As an important stratum of exploration in the Tarim Basin, which is the largest petroleum basin in China, Yingshan Formation has great potential. The relationship between the fine division of ...microfacies and reservoir space characteristics has not been systematically studied which restricts further exploration. On the basis of the analysis of core, thin section, logging data, imaging logging data (FMI), and field outcrop, the microfacies types and reservoir space characteristics of the Ordovician Yingshan Formation are systemically studied. The results show that (1) nine microfacies (Mf1-Mf9) and four microfacies associations (MA1-MA4) were identified within the Ordovician Yingshan Formation. MA1-MA2 represent a medium- to high-energy sedimentary background, and MA3-MA4 represent a medium- to low-energy sedimentary background. (2) Four reservoir space types were observed in the Yingshan Formation, which are dominated by fracture-dissolution pore type, followed by small dissolution vug type, seldom fracture type, and large-scale karst-cavity type. (3) High-energy microfacies are the material basis of favorable reservoirs. The high-energy microfacies associations are prone to small dissolution vug and fracture-dissolution pore types of reservoirs; large cave reservoirs can sometimes be developed in the high part of the sequence and form favorable reservoirs in the Yingshan Formation. The low-energy microfacies associations mostly appear as original strata or interlayer, but after the superposition of structural cracks, buried karsts, or epigenetic karsts, low-energy microfacies associations may form relatively small-scale fractured and fracture-dissolution pore types of reservoirs in this area.
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
Through comparison and logical analysis, the author expounds the basic concepts and components of the physical education ecosystem are expounded, the SFIC physical education ecosystem model is ...established, and a student sports performance warning method based on machine learning is proposed. In view of the heterogeneous student behavior data, data preprocessing technology is adopted to preprocess sample data, and data characteristics are extracted based on knowledge points and item types. A sports achievement warning model (K-DNN) based on knowledge points and item types is established, and the students’ sports achievement warning model is designed and implemented. The experimental results show that, compared with DNN algorithm, Adaboost and ridgeregregression, K-DNN algorithm has the highest accuracy in predicting Ac and the lowest mean square error in predicting MS, indicating that K-DNN model has higher accuracy and better motion prediction effect.
A freely tunable polarization rotator for broadband terahertz waves is demonstrated using a three‐rotating‐layer metallic grating structure, which can conveniently rotate the polarization of a ...linearly polarized terahertz wave to any desired direction with nearly perfect conversion efficiency. This low‐cost, high‐efficiency, and freely tunable device has potential applications as material analysis, wireless communication, and THz imaging.
Full text
Available for:
BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
Task admission is critical to delay-sensitive applications in mobile edge computing, but is technically challenging due to its combinatorial mixed nature and consequently limited scalability. We ...propose an asymptotically optimal task admission approach which is able to guarantee task delays and achieve (1-ϵ)-approximation of the computationally prohibitive maximum energy saving at a time-complexity linearly scaling with devices. ϵ is linear to the quantization interval of energy. The key idea is to transform the mixed integer programming of task admission to an integer programming (IP) problem with the optimal substructure by pre-admitting resource-restrained devices. Another important aspect is a new quantized dynamic programming algorithm which we develop to exploit the optimal substructure and solve the IP. The quantization interval of energy is optimized to achieve an O(ϵ), O(1/ϵ)-tradeoff between the optimality loss and time complexity of the algorithm. Simulations show that our approach is able to dramatically enhance the scalability of task admission at a marginal cost of extra energy, as compared with the optimal branch and bound method, and can be efficiently implemented for online programming.
Anatomy of Threats to the Internet of Things Makhdoom, Imran; Abolhasan, Mehran; Lipman, Justin ...
IEEE Communications surveys and tutorials,
01/2019, Volume:
21, Issue:
2
Journal Article
Peer reviewed
Open access
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e-Health, ...e-Commerce, smart cities, supply chain management, smart cars, cyber physical systems (CPS), and a lot more. Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed, and analyzed. The big data analytics is no doubt beneficial for business development. However, at the same time, numerous threats to the availability and privacy of the user data, message, and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical compromise of devices pose a significant danger to the sustenance of IoT. This paper thus endeavors to highlight most of the known threats at various layers of the IoT architecture with a focus on the anatomy of malware attacks. We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT, including ICS and CPS. We also deduce an attack strategy of a distributed denial of service attack through IoT botnet followed by requisite security measures. In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and some open research challenges.
This paper investigates threshold-constrained joint waveform optimization for an integrated sensing and communication (ISAC) system. Unlike existing studies, we employ mutual information (MI) and sum ...rate (SR) as sensing and communication metrics, respectively, and optimize the waveform under constraints to both metrics simultaneously. This provides significant flexibility in meeting system performance. We formulate three different optimization problems that constrain the radar performance only, the communication performance only, and the ISAC performance, respectively. New techniques are developed to solve the original problems, which are NP-hard and cannot be directly solved by conventional semi-definite programming (SDP) techniques. Novel gradient descent methods are developed to solve the first two problems. For the third non-convex optimization problem, we transform it into a convex problem and solve it via convex toolboxes. We also disclose the connections between three optimizations using numerical results. Finally, simulation results are provided and validate the proposed optimization solutions.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
This review summarizes and describes the use of curcumin in diagnosis, prevention, and treatment of Alzheimer's disease. For diagnosis of Alzheimer's disease, amyloid-β and highly phosphorylated tau ...protein are the major biomarkers. Curcumin was developed as an early diagnostic probe based on its natural fluorescence and high binding affinity to amyloid-β. Because of its multi-target effects, curcumin has protective and preventive effects on many chronic diseases such as cerebrovascular disease, hypertension, and hyperlipidemia. For prevention and treatment of Alzheimer's disease, curcumin has been shown to effectively maintain the normal structure and function of cerebral vessels, mitochondria, and synapses, reduce risk factors for a variety of chronic diseases, and decrease the risk of Alzheimer's disease. The effect of curcumin on Alzheimer's disease involves multiple signaling pathways: anti-amyloid and metal iron chelating properties, antioxidation and anti-inflammatory activities. Indeed, there is a scientific basis for the rational application of curcumin in prevention and treatment of Alzheimer's disease.
The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. ...Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
The newly emerged severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) Omicron sublineages, including the BA.2-derived BA.2.75.2 and the BA.5-derived BQ.1.1 and XBB.1, have accumulated ...additional spike mutations that may affect vaccine effectiveness. Here we report neutralizing activities of three human serum panels collected from individuals 23-94 days after dose 4 of a parental mRNA vaccine; 14-32 days after a BA.5 bivalent booster from individuals with 2-4 previous doses of parental mRNA vaccine; or 14-32 days after a BA.5 bivalent booster from individuals with previous SARS-CoV-2 infection and 2-4 doses of parental mRNA vaccine. The results showed that a BA.5 bivalent booster elicited a high neutralizing titer against BA.4/5 measured at 14-32 days after boost; however, the BA.5 bivalent booster did not produce robust neutralization against the newly emerged BA.2.75.2, BQ.1.1 or XBB.1. Previous infection substantially enhanced the magnitude and breadth of BA.5 bivalent booster-elicited neutralization. Our data support a vaccine update strategy that future boosters should match newly emerged circulating SARS-CoV-2 variants.
Full text
Available for:
GEOZS, IJS, IMTLJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK, ZAGLJ
Mobile edge computing is of particular interest to Internet of Things (IoT), where inexpensive simple devices can get complex tasks offloaded to and processed at powerful infrastructure. Scheduling ...is challenging due to stochastic task arrivals and wireless channels, congested air interface, and more prominently, prohibitive feedbacks from thousands of devices. In this paper, we generate asymptotically optimal schedules tolerant to out-of-date network knowledge, thereby relieving stringent requirements on feedbacks. A perturbed Lyapunov function is designed to stochastically maximize a network utility balancing throughput and fairness. A knapsack problem is solved per slot for the optimal schedule, provided up-to-date knowledge on the data and energy backlogs of all devices. The knapsack problem is relaxed to accommodate out-of-date network states. Encapsulating the optimal schedule under up-to-date network knowledge, the solution under partial out-of-date knowledge preserves asymptotic optimality, and allows devices to self-nominate for feedback. Corroborated by simulations, our approach is able to dramatically reduce feedbacks at no cost of optimality. The number of devices that need to feed back is reduced to less than 60 out of a total of 5000 IoT devices.