L’INRA Maroc dispose d’importantes collections d’agrumes localisées au niveau de plusieurs sites du royaume. Le germoplasme des agrumes offre une large gamme ressource de gènes liés à la résistance ...aux maladies, aux stress, à la production, à la qualité des fruits, etc., essentiels pour l’amélioration génétique. Certaines variétés potentielles pourraient intéresser les producteurs. Dans la présente étude, vingt-trois accessions de citronnier (Citrus limon L. Burm. F.) plantées au niveau de la collection d’El Menzeh, ont été caractérisés sur la base de la morphologie des feuilles, des fleurs et des fruits, à l’aide de descripteur prescrit pour les agrumes par (IPGRI) ‘International Plant Genetic Resources Institute’ et de l’Union de Protection des Obtentions végétales (UPOV). Les résultats de l’analyse de la variance des variables morpho-pomologiques ont montré une différence significative entre les accessions. Seulement les paramètres morphologiques des feuilles, des fruits ainsi que la couleur de l’écorce du fruit ont montré une variabilité élevée. De même, l’analyse chimique des jus a révélé des différences significatives entre les accessions. Les données ont démontré que l’acidité variait de 0,1 % pour les citrons Doux et Butnal à 6,6 % pour Kennedy. Tandis que les accessions de citrons Kerkachi, Butnal, Cascade et Allen présentaient les teneurs les plus élevées aussi bien en sucre qu’en jus. De même, les accessions Doux acide, Dellys et Kennedy montraient des fruits avec un calibre important. Enfin, les accessions Lisbon, Eureka, Corregia, Ba Ahmed et Valence possédaient des fruits avec un faible nombre de graines voir nul. Notre étude a démontré qu'il existait une variabilité pomologique acceptable parmi les accessions de citrons cultivés au Maroc. Les citrons Butnal, Allen, Cascade, Doux acide, Dellys, Kennedy, Lisbon, Eureka, Corregia, Ba Ahmed et Valence étaient prometteur en termes de qualité. Ce qui en fait une ressource génétique importante pour tout programme futur concernant les citrons pour élargir la diversification variétale pour amélioration de la productivité et la compétitivité des agrumes. Enfin, l’utilisation des marqueurs moléculaires est nécessaire pour compléter ce travail et pour une meilleure différenciation des individus étroitement apparentés.
In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly ...common evasive method is to hide the malicious activity behind a benign program by using tools that are already installed on user computers. These programs are usually part of the operating system distribution or another user-installed binary, therefore this type of attack is called “Living-Off-The-Land”. Detecting these attacks is challenging, as adversaries may not create malicious files on the victim computers and anti-virus scans fail to detect them.
We propose the design of an Active Learning framework called LOLAL for detecting Living-Off-the-Land attacks that iteratively selects a set of uncertain and anomalous samples for labeling by a human analyst. LOLAL is specifically designed to work well when a limited number of labeled samples are available for training machine learning models to detect attacks. We investigate methods to represent command-line text using word-embedding techniques, and design ensemble boosting classifiers to distinguish malicious and benign samples based on the embedding representation. We leverage a large, anonymized dataset collected by an endpoint security product and demonstrate that our ensemble classifiers achieve an average F1 score of 96% at classifying different attack classes. We show that our active learning method consistently improves the classifier performance, as more training data is labeled, and converges in less than 30 iterations when starting with a small number of labeled instances.
The developed world is experiencing a rapid change in terms of technology due to Artificial Intelligence, Deep Learning, and the Internet of Things. However, in the developing countries, the industry ...devices are operated on manual control, therefore industries required fmances and men's power to manage electronic machines. This work aims to provide automated control to the industry devices by developing an Embedded System (ES) that is further coupled with a personal computer (PC) to regulate the status of devices. The status (OFF/ON) of the devices can be seen on the web browser. Moreover, we have developed a Graphical User Interface (GUI) is in HTML to see the status of devices online. The GUI is equipped with a secure mechanism by including a separate login page and password to access the control. It ensures that only authorized individuals can access and monitor the status of connected devices. The proposed architecture is capable of providing ease to the offices, industry and homes by providing remote access to the system. Additionally, the GUI can be opened on smartphones, laptops, tablets due to autonomous control. The proposed system is energy-efficient, robust, and affordable as compared to the existing automation systems.
In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly ...common evasive method is to hide the malicious activity behind a benign program by using tools that are already installed on user computers. These programs are usually part of the operating system distribution or another user-installed binary, therefore this type of attack is called "Living-Off-The-Land". Detecting these attacks is challenging, as adversaries may not create malicious files on the victim computers and anti-virus scans fail to detect them. We propose the design of an Active Learning framework called LOLAL for detecting Living-Off-the-Land attacks that iteratively selects a set of uncertain and anomalous samples for labeling by a human analyst. LOLAL is specifically designed to work well when a limited number of labeled samples are available for training machine learning models to detect attacks. We investigate methods to represent command-line text using word-embedding techniques, and design ensemble boosting classifiers to distinguish malicious and benign samples based on the embedding representation. We leverage a large, anonymized dataset collected by an endpoint security product and demonstrate that our ensemble classifiers achieve an average F1 score of 0.96 at classifying different attack classes. We show that our active learning method consistently improves the classifier performance, as more training data is labeled, and converges in less than 30 iterations when starting with a small number of labeled instances.
In this article, we present two techniques of commands DTC (direct torque control) and DPC (direct power control), applied to in the system for converting wind energy with storage. The use of the ...wind generator is based on a double fed induction Generator (DFIG) where the stator is connected directly to the network and the rotor is connected to the network through the power converter. The Flywheel Energy Storage System (FESS) based on a flywheel, an induction machine (IM) and an electronic power converter is associated with the wind generator via the DC bus. The two converters side DFIG and the (FESS) are controlled by the DTC. The three-level converter side electricity grid which ensures constant DC bus voltage is controlled by the DPC. In the literature, this control strategy has been frequently used for the two levels converter. The direct control of these systems has purpose to eliminate the block of pulse width modulation and loops of regulations internal controlled variables. The use of switching table makes the system more efficient from the technical and economic view.
Background: Modulation of ischemia-dependent pathways alters electrophysiological evolution of ventricular fibrillation(VF).
Hypothesis: 1)There is regional disease-related expression of ...KATP-channels in human cardiomyopathic hearts. 2)KATP-channel blockade promotes spontaneous VF termination by attenuating spatiotemporal dispersion of refractoriness(ΔERP).
Methods and Results: Electric mapping of control(n=6) and treatment(n=9) (10 μmol/L glibenclamide) isolated human cardiomyopathic hearts was performed. Spontaneous defibrillation and KATP-subunit gene expression were studied. Spontaneous VF termination occurred in 1/6 control and 7/8 treated hearts (P=0.026). After 180 seconds of ischemia, LV transmural dispersion in VF cycle length was observed(p=0.001), which was attenuated by glibenclamide. There was greater gene expression of all KATP-subunit on the endocardium compared with the epicardium(P<0.02). In ischemic rat heart model, ΔERP was verified with pacing protocols (36±5ms vs 4.9±4ms, p=0.019).
Conclusions: KATP channel subunit gene expression is heterogeneously altered in the cardiomyopathic human heart. Blockade of KATP channels promotes spontaneous defibrillation by attenuating ischemia-dependent ΔERP during VF.
Value Stream Mapping (VSM) has been used for decades to increase the efficiency and optimization of a production process but nobody uses this technique to optimize and identify the bottlenecks in a ...development of R&D prototyping. Prototyping is one of the most significant parts of new product development process. Prototyping is costly and time consuming, it is vastly concerned for a SME company because of their small budget for their R&D. The purpose of this research was to investigate how possibly a company will use a method to improve or advances their new product's development process for their upcoming product line and reduce their time to market. In this research paper, a novel framework has been used to apply Value Stream Mapping to the new products developed by their R&D team. Value Stream Mapping is one of the best tools to map a process and to identify its main criticalities. The proposed approach is based on three iterative steps and integrates Value Stream Mapping with other tools typical of industrial engineering. The essential thought is to execute a preliminary analysis to recognize new 'critical R&D product development path' utilizing the equivocated basic information such as Bill of Material. At that point, enhancements are made thinking about all conceivable offering to other auxiliary ways as possible limitations. As soon as the critical path has been optimized, a new trail may become critical. In this manner, the analysis continues iteratively until the completely optimized. The result after implementing VSM as company's new product development by R&D team shows that there were improvement possibilities in time and cost up to 80 and 70 percent respectively.
A research article recommendation approach aims to recommend appropriate research articles to analogous researchers to help them better grasp a new topic in a particular research area. Due to the ...accessibility of research articles on the web, it is tedious to recommend a relevant article to a researcher who strives to understand a particular article. Most of the existing approaches for recommending research articles are metadata-based, citation-based, bibliographic coupling-based, content-based, and collaborative filtering-based. They require a large amount of data and do not recommend reference articles to the researcher who wants to understand a particular article going through the reference articles of that particular article. Therefore, an approach that can recommend reference articles for a given article is needed. In this paper, a new multi-level chronological learning-based approach is proposed for recommending research articles to understand the topics/concepts of an article in detail. The proposed method utilizes the TeKET keyphrase extraction technique, among other unsupervised techniques, which performs better in extracting keyphrases from the articles. Cosine and Jaccard similarity measures are employed to calculate the similarity between the parent article and its reference articles using the extracted keyphrases. The cosine similarity measure outperforms the Jaccard similarity measure for finding and recommending relevant articles to understand a particular article. The performance of the recommendation approach seems satisfactory, with an NDCG value of 0.87. The proposed approach can play an essential role alongside other existing approaches to recommend research articles.