang, Tao, additional, Hu, Yan, additional, Wang, Li, additional, and Zhao, Niu, additional
- Published
- 2023
- Full Text
- View/download PDF
19. A Survey on Identification of Critical Nodes in Ad Hoc Network
- Author
-
Jinyang Zhao, Zhen Fang, Jiangtao Ge, Jun Huang, and Zhao Niu
- Published
- 2023
20. Study on Sleep Quality and Learning Outcomes of College Students.
- Author
-
Jia-Li Tian, Ji-Lin Li, and Jian-Zhao Niu
- Published
- 2012
- Full Text
- View/download PDF
21. The Effect of Autophagy Induced by Mothers Against Decapentaplegic Homolog 3 (Smad3) Regulated by MicroRNA (miRNA)-23b on Renal Injury in Septic Rats
- Author
-
Duojiao Fan, Junling Jiang, Zhao Niu, and Yang Zhang
- Subjects
Mothers against decapentaplegic homolog 3 ,Renal injury ,business.industry ,Autophagy ,microRNA ,Biomedical Engineering ,Cancer research ,Medicine (miscellaneous) ,Medicine ,Bioengineering ,business ,Biotechnology - Abstract
This study intends to investigate the mechanism by how microRNA (miRNA)-23b alleviates kidney damage in septic rats. Herein, septic rat model, control group and sham-operated model were set up to assess kidney tissue damage. Tissues were extracted from the rats and isolated into cells. Then cells were transfected with plasmids expressing miR-23b followed by analysis of the expression of miR-23b, Smad3, TLR4, HMGB1 and autophagy-related proteins (LC3, beclin-1) by western blot and RT-qPCR. The level of TNF-α, IL-6 and BUN and SCr were elevated in the model group and decreased after upregulation of miR-23b with increased LC3-II, Smad3 and Beclin-1 expression. miR-23b mimic group showed highest miR-23b expression followed by miR-23b NC group and miR-23b inhibitor group. The levels of TLR4, and HMGB1 and positive rate of NF-κBp65 in miR-23b mimic group were significantly lower than those in miR-23b inhibitor group (p < 0.05). Importantly, miR-23b directly targeted Smad3 and inhibited its expression. In conclusion, overexpressed miR-23b induces autophagy by promoting Smad3 expression, alleviates kidney damage in septic rats, and reduces inflammation and inactivates NF-κB signaling pathway.
- Published
- 2021
22. Curcumin Treatment Suppresses CCR7 Expression and the Differentiation and Migration of Human Circulating Fibrocytes
- Author
-
Xu-yan Fu, Dong-wei Zhang, Ya-dong Li, Pi-wen Zhao, Yu-qing Tang, Jian-zhao Niu, and Yu Li
- Subjects
Migration ,Activation ,Human Circulating Fibrocytes ,Curcumin ,CCR7/CCL21 pathway ,Physiology ,QP1-981 ,Biochemistry ,QD415-436 - Abstract
Background/Aim: Recent studies have demonstrated that circulating fibrocytes contribute to the formation and development of fibrosis. Curcumin, a polyphenolic compound isolated from turmeric, has been shown to have anti-fibrotic effects in various organs. We and others have demonstrated that curcumin beneficially affects the development of fibrosis. However the effect of curcumin on circulating fibrocytes has not been reported. Methods: Human circulating fibrocytes were isolated from leukocyte concentrates of healthy human donors and identified based on the expression of CD34, CD45, collagen I (COLI), and chemokine receptor CCR7 (CCR7) via flow cytometry. Cell Counting Kit-8 was used to evaluate cell viability. The effect of curcumin on the differentiation and migration of human circulating fibrocytes was evaluated by immunofluorescence staining, flow cytometry and a transwell migration assay. Transforming growth factor (TGF)-β1 secretion was examined by ELISA. Results: Curcumin treatment (72 h; 20 μM) significantly decreased the expression of COL I, α-SMA and CCR7, as well as TGF-βl secretion, in human circulating fibrocytes. The inhibitory effect of curcumin on the differentiation and migration of human circulating fibrocytes is likely via regulating the CCR7/CCL21 signaling pathway, in particular by reducing CCR7 expression. These observed effects may be beneficial in resolving fibrosis by suppressing TGF-β1 secretion. Conclusion: Our results suggest that curcumin has the potential to suppress the differentiation and migration of circulating fibrocytes, which would provide new explanation for curcumin's application in the development of fibrosis in various organs.
- Published
- 2015
- Full Text
- View/download PDF
23. Lean combustion and emission performance of a gasoline direct injection engine with active pre-chamber
- Author
-
Zhang, Li, primary, Huang, Zhaoming, additional, Wang, Tao, additional, Zhao, Niu, additional, Cheng, Haiyan, additional, and Chen, Weiguo, additional
- Published
- 2022
- Full Text
- View/download PDF
24. Metabolic patterns reveal enhanced anammox activity at low nitrogen conditions in the integrated I‐ABR
- Author
-
Juejun Pan, Zhenshan Li, Liming Chen, Hui Yang, Sitong Liu, Shouqing Ni, Tangran Huo, and Zhao Niu
- Subjects
Anabolism ,Nitrogen ,Heterotroph ,chemistry.chemical_element ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,chemistry.chemical_compound ,Bioreactors ,020401 chemical engineering ,Ammonium Compounds ,Environmental Chemistry ,Ammonium ,Food science ,0204 chemical engineering ,Nitrite ,Waste Management and Disposal ,Nitrogen cycle ,0105 earth and related environmental sciences ,Water Science and Technology ,Ecological Modeling ,Metabolism ,Pollution ,chemistry ,Anammox ,Denitrification ,Oxidation-Reduction - Abstract
Substrate concentrations greatly influence bacterial growth and metabolism. However, optimal nitrogen concentrations for anammox bacteria in nitrogen-limited environments remain unclear. Here, we observed enhanced nitrogen metabolism and anabolism of anammox bacteria at low nitrogen conditions. Efficient nitrogen removal was achieved at ammonium and nitrite influent concentration of 30 mg/L under HRT of 1 hr, with an average nitrogen removal rate (NRR) of 0.73 kg N/(m3 ·day) in I-ABR composed of four compartments. The highest anammox activity of 6.25 mmol N/ (gVSS·hr) was observed in the fourth compartment (C4) with the lowest substrate levels (ammonium and nitrite of 11.6 mg/L and 7 mg/L). This could be resulted from the highest expression level of genes involved in nitrogen metabolism in C4, which was 1.49-1.67 times higher than that in other compartments. Besides, the second compartment (C2) exhibited the most active anabolism at ammonium and nitrite of 17 mg/L and 13 mg/L, respectively, which contributed to the most active amino acid synthesis and thus the highest EPS (1.35 times higher) in C2. This enhanced amino acid auxotrophy between anammox bacteria with heterotrophs, and consequently, heterotrophs thrived and competed for nitrite. These results hint at the potential application of anammox process in micro-polluted water. PRACTITIONER POINTS: High nitrogen removal and efficient biomass retention at low nitrogen concentrations under short HRT was achieved in I-ABR. Optimal concentrations for anammox nitrogen removal and anabolism were discussed under low nitrogen concentrations. More active anabolism contributed to enhanced amino acid synthesis and thus higher EPS contents. Low substrate levels led to enhanced expression of genes involved in nitrogen metabolism and thus high anammox activity.
- Published
- 2021
25. Local Enhancement and Bidirectional Feature Refinement Network for Single-Shot Detector
- Author
-
Shu Zhan, Zhao Niu, Pengxiang Ouyang, Jiaqi Zhu, and Chaogang Fan
- Subjects
business.industry ,Computer science ,Cognitive Neuroscience ,Detector ,Pattern recognition ,Pascal (programming language) ,Residual ,Object (computer science) ,Computer Science Applications ,Feature (computer vision) ,Embedding ,Computer Vision and Pattern Recognition ,Pyramid (image processing) ,Artificial intelligence ,business ,computer ,Image resolution ,computer.programming_language - Abstract
Benefit from multi-scale feature pyramid methods, recently single-stage object detectors have achieved promising accuracy and fast inference speed. However, the majority of existing feature pyramid detection techniques only simply describe complex contextual relationships from different scales. Not only are there no effective modules that adaptively extend appropriate semantic information from deeper layers, but the finer spatial localization cues from lower layers are often ignored. In this paper, we present a Local Enhancement and Bidirectional Feature Refinement Network (LFBFR), which includes two optimization methods to achieve remarkable improvements in detection accuracy. Firstly, to make the backbone more suitable for detection task, we modify the pre-trained classification backbone to mitigate the loss of details in small objects due to consecutive decrease of the image resolution. Then we propose a Bidirectional Feature Refinement Pyramid, which can effectively utilize the inter-channel relationship of higher-level features and fine appearance cues from lower-level features by using the attention residual refinement module and the feature reuse module. Ultimately, to assess the performance of the proposed LFBFR, we design a powerful end-to-end single-stage detector called LFBFR-SSD by embedding it into the framework of SSD. Extensive experiments on the PASCAL VOC and MS COCO verify that our LFBFR-SSD outperforms a lot of state-of-the-art detectors while maintaining a real-time speed.
- Published
- 2021
26. Interference Sources Localization and Communication Relationship Inference With Cognitive Radio IoT Networks
- Author
-
Hong Shan, Nina Shu, Zhao Niu, and Tao Ma
- Subjects
The Internet of Things (IoT) ,General Computer Science ,Association rule learning ,Computer science ,business.industry ,General Engineering ,communication relationship inference ,Inference ,Energy consumption ,Interference (wave propagation) ,localization ,Network simulation ,Cognitive radio ,green ,Global Positioning System ,General Materials Science ,Network performance ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Computer network - Abstract
With the widespread application of Internet of things (IoT), the interference problem becomes more and more serious, which results in not only the poor network performance but also the increased energy consumption of IoT nodes. Therefore, in this paper, we investigate the problem of how to locate the interference sources and infer their communication relationships in the cognitive radio IoT (CR-IoT) deployment scenario. First, we utilize MDS-MAP(P) algorithm with dynamic power control to realize cooperative self-localization of the CR-IoT nodes, which is more energy-efficient than all the IoT nodes equipped with global positioning system (GPS) receivers. Then, we propose a non-cooperative localization method to determine the inference sources with the angle of arrivals (AoAs) measured by the CR-IoT nodes. Finally, the communication relationship between interference sources can be inferred based on the association rule of signals. The network simulation results validate that the proposed methods can locate the interference sources accurately with low energy consumption and correctly infer their communication relationships, which is helpful for the interrupted CR-IoT nodes to take a specific opportunistic transmission policy to reduce their energy consumption.
- Published
- 2020
27. Identification of Critical Nodes for Enhanced Network Defense in MANET-IoT Networks
- Author
-
Li Qiang, Zhao Niu, Chunlai Ma, Haozhu Li, Hong Shan, and Fang Yang
- Subjects
General Computer Science ,Network defense ,business.industry ,Computer science ,010401 analytical chemistry ,General Engineering ,Mobile computing ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Mobile ad hoc network ,topology snapshot ,Network topology ,01 natural sciences ,0104 chemical sciences ,Robustness (computer science) ,enhanced network defense ,0202 electrical engineering, electronic engineering, information engineering ,critical node identification ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,MANET-IoT network ,business ,lcsh:TK1-9971 ,Computer network - Abstract
In heterogeneous environments, the Internet of Things (IoT) combined with mobile ad hoc network (MANET), i.e., MANET-IoT network, becomes more attractive to end users and economically successful. However, the introduction of MANET potentially makes the system more prone to attacks due to its lack of centralized management, weak connectivity, and resource constraints. To enhance the network robustness to intentional attacks, the critical nodes of the MANET-IoT network should be firstly identified and then protected. Most of the existing methods for identifying critical nodes usually focus on static networks or a single topology snapshot in dynamic networks without considering the correlation between topology snapshots, which cannot effectively deal with the dynamic changes in the topology of MANET-IoT networks. In this paper, a dynamic critical node identification (DCNI) method is proposed. First, we propose a comprehensive metric to measure the node importance in the topology snapshot. Then, we introduce a sliding time window to filter out the topology snapshots which have a close correlation with the current snapshot, and fuse the importance values of the same node in different topology snapshots. Finally, the critical nodes are selected based on the ranking result of fused importance. Thereafter, the port hopping mechanism could be applied to the critical nodes for enhancing network defense capability. The simulation results show that the proposed method is more effective in identifying critical nodes than existing static methods in MANET-IoT networks, and the port hopping mechanism can improve network defense significantly to denial of service (DoS) attacks.
- Published
- 2020
28. A Method for Inferring Important Personal Locations of Mobile Users Based on Time State Distribution
- Author
-
Chang Chao, Zhao Niu, Tao Ma, and Chunlai Ma
- Subjects
Rest (physics) ,Computer science ,Estimation theory ,business.industry ,Big data ,Inference ,computer.software_genre ,Automation ,Frequency ,Time–frequency analysis ,Base station ,Data mining ,business ,computer - Abstract
Important location inference is one of the main content in location big data intelligence mining, and it has important application value in tracking target users and LBA. This paper takes regional ID type location data as input. Aiming at the problem that the current inference methods based on the frequency statistics of the work and rest periods do not take into account the difference in user time activity rules, the accuracy of the inference is poor, and a personal important location inference method based on the time state distribution is proposed. The method first divides the mobile user's work and rest time period, and then estimates the parameters of the state distribution of the user registration time in each base station area. Finally, match the estimated result with the work and rest time period and output the home or work label to complete the inference of personal important locations. The experimental results show that compared with the frequency statistics method, this method has higher accuracy rate and lower parameter estimation error, and it has certain reference significance for the inference of personal important locations with regional ID type location as input.
- Published
- 2021
29. Hyperspectral imaging for green pepper segmentation using a complex-valued neural network
- Author
-
Xinzhi Liu, Jun Yu, Toru Kurihara, Liangfeng Xu, Zhao Niu, and Shu Zhan
- Subjects
Electrical and Electronic Engineering ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials - Published
- 2022
30. A Wireless Fingerprint Positioning Method Based on Wavelet Transform and Deep Learning
- Author
-
Zhao Niu and Da Li
- Subjects
wireless networks ,Positioning system ,Computer science ,Geography, Planning and Development ,02 engineering and technology ,transfer learning ,fingerprint positioning ,Wavelet ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Earth and Planetary Sciences (miscellaneous) ,Computers in Earth Sciences ,wavelet transform ,Geography (General) ,business.industry ,Fingerprint (computing) ,Wavelet transform ,deep learning ,020206 networking & telecommunications ,Pattern recognition ,Positioning technology ,Feature (computer vision) ,Multilayer perceptron ,G1-922 ,020201 artificial intelligence & image processing ,Artificial intelligence ,business - Abstract
As the demand for location services increases, research on location technology has aroused great interest. In particular, signal-based fingerprint location positioning technology has become a research hotspot owing to its high positioning performance. In general, the received signal strength indicator (RSSI) will be used as a location feature to build a fingerprint database. However, at different locations, this feature distinction may not be obvious, resulting in low positioning accuracy. Considering the wavelet transform can get valuable features from the signals, the long-term evolution (LTE) signals were converted into wavelet feature images to construct the fingerprint database. To fully extract the signal features, a two-level hierarchical structure positioning system is proposed to achieve satisfactory positioning accuracy. A deep residual network (ResNet) rough locator is used to learn useful features from the wavelet feature fingerprint image database. Then, inspired by the transfer learning idea, a fine locator based on multilayer perceptron (MLP) is leveraged to further learn the features of the wavelet fingerprint image to obtain better localization performance. Additionally, multiple data enhancement techniques were adopted to increase the richness of the fingerprint dataset, thereby enhancing the robustness of the positioning system. Experimental results indicate that the proposed system leads to improved positioning performance in outdoor environments.
- Published
- 2021
31. Genome-centered omics insight into the competition and niche differentiation of Ca. Jettenia and Ca. Brocadia affiliated to anammox bacteria
- Author
-
Sitong Liu, Ying Feng, Yunpeng Zhao, Liming Chen, and Zhao Niu
- Subjects
media_common.quotation_subject ,Biology ,Applied Microbiology and Biotechnology ,Genome ,Competition (biology) ,03 medical and health sciences ,chemistry.chemical_compound ,Ammonia ,Antibiosis ,Anaerobiosis ,Nitrite ,Gene ,030304 developmental biology ,media_common ,0303 health sciences ,Bacteria ,030306 microbiology ,Gene Expression Profiling ,Niche differentiation ,General Medicine ,biology.organism_classification ,chemistry ,Biochemistry ,Metagenomics ,Anammox ,Oxidation-Reduction ,Biotechnology - Abstract
Although the niche differentiation of anammox bacteria has been extensively observed in a lab-scale reactor, the inherent mechanism for this ecological phenomenon is still elusive. Here, we combined the long-term reactor operation, genome-centered metagenome, and metatranscriptome analyses to gain insight into the substrate competition and niche differentiation of Candidatus Jettenia and Candidatus Brocadia. After 146 days of operation, we found the anammox bacterial population shifted from Ca. Jettenia to Ca. Brocadia in the immobilization-anaerobic baffled reactor (I-ABR) with the ammonium and nitrite concentrations of 30 mg/L. Importantly, the genome and transcript comparisons of Ca. Jettenia and Ca. Brocadia showed that Ca. Brocadia harbored more complete function in cell chemotaxis, flagellar assembly, and two-component system and more redundant function in nitrite reduction, in which the genes were also highly expressed. Ca. Brocadia out-competed Ca. Jettenia at the mainstream condition. Meanwhile, though the highest biomass concentration led to the highest nitrogen removal rate (NRR) in the first compartment (C1), the competition of Ca. Jettenia and Ca. Brocadia could also affect the NRR of different compartments through affecting the bacterial activity. Substrate competition of anammox bacteria led to higher transcript activity of Ca. Jettenia and Ca. Brocadia in the second (C2) and fourth (C4) compartments, respectively. Further, high transcript activity of Ca. Brocadia led to the higher NRR in C4. A comparison of metabolic potential based on the metagenome-assembled genome adds a different dimension for understanding the discrepantly physiological characteristics and competition of anammox bacteria for wastewater treatment.
- Published
- 2019
32. Wind speed sensor data processing based on Kaman Vortex Street principle
- Author
-
Wenjing Xie, Shejiao Hu, Zhao Niu, Changyong Wei, Xiaolong Yang, and Bin Zhang
- Abstract
Wind speed is one of the important monitoring parameters to ensure mine safety. The commonly used mine wind speed sensor can be divided into ultrasonic type, impeller type and hot wire type according to the design principle. The accuracy of the latter two methods is not high enough because they are susceptible to steam and coal dust in mines. The ultrasonic wind speed sensor has better measuring accuracy. In this paper, ultrasonic wind speed sensor, ultrasonic sending and receiving circuit combined with ADC sampling function of the chip, to obtain the received ultrasonic amplitude change data, statistics of ultrasonic waveform changes caused by blowing, according to the number of changes in the wind speed frequency, and then calculate the real-time wind speed.
- Published
- 2022
33. [Mechanism of traditional Chinese medicine balancing Yin-Yang by targeting ERα/ERβ and its application in treatment of menopausal syndrome]
- Author
-
Pi-Wen, Zhao, Yan-Xia, Wang, and Jian-Zhao, Niu
- Subjects
Estrogen Receptor alpha ,Estrogen Receptor beta ,Humans ,Yin-Yang ,Estrogens ,Female ,Medicine, Chinese Traditional - Abstract
The coordination and unification of Yin and Yang are the basis of normal human life activities. Along with the age growth and aging of the body, women will suffer from menopausal syndrome during menopause. In addition to the significant changes in the genital system, there are also pathological manifestations in estrogen target points including bone, nerve and cardiovascular systems, due to the imbalance of Yin and Yang. Besides the insufficiency of estrogen, the main cause of menopausal syndrome is the changes in the response of target organs to estrogen. In other words, the biological effects mediated by estrogen receptor(ER) alpha and beta subtypes in target cells are often different or even opposite; the changes of expression level and ratio of ERα and ERβ are also important causes for the abnormal estrogenic effects in target organs and the imbalance of Yin and Yang of the body. Therefore, on one hand, the therapeutic mechanism of drugs is ER-mediated estrogenic effect. On the other hand, the drugs have a regulatory effect on ER subtype expression in target cells and Yin-Yang state in target organs and even organisms, so as to cause further changes in the response of target cells to estrogen or estrogenic components, and exert its therapeutic effects. This paper reviews the pharmacological mechanism of gynecological traditional Chinese medicine in harmonizing Yin and Yang in estrogen-positive target cells and the clinical efficacy in the following aspects, including estrogen and its mechanism, the estrogenic effect of ER in traditional Chinese medicine and the mechanism of ER subtype in balancing Yin and Yang and mediating and regulating the main target tissues in menopausal syndrome treatment.
- Published
- 2020
34. Research on Ad Hoc Network Security Risk Assessment Method
- Author
-
Tao Ma, Hong Shan, Xiaolong Lei, Chunlai Ma, and Zhao Niu
- Subjects
Risk analysis (engineering) ,Wireless ad hoc network ,Network security ,business.industry ,Computer science ,Quantitative assessment ,business ,Risk assessment - Abstract
Security risk assessment is an important part of network security operation. The existing risk assessment methods are mainly divided into qualitative assessment, quantitative assessment and comprehensive assessment. This paper summarizes the advantages and disadvantages of related methods through analyzing, and provides certain assistance for the assessors to choose methods when implementing assessment.
- Published
- 2020
35. Inhibition of PI3K/AKT molecular pathway mediated by membrane estrogen receptor GPER accounts for cryptotanshinone induced antiproliferative effect on breast cancer SKBR-3 cells
- Author
-
Piwen Zhao, Liping Sun, Dan-Ning Shi, Jian-Zhao Niu, Li-Xia Cui, Meng Chen, and Hongbo Li
- Subjects
Membrane estrogen receptor ,Molecular pathway ,Cyclin D ,Cyclin A ,Estrogen receptor ,Antineoplastic Agents ,Breast Neoplasms ,Cryptotanshinone ,Cell cycle ,Receptors, G-Protein-Coupled ,Phosphatidylinositol 3-Kinases ,03 medical and health sciences ,Breast cancer ,0302 clinical medicine ,lcsh:RA1190-1270 ,Cell Line, Tumor ,Humans ,Pharmacology (medical) ,Protein kinase B ,PI3K/AKT/mTOR pathway ,lcsh:Toxicology. Poisons ,Cell Proliferation ,030304 developmental biology ,Pharmacology ,PI3K/AKT ,0303 health sciences ,biology ,Chemistry ,lcsh:RM1-950 ,Phenanthrenes ,GPER ,Cyclin ,lcsh:Therapeutics. Pharmacology ,Receptors, Estrogen ,030220 oncology & carcinogenesis ,biology.protein ,Cancer research ,Proto-Oncogene Proteins c-akt ,Signal Transduction ,Research Article - Abstract
Background Breast cancer is the most frequently diagnosed malignancy among women and the second leading cause of cancer death worldwide. Among which nuclear estrogen receptor (nER) negative breast cancer is always with much poor prognosis. Recently, membrane G protein coupled estrogen receptor (GPER), a newly recognized estrogen receptor has been documented to take essential part in the development and treatment of breast cancer. The present study was designed to investigate the anti nER negative breast cancer effect of cryptotanshinone (CPT), an important active compound of traditional Chinese medicine Danshen and its possible molecular pathway. Methods The following in vitro tests were performed in nER negative but GPER positive breast cancer SKBR-3 cells. The effect of CPT on cell proliferation rate and cell cycle distribution was evaluated by MTT cell viability test and flow cytometry assay respectively. The role of PI3K/AKT pathway and the mediated function of GPER were tested by western blot and immunofluorescence. Technique of gene silence and the specific GPER agonist G-1 and antagonist G-15 were employed in the experiments to further verify the function of GPER in mediating the anticancer role of CPT. Results The results showed that proliferation of SKBR-3 cells could be blocked by CPT in a time and dose dependent manner. CPT could also exert antiproliferative activities by arresting cell cycle progression in G1 phase and down regulating the expression level of cyclin A, cyclin B, cyclin D and cyclin-dependent kinase 2 (CDK2). The antiproliferative effect of CPT was further enhanced by G-1 and attenuated by G-15. Results of western blot and immunofluorescence showed that expression of PI3K and p-AKT could be downregulated by CPT and such effects were mediated by GPER which were further demonstrated by gene silence test. Conclusion The current study showed that the antiproliferative action of CPT on SKBR-3 cells was realized by inhibition of GPER mediated PI3K/AKT pathway. These findings provide further validation of GPER serving as useful therapeutic target.
- Published
- 2020
36. [Molecular mechanism of apoptosis of breast cancer SKBR-3 cells induced by cryptanshinone via G protein coupled estrogen receptor( GPER) mediated pathway]
- Author
-
Dan-Ning, Shi, Li-Xia, Cui, Pi-Wen, Zhao, Li-Ping, Sun, Meng, Chen, and Jian-Zhao, Niu
- Subjects
Receptors, Estrogen ,Humans ,Apoptosis ,Breast Neoplasms ,Proto-Oncogene Proteins c-akt ,Drugs, Chinese Herbal ,Receptors, G-Protein-Coupled ,Signal Transduction - Abstract
The study aimed to illuminate the role of G protein coupled estrogen receptor( GPER) and its mediated PI3 K/AKT signaling pathway in cryptotanshinone( CPT) induced apoptosis of breast cancer SKBR-3 cells,which is GPER positive and ER negative.The apoptosis rate of SKBR-3 cells was tested by Annexin V-FITC/PI staining and apoptosis effector caspase-3 was determined by Western blot. The key proteins in PI3 K/AKT signaling pathway mediated by GPER were detected by Western blot and immunofluorescence technique. Meanwhile,the agonist G1 and antagonist G15 of GPER and antagonist LY294002 of PI3 K were employed in the test to further clarify the effect of GPER and PI3 K/AKT pathway. The results indicated that the apoptosis rate was increased from 4. 7% to46. 1% and 69. 0% after treatment with 0,5,10 μmol·L~(-1) CPT for 48 h( P0. 01). The expression of PI3 K,AKT and p-AKT were inhibited( P0. 05 or P0. 01),while caspase-3 level increased obviously after treatment with CPT( P0. 01). Importantly,inhibitory effect of PI3 K/AKT signaling pathway by CPT was further enhanced by G1 and attenuated by G15. LY294002 also induced a further inhibition of expression of AKT and p-AKT. The mean fluorescence intensity of AKT and p-AKT could be decreased by CPT. Furthermore,CPT could downregulate GPER expression in SKBR-3 cells( P0. 01),which could be inhibited by G1 and enhanced by G15.In conclusion,CPT could induce the apoptosis of ER negative and GPER positive breast cancer SKBR-3 cells and the molecular mechanism is related to its regulatory effect of GPER and its mediated PI3 K/AKT signaling pathway.
- Published
- 2019
37. Identification of Critical Nodes in Ad Hoc Network Based on the Analysis of Network Partition
- Author
-
Tao Ma, Zhao Niu, Huaixi Wang, and Nina Shu
- Subjects
050210 logistics & transportation ,business.industry ,Computer science ,Wireless ad hoc network ,0502 economics and business ,05 social sciences ,0202 electrical engineering, electronic engineering, information engineering ,Network partition ,020201 artificial intelligence & image processing ,02 engineering and technology ,business ,Computer network ,Universality (dynamical systems) - Abstract
Identifying critical nodes from the point of view that destructiveness equals to criticality, the traditional identification methods usually consider the degree of damage but does not analyze the type of damage. The critical nodes identified have a certain universality, but the pertinence is not strong. In this paper, a critical node identification method based on the analysis of network partition for Ad Hoc network is proposed. Firstly, the Kernighan-Lin algorithm is applied to group the nodes in the network, and then the boundary nodes between different groups are selected from the grouping results. Finally, the boundary nodes are re-screened by combining the node’s degree value to select the nodes that can lead to the partition of the network. The experimental results show that the failure of identified critical nodes can directly lead to network partitioned into multiple subnets, destroy the connectivity of the network seriously.
- Published
- 2019
38. Learning an optical filter for green pepper automatic picking in agriculture
- Author
-
Zhao Niu, Xinzhi Liu, Ke Li, Shu Zhan, Toru Kurihara, and Jun Yu
- Subjects
Artificial neural network ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Hyperspectral imaging ,Forestry ,Horticulture ,Computer Science Applications ,Green pepper ,RGB color model ,Computer vision ,Segmentation ,Artificial intelligence ,business ,Optical filter ,Agronomy and Crop Science - Abstract
Green pepper automatic picking has been a long-standing challenge in agriculture due to the similar color between green peppers and green leaves. To tackle this intractable problem, we tried to distinguish between them by using hyperspectral information as prior knowledge. As our core insight, a novel optical filter was designed as a pre-processing tool to find valuable wavelengths where peppers differ a lot from leaves. To this end, firstly, the parameters of the optical filter were learned by end-to-end training with a neural network for pixel-wise hyperspectral input. Secondly, the learned optical filter was applied to hyperspectral data to obtain filtering RGB images, which will be sent to further segmentation framework. Thereby, a two-stage method for green pepper segmentation was proposed, and promising results were achieved owing to the incorporation of the optical filter.
- Published
- 2021
39. Synthesis and antiviral effect of phosphamide modified vidarabine for treating HSV 1 infections
- Author
-
Ruochen Zang, Yu Tang, Zhao Niu, Zhenhao Wang, Wei Wang, and Xin Wang
- Subjects
Clinical Biochemistry ,Pharmaceutical Science ,Protide ,Herpesvirus 1, Human ,Microbial Sensitivity Tests ,Phospholipase ,Pharmacology ,medicine.disease_cause ,Antiviral Agents ,Biochemistry ,Structure-Activity Relationship ,Drug Discovery ,medicine ,Humans ,Dimethoate ,Molecular Biology ,Vidarabine ,chemistry.chemical_classification ,Dose-Response Relationship, Drug ,Molecular Structure ,Liver cell ,Organic Chemistry ,Herpes Simplex ,Metabolism ,Phosphamide ,Herpes simplex virus ,Enzyme ,chemistry ,Molecular Medicine ,medicine.drug - Abstract
Vidarabine (ARA) was one of the earliest marine-related compounds to be used clinically for antiviral therapy, however, its fast metabolism is the main defect of this drug. To overcome this, we designed and synthesized a group of phosphamide-modified ARA compounds using ProTide technology. With a phosphamide modification, these compounds could become the substrate of specific phospholipase enzymes expressed in the liver. Among all 16 synthesized compounds, most showed stronger activity against herpes simplex virus type 1 (HSV-1) than ARA (EC50 of approximately 10 μM). The top three compounds were compound 2 (EC50 = 0.52 ± 0.04 μM), compound 6 (EC50 = 1.05 ± 0.09 μM) and compound 15 (EC50 = 1.18 ± 0.08 μM) (about 2 times higher than Sp type compound 2). This study provides evidence for use of the phosphamide modification, which could give ARA higher activity and liver cell targeting.
- Published
- 2021
40. Experimental study on effect of Compound Biejia Ruangan prescription on high-resolution computerized tomographic images in bleomycin induced pulmonary fibrosis rats
- Author
-
Dong-wei, Zhang, Ji-feng, Wang, Jian-zhao, Niu, Bao-hua, Gao, and Gong-yu, Li
- Published
- 2003
- Full Text
- View/download PDF
41. Study on Sleep Quality and Learning Outcomes of College Students
- Author
-
Jia-Li, Tian, primary, Ji-Lin, Li, additional, and Jian-Zhao, Niu, additional
- Published
- 2012
- Full Text
- View/download PDF
42. A Steady-state Trio for Bretherton Equation
- Author
-
Zhao Niu, Zeng Liu, and Jifeng Cui
- Subjects
Physics ,Steady state (electronics) ,0103 physical sciences ,Mathematical analysis ,General Physics and Astronomy ,Physical and Theoretical Chemistry ,010306 general physics ,01 natural sciences ,Mathematical Physics ,Homotopy analysis method ,010305 fluids & plasmas - Abstract
To investigate if steady-state resonant solution exist for any system of weakly interacting waves in a dispersive medium, a trio is considered in the Bretherton equation based on the homotopy analysis method (HAM). Time-independent spectrum was found when all components were travelling in the same direction. Within the trio, the amplitude of longer component is larger than that of shorter one. As the difference of wave number between components in trio increases or the nonlinearity of whole system increases, the amplitudes of all components tends to increase simultaneously. These findings are helpful to enrich and deepen our understanding about resonant solutions in any dispersive medium, especially for a two-dimensional scenario.
- Published
- 2016
43. Structural Design and Multi-objective Optimization of Planetary Frame for 6T40E Automatic Transmission
- Author
-
Zhao Niu and Huang Zhao-ming
- Subjects
Automatic transmission ,Computer science ,law ,Real-time computing ,Frame (networking) ,Multi-objective optimization ,law.invention - Published
- 2019
44. Research on Non-cooperative Topology Inference Method Based on Node Location Information
- Author
-
Zhao Niu, Tao Ma, Qiang Li, and Lin Jiang
- Subjects
Access network ,Network packet ,Computer science ,business.industry ,Wireless ad hoc network ,Node (networking) ,Inference ,020206 networking & telecommunications ,Topology (electrical circuits) ,02 engineering and technology ,Network topology ,Identification (information) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Computer network - Abstract
Topology is the basis of connectivity analysis and critical nodes identification for Ad Hoc network. The existing methods of topology inference are divided into two types: cooperative and non-cooperative. The cooperative inference methods are usually based on the premise of network access. It usually needs to send a large number of detection packets, and the operation cost is large. The non-cooperative inference methods are usually based on the analysis of a large number of detection data, but the data acquisition is difficult and takes a long time. From the view of coverage, this paper inferred the physical topology of Ad Hoc network with critical transmission distance under the condition that the location information and the number of nodes, the size of the deployment area are known. The simulation results on Exata demonstrate the feasibility of the inference method.
- Published
- 2018
45. Environmental Risk Controllability and Management of VOCs during Remediation of Contaminated Sites
- Author
-
Bingbing Wang, Xiaoyan Ma, Yu Wu, Zhao Niu, Pin Hou, Yan Yu, and Jianli Jia
- Subjects
Risk management plan ,010504 meteorology & atmospheric sciences ,Waste management ,business.industry ,Environmental remediation ,Health, Toxicology and Mutagenesis ,Soil vapor extraction ,Soil Science ,010501 environmental sciences ,Contamination ,01 natural sciences ,Pollution ,Controllability ,Environmental risk ,Environmental Chemistry ,Environmental science ,Risk assessment ,business ,Risk management ,0105 earth and related environmental sciences - Abstract
The environmental risk controllability assessment system and its method of controlling volatile organic compounds (VOCs) during remediation of contaminated sites are established in this article based on soil vapor extraction (SVE) technology. According to the properties of VOCs and the technical and operational characteristics of the site remediation process, the environmental risk controllability index system includes environmental risk identification, risk source analysis, and risk assessment. Environmental risk management during site remediation was focused on technical control methods and engineering control technologies. Specifically, acceptance based on risk management was suitable for low-risk levels such as RRI3 and RRI4. Furthermore, control methods for high-level risk (RRI1 or RRI2) could be developed along with transformation and control, combined with the necessary emergency risk plan.
- Published
- 2016
46. Multi-PaaS Oriented IoT Dual Middleware Model in 5G Era
- Author
-
Shuai Huang, Shejiao Hu, Lin Wu, Zhao Niu, and Zhengfeng Hou
- Subjects
History ,Computer architecture ,Computer science ,business.industry ,Middleware ,DUAL (cognitive architecture) ,Internet of Things ,business ,5G ,Computer Science Applications ,Education - Abstract
The PaaS platform based on cloud computing technology provides a large number of professional and flexible services in the fields of intelligent voice and computer vision. The large-scale application of 5G technology enables the software and hardware of the Internet of Things to use the PaaS service to improve the intelligence level of the system and reduce development costs. However, the problem of service invocation and service selection in the process of combining the IoT system with multiple PaaS platforms directly affects the interaction between the IoT perception layer and the application layer. This paper proposes a 5G multi-PaaS-oriented IoT dual middleware model. The unified communication protocol DMCP is designed. DMCP implements unified parsing of messages based on variable-length data items, which reduces the protocol conversion between the perception layer terminal device and multiple PaaS platforms. Complexity and high communication efficiency. Designed the PaaS service selection algorithm DMPS, DMPS comprehensively according to the equipment demand preferences and the overall performance of PaaS services, to achieve accurate service selection in the multi-PaaS platform at the application layer. Finally, examples and comparative tests verify the feasibility and effectiveness of the proposed model, protocol and algorithm.
- Published
- 2020
47. Software Architecture Analysis of Intelligent Distribution and Transformation Terminal Based on Container Technology
- Author
-
Yanrong Jiang, Zhao Niu, Shejiao Hu, and Lin Wu
- Subjects
History ,Service (systems architecture) ,business.industry ,Computer science ,Field (computer science) ,Computer Science Applications ,Education ,Transplantation ,Smart grid ,Terminal (electronics) ,Container (abstract data type) ,State (computer science) ,business ,Software architecture ,Computer network - Abstract
Ubiquitous power Internet of things is an important direction of the development of smart grid, and distribution Internet of things is the application of ubiquitous power Internet of things in the field of distribution. As the terminal unit of state perception, intelligent decision-making and control subject in the distribution Internet of things, intelligent distribution and transformation terminal is the foundation to realize the distribution Internet of things. In order to solve the problems of complex software architecture of traditional distribution and transformation terminal, which is not conducive to expansion, maintenance and transplantation, Microservice + container technology is adopted as the software architecture of intelligent distribution and transformation terminal, which reduces the complexity of development, improves the efficiency of operation and maintenance, and meets the diverse and rapidly changing service requirements of distribution network.
- Published
- 2020
48. Adaptively truncated clutter-statistics-based variability index constant false-alarm-rate detector in SAR imagery
- Author
-
Zhao Niu, Weidong Shi, Fang Zhou, Hang Yang, Jinling Zhao, and Jiaqiu Ai
- Subjects
Synthetic aperture radar ,Computer science ,business.industry ,Statistical parameter ,Estimator ,Pattern recognition ,law.invention ,Constant false alarm rate ,law ,Outlier ,General Earth and Planetary Sciences ,Clutter ,Truncation (statistics) ,Artificial intelligence ,Radar ,business - Abstract
Since sea clutter samples are often contaminated by high-intensity outliers, target detection in nonhomogeneous sea clutter environments is challenging. An adaptively truncated clutter-statistics-based variability index constant false-alarm-rate (TSVI-CFAR) detector of Gaussian clutter in synthetic aperture radar (SAR) imagery is proposed. The proposed method is designed to improve the CFAR detection performance in a heterogeneous multitarget environment. TSVI-CFAR consists of three stages, i.e., clutter truncation, statistical parameter estimation, and CFAR detection. In the clutter truncation stage, the high-intensity outliers in the background window are eliminated through an adaptive threshold-based clutter truncation method. In the statistical parameter estimation stage, the parameters can be accurately estimated through the maximum-likelihood estimator. In the detection stage, the clutter background is categorized using the adaptively truncated clutter. Different types of CFAR detection methods are applied to the pixels under test of the categorized backgrounds. TSVI-CFAR has a higher detection rate and a low observed false alarm rate. The effectiveness of the proposed algorithm is demonstrated using Gaofen-3 SAR data and Envisat-ASAR data.
- Published
- 2020
49. Research on Topology Inference Method for Ad Hoc Network Simulation on Exata
- Author
-
Zhao Niu, Lin Jiang, Tao Ma, and Xiao-feng Zhong
- Subjects
business.industry ,Wireless ad hoc network ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Process (computing) ,Inference ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Visualization ,0508 media and communications ,Ad hoc On-Demand Distance Vector Routing ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
Exata has excellent performance in wireless communication, but in the process of Ad Hoc network simulation, it can not realize the inference and visualization of network topology. In this paper, we analyze the AODV protocol, and use the information contained in the RREP message to realize the inference of the network topology. The experimental results prove the feasibility of the method.
- Published
- 2018
50. Identification of Critical Nodes in Ad-hoc Network Based on Topology Optimization
- Author
-
Kun Zhang, Tao Ma, Zhi Li, and Zhao Niu
- Subjects
Computer science ,Wireless ad hoc network ,business.industry ,Delaunay triangulation ,Topology optimization ,020206 networking & telecommunications ,Topology (electrical circuits) ,02 engineering and technology ,Network topology ,01 natural sciences ,Connected dominating set ,Identification (information) ,Betweenness centrality ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,010306 general physics ,business ,Computer network - Abstract
Critical nodes have global significance for the network, the existing methods on the identification of critical nodes in Ad-hoc network usually based on the premise of topology is known, considering that there exists a link if the two nodes are in the other’s communication range, so the topology we get at last is relatively complex, but there are many links that aren’t exist in real which leading the identification of critical nodes with deviation. For this problem, in the paper we used Delaunay triangulation to optimize the network topology, based on identifying virtual backbone nodes by the unified connected dominating set, we measured the importance of the nodes by the average betweenness centrality. Experimental results show that the method proposed can identify the critical nodes in Ad-hoc networks effectively.
- Published
- 2018
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.