Patients with mild traumatic brain injury have a diverse clinical presentation,and the underlying pathophysiology remains poorly understood.Magnetic resonance imaging is a non-invasive technique that has been widely u...Patients with mild traumatic brain injury have a diverse clinical presentation,and the underlying pathophysiology remains poorly understood.Magnetic resonance imaging is a non-invasive technique that has been widely utilized to investigate neuro biological markers after mild traumatic brain injury.This approach has emerged as a promising tool for investigating the pathogenesis of mild traumatic brain injury.G raph theory is a quantitative method of analyzing complex networks that has been widely used to study changes in brain structure and function.However,most previous mild traumatic brain injury studies using graph theory have focused on specific populations,with limited exploration of simultaneous abnormalities in structural and functional connectivity.Given that mild traumatic brain injury is the most common type of traumatic brain injury encounte red in clinical practice,further investigation of the patient characteristics and evolution of structural and functional connectivity is critical.In the present study,we explored whether abnormal structural and functional connectivity in the acute phase could serve as indicators of longitudinal changes in imaging data and cognitive function in patients with mild traumatic brain injury.In this longitudinal study,we enrolled 46 patients with mild traumatic brain injury who were assessed within 2 wee ks of injury,as well as 36 healthy controls.Resting-state functional magnetic resonance imaging and diffusion-weighted imaging data were acquired for graph theoretical network analysis.In the acute phase,patients with mild traumatic brain injury demonstrated reduced structural connectivity in the dorsal attention network.More than 3 months of followup data revealed signs of recovery in structural and functional connectivity,as well as cognitive function,in 22 out of the 46 patients.Furthermore,better cognitive function was associated with more efficient networks.Finally,our data indicated that small-worldness in the acute stage could serve as a predictor of longitudinal changes in connectivity in patients with mild traumatic brain injury.These findings highlight the importance of integrating structural and functional connectivity in unde rstanding the occurrence and evolution of mild traumatic brain injury.Additionally,exploratory analysis based on subnetworks could serve a predictive function in the prognosis of patients with mild traumatic brain injury.展开更多
Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health systems.Deduplication eliminates the redundancy of duplicate blocks by storing one physical instance...Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health systems.Deduplication eliminates the redundancy of duplicate blocks by storing one physical instance referenced by multiple duplicates.Delta compression is usually regarded as a complementary technique to deduplication to further remove the redundancy of similar blocks,but our observations indicate that this is disobedient when data have sparse duplicate blocks.In addition,there are many overlapped deltas in the resemblance detection process of post-deduplication delta compression,which hinders the efficiency of delta compression and the index phase of resemblance detection inquires abundant non-similar blocks,resulting in inefficient system throughput.Therefore,a multi-feature-based redundancy elimination scheme,called MFRE,is proposed to solve these problems.The similarity feature and temporal locality feature are excavated to assist redundancy elimination where the similarity feature well expresses the duplicate attribute.Then,similarity-based dynamic post-deduplication delta compression and temporal locality-based dynamic delta compression discover more similar base blocks to minimise overlapped deltas and improve compression ratios.Moreover,the clustering method based on block-relationship and the feature index strategy based on bloom filters reduce IO overheads and improve system throughput.Experiments demonstrate that the proposed method,compared to the state-of-the-art method,improves the compression ratio and system throughput by 9.68%and 50%,respectively.展开更多
Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms...Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption generation.However,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features.Consequently,this leads to enhanced captioning network performance.In light of this,we present an image captioning framework that efficiently exploits the extracted representations of the image.Our framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language model.The VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features matrix.Subsequently,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative description.Integrating the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s performance.Using the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve performance.The implementation code can be found here:https://github.com/althobhani/VFDICM(accessed on 30 July 2024).展开更多
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e...Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.展开更多
Many theoretical derivation of the energy model requires extensive simulation in Internet of Things (IoT). Network Simulator 3 (ns-3) provides a simulation platform for various experimental studies including energy ha...Many theoretical derivation of the energy model requires extensive simulation in Internet of Things (IoT). Network Simulator 3 (ns-3) provides a simulation platform for various experimental studies including energy harvest.However, the function of charge schedule and wireless energy transfer model is not yet implemented. To address this problem, in this paper we propose an extension to ns-3 for simulating mobile charging with wireless energy transfer.First, we utilize a WET Harvest Class to harvest energy from the environment and a Charge Schedule Class for the mobile charger to choose the optimal node charging in the charging request queue in ns-3. Second, we use Charge Energy Model to judge what the mobile charger will do next when the energy of current node is higher or lower than energy threshold. Evaluation results show that our improvements are feasible and helpful with charge schedule and energy model in ns-3.展开更多
Visual analytics techniques are widely utilized to facilitate the exploration of online educational data.To help researchers better understand the necessity and the efficiency of these techniques in online education,w...Visual analytics techniques are widely utilized to facilitate the exploration of online educational data.To help researchers better understand the necessity and the efficiency of these techniques in online education,we systematically review related works of the past decade to provide a comprehensive view of the use of visualization in online education problems.We establish a taxonomy based on the analysis goal and classify the existing visual analytics techniques into four categories:learning behavior analysis,learning content analysis,analysis of interactions among students,and prediction and recommendation.The use of visual analytics techniques is summarized in each category to show their benefits in different analysis tasks.At last,we discuss the future research opportunities and challenges in the utilization of visual analytics techniques for online education.展开更多
The television ratings provide an effective way to analyze the popularity of TV programs and audiences’watching habits.Most previous studies have analyzed the ratings from a single perspective.Few efforts have integr...The television ratings provide an effective way to analyze the popularity of TV programs and audiences’watching habits.Most previous studies have analyzed the ratings from a single perspective.Few efforts have integrated analysis from different perspectives and explored the reasons for changes in ratings.In this paper,we design a visual analysis system called TVseer to analyze audience ratings from three perspectives:TV channels,TV programs,and audiences.The system can help users explore the factors that affect ratings,and assist them in decisions about program productions and schedules.There are six linked views in TVseer:the channel ratings view and program ratings view show ratings change information from the perspective of TV channels and programs respectively;the overlapping program competition view and the same-type program competition view indicate the competitive relationships among programs;the audience transfer view shows how audiences are moving among different channels;the audience group view displays audience groups based on their watching behavior.Besides,we also construct case studies and expert interviews to prove our system is useful and effective.展开更多
基金supported by the National Natural Science Foundation of China,Nos.81671671(to JL),61971451(to JL),U22A2034(to XK),62177047(to XK)the National Defense Science and Technology Collaborative Innovation Major Project of Central South University,No.2021gfcx05(to JL)+6 种基金Clinical Research Cen terfor Medical Imaging of Hunan Province,No.2020SK4001(to JL)Key Emergency Project of Pneumonia Epidemic of Novel Coronavirus Infection of Hu nan Province,No.2020SK3006(to JL)Innovative Special Construction Foundation of Hunan Province,No.2019SK2131(to JL)the Science and Technology lnnovation Program of Hunan Province,Nos.2021RC4016(to JL),2021SK53503(to ML)Scientific Research Program of Hunan Commission of Health,No.202209044797(to JL)Central South University Research Program of Advanced Interdisciplinary Studies,No.2023Q YJC020(to XK)the Natural Science Foundation of Hunan Province,No.2022JJ30814(to ML)。
文摘Patients with mild traumatic brain injury have a diverse clinical presentation,and the underlying pathophysiology remains poorly understood.Magnetic resonance imaging is a non-invasive technique that has been widely utilized to investigate neuro biological markers after mild traumatic brain injury.This approach has emerged as a promising tool for investigating the pathogenesis of mild traumatic brain injury.G raph theory is a quantitative method of analyzing complex networks that has been widely used to study changes in brain structure and function.However,most previous mild traumatic brain injury studies using graph theory have focused on specific populations,with limited exploration of simultaneous abnormalities in structural and functional connectivity.Given that mild traumatic brain injury is the most common type of traumatic brain injury encounte red in clinical practice,further investigation of the patient characteristics and evolution of structural and functional connectivity is critical.In the present study,we explored whether abnormal structural and functional connectivity in the acute phase could serve as indicators of longitudinal changes in imaging data and cognitive function in patients with mild traumatic brain injury.In this longitudinal study,we enrolled 46 patients with mild traumatic brain injury who were assessed within 2 wee ks of injury,as well as 36 healthy controls.Resting-state functional magnetic resonance imaging and diffusion-weighted imaging data were acquired for graph theoretical network analysis.In the acute phase,patients with mild traumatic brain injury demonstrated reduced structural connectivity in the dorsal attention network.More than 3 months of followup data revealed signs of recovery in structural and functional connectivity,as well as cognitive function,in 22 out of the 46 patients.Furthermore,better cognitive function was associated with more efficient networks.Finally,our data indicated that small-worldness in the acute stage could serve as a predictor of longitudinal changes in connectivity in patients with mild traumatic brain injury.These findings highlight the importance of integrating structural and functional connectivity in unde rstanding the occurrence and evolution of mild traumatic brain injury.Additionally,exploratory analysis based on subnetworks could serve a predictive function in the prognosis of patients with mild traumatic brain injury.
基金National Key R&D Program of China,Grant/Award Number:2018AAA0102100National Natural Science Foundation of China,Grant/Award Numbers:62177047,U22A2034+6 种基金International Science and Technology Innovation Joint Base of Machine Vision and Medical Image Processing in Hunan Province,Grant/Award Number:2021CB1013Key Research and Development Program of Hunan Province,Grant/Award Number:2022SK2054111 Project,Grant/Award Number:B18059Natural Science Foundation of Hunan Province,Grant/Award Number:2022JJ30762Fundamental Research Funds for the Central Universities of Central South University,Grant/Award Number:2020zzts143Scientific and Technological Innovation Leading Plan of High‐tech Industry of Hunan Province,Grant/Award Number:2020GK2021Central South University Research Program of Advanced Interdisciplinary Studies,Grant/Award Number:2023QYJC020。
文摘Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health systems.Deduplication eliminates the redundancy of duplicate blocks by storing one physical instance referenced by multiple duplicates.Delta compression is usually regarded as a complementary technique to deduplication to further remove the redundancy of similar blocks,but our observations indicate that this is disobedient when data have sparse duplicate blocks.In addition,there are many overlapped deltas in the resemblance detection process of post-deduplication delta compression,which hinders the efficiency of delta compression and the index phase of resemblance detection inquires abundant non-similar blocks,resulting in inefficient system throughput.Therefore,a multi-feature-based redundancy elimination scheme,called MFRE,is proposed to solve these problems.The similarity feature and temporal locality feature are excavated to assist redundancy elimination where the similarity feature well expresses the duplicate attribute.Then,similarity-based dynamic post-deduplication delta compression and temporal locality-based dynamic delta compression discover more similar base blocks to minimise overlapped deltas and improve compression ratios.Moreover,the clustering method based on block-relationship and the feature index strategy based on bloom filters reduce IO overheads and improve system throughput.Experiments demonstrate that the proposed method,compared to the state-of-the-art method,improves the compression ratio and system throughput by 9.68%and 50%,respectively.
基金supported by the National Natural Science Foundation of China(Nos.U22A2034,62177047)High Caliber Foreign Experts Introduction Plan funded by MOST,and Central South University Research Programme of Advanced Interdisciplinary Studies(No.2023QYJC020).
文摘Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption generation.However,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features.Consequently,this leads to enhanced captioning network performance.In light of this,we present an image captioning framework that efficiently exploits the extracted representations of the image.Our framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language model.The VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features matrix.Subsequently,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative description.Integrating the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s performance.Using the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve performance.The implementation code can be found here:https://github.com/althobhani/VFDICM(accessed on 30 July 2024).
基金partially supported by the National Natural Science Foundation of China under Grant 62072170 and Grant 62177047the Fundamental Research Funds for the Central Universities under Grant 531118010527+1 种基金the Science and Technology Key Projects of Hunan Province under Grant 2022GK2015the Hunan Provincial Natural Science Foundation of China under Grant 2021JJ30141.
文摘Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.
文摘Many theoretical derivation of the energy model requires extensive simulation in Internet of Things (IoT). Network Simulator 3 (ns-3) provides a simulation platform for various experimental studies including energy harvest.However, the function of charge schedule and wireless energy transfer model is not yet implemented. To address this problem, in this paper we propose an extension to ns-3 for simulating mobile charging with wireless energy transfer.First, we utilize a WET Harvest Class to harvest energy from the environment and a Charge Schedule Class for the mobile charger to choose the optimal node charging in the charging request queue in ns-3. Second, we use Charge Energy Model to judge what the mobile charger will do next when the energy of current node is higher or lower than energy threshold. Evaluation results show that our improvements are feasible and helpful with charge schedule and energy model in ns-3.
基金supported by the grant from the National Natural Science Foundation of China(No.62177047)The first batch of new liberal arts research and reform practice projects of the Ministry of Education,China(Teaching Hall Letter[2021]No.31)+2 种基金research Project of Teaching Reform in Colleges and Universities in Hunan Province,China(Xiangjiaotong[2020]No.232)Hunan graduate education teaching reform research project,China(2020JGZD010)Central South University Graduate Education Teaching Reform Research Project,China(2020JGA007).
文摘Visual analytics techniques are widely utilized to facilitate the exploration of online educational data.To help researchers better understand the necessity and the efficiency of these techniques in online education,we systematically review related works of the past decade to provide a comprehensive view of the use of visualization in online education problems.We establish a taxonomy based on the analysis goal and classify the existing visual analytics techniques into four categories:learning behavior analysis,learning content analysis,analysis of interactions among students,and prediction and recommendation.The use of visual analytics techniques is summarized in each category to show their benefits in different analysis tasks.At last,we discuss the future research opportunities and challenges in the utilization of visual analytics techniques for online education.
基金the Natural Science Foundation of Hunan Province,China(Grant Nos.2019JJ40406,2015JJ4077)the National Natural Science Foundation of China(Nos.61872389,61502540).
文摘The television ratings provide an effective way to analyze the popularity of TV programs and audiences’watching habits.Most previous studies have analyzed the ratings from a single perspective.Few efforts have integrated analysis from different perspectives and explored the reasons for changes in ratings.In this paper,we design a visual analysis system called TVseer to analyze audience ratings from three perspectives:TV channels,TV programs,and audiences.The system can help users explore the factors that affect ratings,and assist them in decisions about program productions and schedules.There are six linked views in TVseer:the channel ratings view and program ratings view show ratings change information from the perspective of TV channels and programs respectively;the overlapping program competition view and the same-type program competition view indicate the competitive relationships among programs;the audience transfer view shows how audiences are moving among different channels;the audience group view displays audience groups based on their watching behavior.Besides,we also construct case studies and expert interviews to prove our system is useful and effective.