Assessing the Quality of Dried Squid

Research:

Nondestructive detection of multiple dried squid qualities by hyperspectral imaging combined with 1D-KAN-CNN

Abstract: Given that dried squid is a highly regarded marine product in Oriental countries, the global food industry requires a swift and noninvasive quality assessment of this product. The current study therefore uses visible­near-infrared (VIS-NIR) hyperspectral imaging and deep learning (DL) methodologies. We acquired and preprocessed VIS-NIR (400­1000 nm) hyperspectral reflectance images of 93 dried squid samples. Important wavelengths were selected using competitive adaptive reweighted sampling, principal component analysis, and the successive projections algorithm. Based on a Kolmogorov-Arnold network (KAN), we introduce a one-dimensional, KAN convolutional neural network (1D-KAN-CNN) for nondestructive measurements of fat, protein, and total volatile basic nitrogen….

Posted on September 12, 2025 at 5:05 PM29 Comments

Comments

lurker September 12, 2025 8:29 PM

Nondestructive? Interesting … The only way to import dried squid to NZ is in sealed plastic bags. Until now there has been no way to test the quality of the product before it went into the bag, except by opening the bag. So when will this new method be available for the average shopper?

ResearcherZero September 12, 2025 8:39 PM

Enforced Cultural Amnesia

“The struggle of man against power is the struggle of memory against forgetting.”
~ Milan Kundera

According to a BBC article, Reality TV is a wonderful thing which changed the way we think.

Reality TV ideology, for Reality TV people, living in a Reality TV world.
How can we understand our present and future if we cannot remember our own shared past?

‘https://bigthinkbooks.substack.com/p/breaking-taboos-and-blurring-truths

The policy of “legitimate” force and institutionalized violence by the state.
https://giorgiochambers.substack.com/p/imposed-memory-and-imposed-forgetting

ResearcherZero September 12, 2025 9:10 PM

The fragmentation of culture is exacerbated by technology.

‘https://bohotude.com/cultural-amnesia-why-forgetting-our-past-could-cost-us-our-future/

Our reference point is framed by the location in which we are confined and the information we receive. How we view the place in which we live is shaped by what we accept as “normal”.
https://encyclopedia.uia.org/problem/cultural-amnesia

Machine learning will hand immense power to those who can control what is remembered and what is forgotten. States may enforce cultural assimilation and repression. The collective memories of generations of students and adults could be repressed, erased and replaced.
https://link.springer.com/article/10.1007/s00146-025-02308-8

ResearcherZero September 12, 2025 11:43 PM

With the fragmentation of culture and society comes the loss of knowledge and skills.

There is a growing shortage of botanists.

Professions and industries rely on botanical knowledge, yet fewer people are studying to become botanists. Botany has been cut from many universities in many countries as funding and government support for the subject has dwindled at a time when the practice is vital.

Many regions now cannot find botanists to do crucial work as the number of professionals in the field shrinks while practicing botanists continue to retire.

‘https://therevelator.org/botanists-endangered/

Plastic particles are disrupting the ability of plants to photosynthesize and grow.
https://www.frontiersin.org/journals/plant-science/articles/10.3389/fpls.2025.1670247/full

The diversity of plant species used in agriculture is critical to national security.
https://www.csis.org/analysis/seeding-security-why-agrobiodiversity-loss-threatens-national-security

“Plant Blindness”

Despite the importance of plants, most people cannot distinguish one from another.
https://theconversation.com/botanists-are-disappearing-just-when-the-world-needs-them-most-186849

ResearcherZero September 13, 2025 12:14 AM

Wild plants are valuable genetic resources for producing stress tolerant and disease resistant crops. Biodiversity loss threatens this critically important resource.

The very populations of insect and animal species that plants require in order to fruit and propagate are under threat. Half of all plants rely on animals to disperse their seeds. In North America almost a quarter of pollinators are at risk. Cuts to educational funding and research are endangering human health and security as biodiversity threats grow. Invasive species now also threaten food security globally.

‘https://theconversation.com/today-more-than-ever-biodiversity-needs-single-species-conservation-263023

Tropilaelaps mercedesae, a new bee parasite, threatens agriculture globally.
https://www.independent.co.uk/news/science/parasite-honeybee-tropi-varroa-destructor-b2823760.html

Scientific efforts in a number of regions of the world are now desperately needed.
https://www.kew.org/about-us/press-media/global-plant-diversity-darkspots

Plant breeding to ensure food security has been practiced since the dawn of civilization.
https://onlinelibrary.wiley.com/doi/full/10.1111/ppl.70014

Kolmogorov September 14, 2025 2:54 AM

Wow, another method is just to buy and sample different kinds of dried squid you’re interested in

ResearcherZero September 14, 2025 5:39 AM

Surveilling online comments and messaging app chat, China is planning to recruit former US federal employees and other useful individuals with fake websites and job offers.

There are concerns that staffing and funding cuts will only add to the complications that come with degraded intelligence capabilities, which will leave government, businesses and the public exposed to greater espionage, foreign influence, cyber and terror threats.

New agents preparing for undercover work were also burned when their names were sent by unsecured email to the White House. Following discussions by officers about the implications of burning and firing so many people from sensitive areas, including more than 100 spies, Tulsi Gabbard implied that she viewed the discussions as a “threat”.

‘https://www.nextgov.com/cybersecurity/2025/09/suspected-chinese-operation-aims-recruit-former-feds-job-postings-research-shows/407970/

Rolling out the red carpet…

ODNI’s Cyber Threat Intelligence Integration Center (CTIIC) will be shut and many of its other functions will also be reduced and downgraded.

CTIIC pools cyber threat and real-time cyber intelligence from other agencies and Five Eyes for decision makers. ODNI intelligence sharing, counterintelligence and counterterrorism centers will also be reduced in scope and size, undermining the ability to detect threats.

ODNI is the central hub for coordinating intelligence from agencies and allied nations.
https://www.defenseone.com/policy/2025/09/odni-likely-curtail-counterintelligence-center-latest-shake/408035/

Clive Robinson September 14, 2025 2:49 PM

@ Bruce, ALL,

This is not just predictable it’s also funney that people might think it would ve otherwise,

“The Software Engineers Paid to Fix Vibe Coded Messes”

https://www.404media.co/the-software-engineers-paid-to-fix-vibe-coded-messes/

From the articles author’s point of view,

“Freelance developers and entire companies are making a business out of fixing shoddy vibe coded software.”

From my point,

“And so the sausage machine barfs out, that which not be consumed”.

Which is, if people would be actually honest, about it not at all unexpected. But because what feels like every decade somebody comes up with some “New Gee Zizz Idea” to turn Managers into Software engineers that never works…

KC September 14, 2025 4:44 PM

Using ML and LLMs to Analyze Fume Events

Reporters used ML and LLMs to run an analysis on fume events in airplane cabins over the last 15 years, since the FAA and airlines/manufacturers have not accounted for this publicly.

The Journal built a database of more than one million FAA ‘service difficulty reports’ detailing operational issues, limiting their analysis to the three largest planemakers. They trained a statistical model and created an LLM for the analysis.

They found that fume events have surged from about 12 to nearly 108 of every million flights over the last ten years. The later figure is about two flights a day in the US.

Part of this increase could be due to new guidance for reporting fume events. However, Airbus also drove much of this increase with their share rising from 32% to 57%.

Fume events are caused by engine oil and hydraulic fluid leaks into sections of the engine that help pull air into the cabin. Half an aircraft’s circulated air comes from this bleed air.

The effects of fume events can be mild. The scarier effects such as brain injuries may only manifest after prolonged or repeated exposure. Since masks don’t offer sufficient protection, the best thing to do is tell a crew member who is safety-trained. A plane can be diverted accordingly.

The industry has lobbied against installing sensors, which seems to add the most risk to pilots and crew.

Note that most smells reported in the SDRs didn’t qualify as fume events, some of which included muffins overheating in the galley oven. Likewise one of the most common hazes in a cabin is condensation from the air-conditioning system.

‘What You Need to Know About Fume Events on Airplanes’
https://www.wsj.com/business/airlines/air-travel-toxic-fumes-64839d6e

‘How the Journal Analyzed More Than One Million FAA Reports’
https://www.wsj.com/business/airlines/how-the-journal-analyzed-more-than-one-million-faa-reports-7e7e043a

ResearcherZero September 14, 2025 9:57 PM

Some information provided by government agencies will no longer be available in the future.

A surge in insurance premium cost in severe weather affected areas.

‘https://fortune.com/2025/09/03/housing-real-estate-climate-risk-insurance-12-7-trillion-one-in-four/

NOAA’s National Centers for Environmental Information will no longer update this product.
https://www.ncei.noaa.gov/access/billions/state-summary/US

ResearcherZero September 14, 2025 10:24 PM

Australian weather records may no longer be of use for climate predictions due to a rapidly changing Australian climate. Restrictions to US capabilities will add to the problem.

The United States owns half of the worlds ocean sensors and many other weather monitoring systems that have traditionally provided valuable meteorological data for forecasting. To adapt to these changes, new modelling and data collection will need to be developed.

‘https://www.smh.com.au/politics/federal/heat-deaths-to-soar-from-cascading-climate-risks-landmark-federal-report-warns-20250915-p5mv1v.html

One in 10 homes across Australia will be considered uninsurable by 2035, equating to around one million homes, according to climate change risk analysis modelling.

After holding off for three decades, Australia’s government has made its climate threat assessment public. In the worst affected regions, homes will become uninsurable. Risks to primary industries, critical infrastructure and a more than double the rate of death from increased communicable diseases, worsening floods, droughts and fires. Reduced crop yields, higher rates of livestock heat stress and biosecurity risk, with between 40-70% of native plant species exposed to climatic conditions that they do not currently experience. Freight costs for many remote and regional communities will double, with a greater risk of the loss of communications and critical infrastructure due to weather related disruption.

https://www.acs.gov.au/pages/national-climate-risk-assessment

ResearcherZero September 14, 2025 10:35 PM

Australia’s Bureau of Meteorology has had to reassess how it analyses the main drivers of weather variability due rapid warming of the oceans, influencing El Niño and La Niña.

How these two meteorological events have a dominant effect on weather has now changed.

‘https://www.abc.net.au/news/2025-09-09/climate-change-prompts-bom-el-nino-la-nina-analysis-overhaul/105753896

lurker September 15, 2025 12:48 AM

Keeping up with the footy scores is important, especially on a combat warship. I know this story is a year old, but it’s only just been brought to my notice:

‘https://www.independent.co.uk/news/world/americas/starlink-uss-manchester-satelite-marrero-b2609408.html

Clive Robinson September 15, 2025 3:23 PM

@ Ismar, ALL,

How low in the computing stack?

With regards, the attacks it’s important to note there is a very valid and mostly unavoidable reason for,

“they exploit memory safety vulnerabilities, which are interchangeable, powerful, and exist throughout the industry,”

In effect the memory sits quite a few levels in the computing stack below not just the ISA of the CPU, but below the CPU data and address busses and below the likes ob “the bus controllers” that give other functionality such as the “Memory Management Unit”(MMU) controller that allows the all important “Virtual Memory”(VM) that nearly all consumer and commercial multi-process OS’s need. The “Direct Memory Access”(DMA) controller that is essential for efficient I/O. And quite a number of other quite similar in base control design but seen as fundamentally from above in the controllers as you get toward the CPU layers.

The reason is for all the razamataz over minutia in specification differences in memory interfacing at the end of the day they are sufficiently broadly the same that an attack works against most memory regardless of the CPU layer and above. And also almost regardless of all the memory controllers as the closer the attack works toward the bottom of the stack the more wide ranging the targets that can be attacked.

Such attacks get seen as part of “bubbling up” attacks, in that like in a glass of champagne or similar the “attack bubble” grows as it bubbles upwards from the attack point way down to cause huge disruption at the surface. As with the gas in the wine such bubbles start at or as close to the molecular level as the attacker can reach and where human eyes can not see. In essence it was what the “Rowhammer Attack” was, the first that was well publicised in the modern era. Even though DMA attacks via serial and parallel IO lines “direct to memory bytes” were well known to electronic design engineers back in the late 1970’s and continued for decades with the likes of Apple’s FireWire and other interfaces.

Later, though harder, the attacks got expanded into MMU attacks of very great power. In essence handing over the entire CPU and memory to the attacker at one of those “Ring -3” and similarly named approximations.

The thing is that “bits of memory” are absolutely every thing to the CPU layer thus control the CPU’s behaviour in every way.

And there with-in is the “ultimate one ring” meme for geeky-nurds. That whilst very it is a very real threat, and makes a very good “SciFi Trope”, is in reality very difficult to effectively field.

For instance a Rowhammer Attack can actually be easily spotted on “bus signals” that radiate out usually loud and clear in the EM switching noise. Yes it can be made a little more covert but not by very much under current hardware constraints.

Other Rowhammer and other attacks can be limited by forms of “parity or ECC” hardware at the memory level of the stack and upwards.

The problem is not spotting memory changes, whilst doing it quickly and easily the real problem is that always,

“errors can slip through as not errors”.

No matter what the coding in the error checking for that byte/word of memory is used.

This means checking multidimensional checksums that cover multiple bytes/words. I was doing this in not just industrial systems, intrinsically safe and fail safe systems… I was doing it in “payloads” for launching and running independently from a launch or mother ship.

NASA put this sort of technology on the two Voyager probes if people want a famous time reference. But it was also done in the 1950’s and 60’s with some of the codes used coming out of mathematicians involved with GCHQ and belatedly NSA. Back at a time when even knowing “Linear Feedback Shift Register”(LFSR) taps were considered the equivalent of “munitions” or “state secrets” by some people…

not important September 16, 2025 5:37 PM

Japanese girl group release AI-assisted single after fan vote
https://www.bbc.com/news/articles/c1kwvlyrjyxo

=The results were announced live on Japanese TV – with the AI song, Omoide Scroll,
winning by more than 3,000 votes. “What? You’re kidding me!” Akimoto responded as the
scores were revealed.

For the AI songwriting contest, Google’s Gemini software was trained on Akimoto’s
writing style, including essays, vocabulary and songwriting techniques.

It then generated the lyrics for a new song and chose which of AKB48’s members (there are 43 in total) would perform the lyrics and choreography.

The song itself was completed and arranged by humans, although some Japanese media reports say the AI software was also responsible for the melody.

Akimoto followed the same process, and the two songs were put to a public vote, without
revealing which was which.=

ResearcherZero September 17, 2025 4:20 AM

There is an ongoing self propagating supply chain attack, spread through NPM packages.

Named after Shai-Hulud, the sandworm from Dune, the malware can scan for secrets, publish them and and then spread further while continuing the process using stolen NPM authentication tokens. The worm compromised 25 Crowdstrike packages, though those packages were detected and removed. The progress had slowed after the attack was detected, but developers should be careful to check that it does not spread, as it targets the top 20 from each victim’s account.

‘https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised

Clive Robinson September 17, 2025 5:31 AM

@ Research Zero, ALL,

“Another day a another duff dollar”

You note,

“There is an ongoing self propagating supply chain attack, spread through NPM packages.”

Serious yes, unexpected no.

But you forgot to mention,

1, Public restroom code repository.
2, JavaScript idiocy abounding.

At the simplest think of it as an “automated reaping” of “management avarice and stupidity”.

The notion of “code reuse” has always been the same as taking a jab off of a dirty needle using house hold kitchen drain products as faux adjuvants.

As they say,

“Who’ld have thunk”

So soon after Log4J, the mind has forgotten

But After all it was not just Log4J it was other well publicised “public code” issues that in effect had

“Cry havoc and let loose the dogs of war”

Moments. So you might have thought standards would have gone up not down…

I shall stop at this point to allow others to shovel in their “bucket of ashes”.

After all I’m told “the venting of the spleen” can be “most cathartic” especially when it’s a more senior spleen than yours you are venting 😉

ResearcherZero September 17, 2025 6:06 AM

@Clive

…starts shoveling 😁

Fortunately no-one at DOGE is into e-coins, software roll-outs, and dumping large amounts of sensitive data into test environments without following best practices. It is not like they fired so many people that they are now short of enough employees (suitably qualified) to properly manage the workload.

Recently DOGE announced it was awarding a large single contract to Workday for all the federal departments like OPM who require personnel management. Why use “outdated” software when you can use one platform that integrates third party customer relations management and other features, all under the one license? Workday has a Security and Trust page, plus a blog which is a little bit vague about the latest breach, but I’m ‘sure’ no-one at DOGE would fall for confidence tricks/social engineering.

They would never attempt to deploy in-house projects with a poorely secured supply chain, because of short and impractical deadlines.

Clive Robinson September 17, 2025 7:57 AM

@ ResearcherZero,

Just remember not to pet the laural sitting DOGiE, and say “nice DOGiE” because it might not be a suitable pet…

Because we can say for all the 5h1t it’s pooped around the place the DOGiE is neither “house broken” nor “safe around children”.

In fact it gives “street strays” a good name…

Perhaps the same policy as used for strays should be used…

If the owner does not pick the DOGiE up from the pound, pay the fine and spoilage etc within 48hours the owner rather than the DOGiE should get “the long sleep needle”…

not important September 17, 2025 5:46 PM

https://www.yahoo.com/news/articles/deepseek-evaluates-ai-models-frontier-093000763.html

=Chinese artificial intelligence start-up DeepSeek has conducted internal evaluations on the “frontier risks” of its AI models, according to a person familiar with the matter.

Frontier risks refer to AI systems that pose potentially significant threats to public safety and social stability.

“It’s a lot more risk-averse in China, where people might ask why you are releasing your model if you say the model is very dangerous, while in the US, [saying that] can help you raise money,” she said.

According to the Shanghai Artificial Intelligence Laboratory, one of China’s leading AI safety research institutes, powerful AI systems pose an “unprecedented challenge” for cybersecurity by potentially making cyberattacks much easier to plan and execute.

Powerful AI agents also posed self-replication risks, whereby they autonomously replicate their model weights and code onto other machines without human supervision, potentially leading to a loss of human control, it said in a July paper.

“Models possessing greater knowledge and problem-solving abilities are also more likely to be used for, or exhibit characteristics associated with, malicious activities, thereby posing higher security risks,” according to the paper, whose project scientific director was former JD.com director of AI research Zhou Bowen.

On Monday, a technical standards body associated with the Cyberspace Administration of China released an updated “AI Safety Governance Framework” that referenced the risk of AI systems becoming “self-aware” and escaping human control.

The framework also called for greater attention to the misuse risks surrounding open-source AI models.=

not important September 17, 2025 6:41 PM

@Clive
https://www.dw.com/en/the-2025-solar-storm-peak-should-we-be-worried/a-62539188

=The intensity of solar storms is classified into five levels by the US-based National Oceanic and Atmospheric Administration (NOAA): G1-G5. The G stands for the geomagnetic effects triggered by the plasma cloud. Level 5 corresponds to a very strong effect, while level 1 corresponds to a “minor” effect.

Now and then, a solar storm rushes to Earth, prompting a barrage of articles warning about potential disruption of the global power supply and phone and satellite communication.

According to author Sangeetha Abdu Jyothi, if a particularly strong solar storm crashed into the Earth, it would have the power to not only disrupt power grids and satellites, but also to paralyze the internet long term. She said our internet infrastructure is not designed to withstand severe solar storms.

Communication via unprotected satellites (like GPS navigation systems) and undersea cable repeaters, which are installed every 50 to 150 kilometers to amplify communication signals over long connection routes, is especially vulnerable. A very strong electromagnetic interference could completely paralyze the sensitive system.

Jyothi also provides concrete suggestions on how the internet infrastructure could be made more robust. One possibility, she said, would be to shift the internet infrastructure to the south, for example to Central and South America, because the northern latitudes are more susceptible to solar storms.

She also suggests shorter and therefore more resilient internet connections, such as in Europe and Asia, and the implementation of additional overhead cables, which are less vulnerable than long submarine cables requiring many repeaters.=

Q: How ‘and undersea cable repeaters’ could be affected? Is water acting as a shield?

Please provide Your opinion based on high expertise in thi area.

Clive Robinson September 18, 2025 2:13 AM

@ not important, ALL,

With regards,

“Now and then, a solar storm rushes to Earth, prompting a barrage of articles warning about potential disruption of the global power supply and phone and satellite communication.”

Yup, and we sometimes get hit by what was once described as,

“A metric shit ton of particles.”

The thing is mostly from our,

“down on the ground perspective”

It’s nearly all EM Radiation that has a low enough frequency so has next to zero effect on “biologics”.

However two things to note,

1, Society is now fairly dependent on “force multipliers” of very many kinds. Unfortunately they are all very much dependent on the movement of electrical charge (not that they need be).

2, The higher above the ground something is, the higher the frequency of the EM radiation to the point that even biologics will be detrimentally effected.

So you are at more danger with regards this aspect of Space Weather in an aircraft than a car. Though for any given distance you are in the aircraft less time than the car. So the lines on the graph are not linear enough to be intuitive to most people without quite a bit of other information.

But sometimes things are also very sensitive to even very small things thus can appear to be or are actually chaotic in nature.

For instance from the past couple of days we have,

https://m.youtube.com/watch?v=xzoxXGTDLyM

And the unexpected behaviour caused by “this little pit of blue” that gave a G3 Storm. That although we did feel it, as far as I’m aware –not that I’ve been looking– has not caused much of note.

Though with a bunch of radio blackouts and complex issues with Global Navigation Satellite Systems coming over the next few days… You might get insurance companies getting “My GPS told me the duck pond was the village carpark” stories 😉

With regards,

“undersea cable repeaters’ could be affected?”

Yup as can any long conductor running in the right direction.

At school you might well have been shown a very simple “cork and pin motor”. Where a magnetic field apparently drags the motor rotor into action.

The problem is the simplicity of what you would have been shown hides a lot of “technical details”.

Just one of which is if sufficient charge moves through a conductor then things start to warm up.

If they get too warm then those conductors become fuses, and things “burn out” with the induced current.

But also as the current goes up so does the voltage, and this can all to easily permanently damage the insulators in semiconductor junctions.

Whilst a body of water will screen out high frequency voltage signals.

Water does not screen magnetic fields at low frequencies…

So if protection devices are not functioning, or just not fitted, then things will suffer from the induced physical effects.

I can give you other info like why parts of North America are particularly vulnerable and why we can not always have protection devices that will work, but it will be “a lot of column inches”.

Just remember that at some point we will get hit by a “big one” and those charged particles will burn through to ground level taking any biologics with them. It’s not a question of if but when with the probability increasing with time.

not important September 19, 2025 5:23 PM

@Clive, @lurker: thank you very much for clarification/input.

@Clive: you said ‘Water does not screen magnetic fields at low frequencies.’

So, could this feature be utilized for submarine communications?

Have everybody a very good weekend!

Clive Robinson September 19, 2025 7:07 PM

@ not important, ALL,

With regards,

“So, could this feature be utilized for submarine communications?”

It already is.

1, VLF 3-30kHz allows comms to a depth of around 100ft, which is generally “to shallow”.
2, ELF 300-3000Hz to a depth of 300ft or more.
3, SLF 30-300Hz to all depths military submarines operate at.

However the length of the receiving antenna that has to be towed gets ridiculously long and is not a plain wire but is loaded along it’s length by coils of wire. Also the raw data rate is exceptionally low at about 0.1 of the carrier frequency. Encryption and error correction takes the raw data bandwidth down considerably.

In part due to this bandwidth issue and electrical storms, most of these submarine communications systems are encrypted with a form of “Perfect Secrecy” combined with “multi level error correction” wrapped in other “Forward Error Correction”(FEC).

Oh and now certain frequencies of Laser Diode have been advanced sufficiently… A form of “blue light laser is also used from aircraft or satellite systems.

The Chinese are known to be experimenting with “Quantum Key Distribution”(QKD) systems as part of a highly secure but low bandwidth network they hope to make “global” in various ways. I suspect that as with many highly frontier pushing technology China will get it going to an acceptable level (if they have not already done so).

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.