The hidden water-bearing structures near the roadway tunnelling face are very likely to cause water seepage accidents in coal mines.Currently,transient electromagnetic(EM)technology has be-come an important method to ...The hidden water-bearing structures near the roadway tunnelling face are very likely to cause water seepage accidents in coal mines.Currently,transient electromagnetic(EM)technology has be-come an important method to detect water damage in advance of roadway excavation.In this paper,the time-domain finite element algorithm based on unstructured tetrahedron grids is used to accurate-ly simulate the geological body in front of the roadway excavation face and analyze its response.The authors detect the distance between the roadway excavation face and the low-resistivity water-bearing body,the resistivity difference between the low-resistivity body and surrounding rock,and the influence of the size of the low-resistivity body on the transient EM response.Furthermore,the common types of low-resistivity bodies in the roadway drivage process are used for modeling to analyze the attenuation of the detected EM response when there are low-resistivity bodies in front of the roadway.The research in this paper can help effectively detecting the water-bearing low-resistivity body in front of the roadway drivage and lay a foundation for reducing the risk of water seepage accidents.展开更多
A novel stochastic resonance algorithm was employed to enhance the signal-to-noise ratio (SNR) of signals of analytical chemistry. By using a gas chromatographic data set, it was proven that the SNR was greatly impro...A novel stochastic resonance algorithm was employed to enhance the signal-to-noise ratio (SNR) of signals of analytical chemistry. By using a gas chromatographic data set, it was proven that the SNR was greatly improved and the quantitative relationship between concentrations and chromatographic responses remained simultaneously. The linear range was extended beyond the instrumental detection limit.展开更多
In SPECT, noise is one of the major limitations that degrade image quality. To suppress the noisy signals in an image, digital filters are most commonly applied. However, in SPECT image reconstruction, selection of an...In SPECT, noise is one of the major limitations that degrade image quality. To suppress the noisy signals in an image, digital filters are most commonly applied. However, in SPECT image reconstruction, selection of an appropriate filter and its functions has always remained a difficult task. In this work an attempt was made to investigate the effects of varying cut-off frequencies and in keeping the order of Butterworth filter constant on detectability and contrast of hot and cold re-gions images. A new insert simulating hot and cold regions which provides similar views in a reconstructed image was placed in the phantom’s cylindrical source tank and imaged. Tc-99m radionuclide was distributed uniformly in the phantom. SPECT data were collected in a 20% energy window centered at 140 keV by a Philips ADAC Forte dual head gamma camera mounted with a LEHR collimator. Images were generated by using the filtered backprojection technique. A Butterworth filter of order 5 with cut-off frequencies 0.35 and 0.45 cycles·cm<sup>-1</sup> was applied. Images were examined in terms of hot and cold regions, detectability and contrast. Results show that the hot and cold regions’ detectability and contrast vary with the change of cut-off frequency. With a 0.45 cycles·cm<sup>-1</sup> cut-off frequency, a significant enhancement in contrast of cold regions was achieved as compared to a 0.35 cycles·cm<sup>-1</sup> cut-off frequency. Furthermore, the detectability of hot and cold regions improved with the use of a 0.45 cycles·cm<sup>-1</sup> cut-off frequency. In conclusion, image quality of hot and cold regions affected in a different way with a change of cut-off frequency. Thus, care should be taken in selecting the filter cut-off frequency prior to reconstruction of images;particularly, when both types of regions are expected in the reconstructed image.展开更多
The behavior of resistive short defects in FPGA interconnects is investigated through simulation and theoretical analysis.The results show that these defects result in timing failures and even Boolean faults for small...The behavior of resistive short defects in FPGA interconnects is investigated through simulation and theoretical analysis.The results show that these defects result in timing failures and even Boolean faults for small defect resistance values.The best detection situations for large resistance defect happen when the path under test makes a v-to-v′ transition and another path causing short faults remains at value v.Small defects can be detected easily through static analysis.Under the best test situations,the effects of supply voltage and temperature on test results are evaluated.The results verify that lower voltage helps to improve detectability.If short material has positive temperature coefficient,low temperature is better;otherwise,high temperature is better.展开更多
The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The d...The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The detectability levels are estimated from the twenty-five years of recorded data in terms of 50%, 90% and 100% cumulative detectability thresholds, which were derived from frequency-magnitude distribution. From this analysis the 100% level of detectability of the network is M L=1.7 for events which occur within the network. The accuracy in hypocentral solutions of the network is investigated by considering the fixed real hypocenter within the network. The epicentral errors are found to be less than 4 km when the events occur within the network. Finally, the problems faced during continuous operation of the local network, which effects its detectability, are discussed.展开更多
This paper mainly discusses stabilizatbility, exact observability and exact detectability of discrete stochastic systems with both static and control dependent noise via the spectrum technique. The authors put forward...This paper mainly discusses stabilizatbility, exact observability and exact detectability of discrete stochastic systems with both static and control dependent noise via the spectrum technique. The authors put forward a definition of the spectrum and give some theorems based on the spectrum. Then the relation between discrete generalized Lyapunov equation and discrete generalized algebraic Riccati equation is also analyzed.展开更多
Phase identification procedures for teleseismic events at Syowa Station (69.0°S, 39.6°E;SYO), East Antarctica have been carried out since 1967 after the International Geophysical Year (IGY;1957-1958). Since ...Phase identification procedures for teleseismic events at Syowa Station (69.0°S, 39.6°E;SYO), East Antarctica have been carried out since 1967 after the International Geophysical Year (IGY;1957-1958). Since the development of INTELSAT telecommunication link, digital waveform data have been transmitted to the National Institute of Polar Research (NIPR) for the utilization of phase identification. Arrival times of teleseismic phases, P, PKP, PP, S, SKS have been detected manually and reported to the International Seismological Centre (ISC), and published by “JARE Data Reports” from NIPR. In this paper, hypocentral distribution and time variations for detected earthquakes are demonstrated over the last four decades in 1967-2010. Characteristics of detected events, magnitude dependency, spatial distributions, seasonal variations, together with classification by focal depth are investigated. Besides the natural increase in the occurrence of teleseismic events on the globe, a technical advance in the observing system and station infrastructure, as well as the improvement of procedures for reading seismic phases, could all combine to produce the increase in detection of events in last few decades. Variations in teleseismic detectability for longer terms may be possible by association with the meteorological environment and seaice spreading area around the Antarctic continent. Recorded teleseismic and local seismic signals have sufficient quality for many analyses on dynamics and structure of the Earth as viewed from Antarctica. The continuously recorded data are applied not only to lithospheric studies but also to the Earth’s deep interiors, as a significant contribution to the Federation of Digital Seismological Networks (FDSN) from high southern latitude.展开更多
Rotating stall and surge are two violent unstable phenomena of an aero-engine compressor.The early detection of rotating stall is a critical and difficult issue in the operation of a compressor.Recently,a deterministi...Rotating stall and surge are two violent unstable phenomena of an aero-engine compressor.The early detection of rotating stall is a critical and difficult issue in the operation of a compressor.Recently,a deterministic learning based stall inception detection approach(SIDA)has been developed for modeling and detecting stall inception in aero-engine compressors.This paper considers the derivation of analytical results on the detection capabilities for the SIDA based on deterministic learning.First,by utilizing the input/output stability of the residual system,a detectability condition of the SIDA is presented,and how to choose the parameters of the diagnostic system is also analyzed.Second,based on the relationship between NN approximation capabilities and radial basis function(RBF)network structures,the influence of RBF network structures on the performance properties of the SIDA is analyzed.Finally,a simulation study is presented,in which the Mansoux-C2 compressor model is utilized to verify the effectiveness of the proposed SIDA.展开更多
The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network m...The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network must be designed to minimize the location errors introduced by geometrically unbalanced networks.In this study,we first review different sources of errors relevant to the localization of seismic events,how they propagate through localization algorithms,and their impact on outcomes.We then propose a quantitative method,based on a Monte Carlo approach,to estimate the uncertainty in earthquake locations that is suited to the design,optimization,and assessment of the performance of a local seismic monitoring network.To illustrate the performance of the proposed approach,we analyzed the distribution of the localization uncertainties and their related dispersion for a highly dense grid of theoretical hypocenters in both the horizontal and vertical directions using an actual monitoring network layout.The results expand,quantitatively,the qualitative indications derived from purely geometrical parameters(azimuthal gap(AG))and classical detectability maps.The proposed method enables the systematic design,optimization,and evaluation of local seismic monitoring networks,enhancing monitoring accuracy in areas proximal to hydrocarbon production,geothermal fields,underground natural gas storage,and other subsurface activities.This approach aids in the accurate estimation of earthquake source locations and their associated uncertainties,which are crucial for assessing and mitigating seismic risks,thereby enabling the implementation of proactive measures to minimize potential hazards.From an operational perspective,reliably estimating location accuracy is crucial for evaluating the position of seismogenic sources and assessing possible links between well activities and the onset of seismicity.展开更多
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a...A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.展开更多
Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately ...Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer.展开更多
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection...To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.展开更多
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit...Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.展开更多
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De...The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.展开更多
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the...The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches.展开更多
Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy an...Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy and urine cytology serve as the established diagnostic methods for BC.However,their efficacy is limited by their invasive nature and low sensitivity.Therefore,the development of highly specific biomarkers and effective noninvasive detection strategies is imperative for achieving a precise and timely diagnosis of BC,as well as for facilitating an optimal tumor treatment and an improved prognosis.microRNAs(miRNAs),short noncoding RNA molecules spanning around 20–25 nucleotides,are implicated in the regulation of diverse carcinogenic pathways.Substantially altered miRNAs form robust functional regulatory networks that exert a notable influence on the tumorigenesis and progression of BC.Investigations into aberrant miRNAs derived from blood,urine,or extracellular vesicles indicate their potential roles as diagnostic biomarkers and prognostic indicators in BC,enabling miRNAs to monitor the progression and predict the recurrence of the disease.Simultaneously,the investigation centered on miRNA as a potential therapeutic agent presents a novel approach for the treatment of BC.This review comprehensively analyzes biological roles of miRNAs in tumorigenesis and progression,and systematically summarizes their potential as diagnostic and prognostic biomarkers,as well as therapeutic targets for BC.Additionally,we evaluate the progress made in laboratory techniques within this field and discuss the prospects.展开更多
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have ...A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field.展开更多
Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them...Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities.展开更多
As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex b...As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection.展开更多
文摘The hidden water-bearing structures near the roadway tunnelling face are very likely to cause water seepage accidents in coal mines.Currently,transient electromagnetic(EM)technology has be-come an important method to detect water damage in advance of roadway excavation.In this paper,the time-domain finite element algorithm based on unstructured tetrahedron grids is used to accurate-ly simulate the geological body in front of the roadway excavation face and analyze its response.The authors detect the distance between the roadway excavation face and the low-resistivity water-bearing body,the resistivity difference between the low-resistivity body and surrounding rock,and the influence of the size of the low-resistivity body on the transient EM response.Furthermore,the common types of low-resistivity bodies in the roadway drivage process are used for modeling to analyze the attenuation of the detected EM response when there are low-resistivity bodies in front of the roadway.The research in this paper can help effectively detecting the water-bearing low-resistivity body in front of the roadway drivage and lay a foundation for reducing the risk of water seepage accidents.
基金supported by the National Natural Science Foundation of China (No.20075024).
文摘A novel stochastic resonance algorithm was employed to enhance the signal-to-noise ratio (SNR) of signals of analytical chemistry. By using a gas chromatographic data set, it was proven that the SNR was greatly improved and the quantitative relationship between concentrations and chromatographic responses remained simultaneously. The linear range was extended beyond the instrumental detection limit.
文摘In SPECT, noise is one of the major limitations that degrade image quality. To suppress the noisy signals in an image, digital filters are most commonly applied. However, in SPECT image reconstruction, selection of an appropriate filter and its functions has always remained a difficult task. In this work an attempt was made to investigate the effects of varying cut-off frequencies and in keeping the order of Butterworth filter constant on detectability and contrast of hot and cold re-gions images. A new insert simulating hot and cold regions which provides similar views in a reconstructed image was placed in the phantom’s cylindrical source tank and imaged. Tc-99m radionuclide was distributed uniformly in the phantom. SPECT data were collected in a 20% energy window centered at 140 keV by a Philips ADAC Forte dual head gamma camera mounted with a LEHR collimator. Images were generated by using the filtered backprojection technique. A Butterworth filter of order 5 with cut-off frequencies 0.35 and 0.45 cycles·cm<sup>-1</sup> was applied. Images were examined in terms of hot and cold regions, detectability and contrast. Results show that the hot and cold regions’ detectability and contrast vary with the change of cut-off frequency. With a 0.45 cycles·cm<sup>-1</sup> cut-off frequency, a significant enhancement in contrast of cold regions was achieved as compared to a 0.35 cycles·cm<sup>-1</sup> cut-off frequency. Furthermore, the detectability of hot and cold regions improved with the use of a 0.45 cycles·cm<sup>-1</sup> cut-off frequency. In conclusion, image quality of hot and cold regions affected in a different way with a change of cut-off frequency. Thus, care should be taken in selecting the filter cut-off frequency prior to reconstruction of images;particularly, when both types of regions are expected in the reconstructed image.
文摘The behavior of resistive short defects in FPGA interconnects is investigated through simulation and theoretical analysis.The results show that these defects result in timing failures and even Boolean faults for small defect resistance values.The best detection situations for large resistance defect happen when the path under test makes a v-to-v′ transition and another path causing short faults remains at value v.Small defects can be detected easily through static analysis.Under the best test situations,the effects of supply voltage and temperature on test results are evaluated.The results verify that lower voltage helps to improve detectability.If short material has positive temperature coefficient,low temperature is better;otherwise,high temperature is better.
文摘The detectability and reliability analysis for the local seismic network is performed employing by Bungum and Husebye technique. The events were relocated using standard computer codes for hypocentral locations. The detectability levels are estimated from the twenty-five years of recorded data in terms of 50%, 90% and 100% cumulative detectability thresholds, which were derived from frequency-magnitude distribution. From this analysis the 100% level of detectability of the network is M L=1.7 for events which occur within the network. The accuracy in hypocentral solutions of the network is investigated by considering the fixed real hypocenter within the network. The epicentral errors are found to be less than 4 km when the events occur within the network. Finally, the problems faced during continuous operation of the local network, which effects its detectability, are discussed.
文摘This paper mainly discusses stabilizatbility, exact observability and exact detectability of discrete stochastic systems with both static and control dependent noise via the spectrum technique. The authors put forward a definition of the spectrum and give some theorems based on the spectrum. Then the relation between discrete generalized Lyapunov equation and discrete generalized algebraic Riccati equation is also analyzed.
文摘Phase identification procedures for teleseismic events at Syowa Station (69.0°S, 39.6°E;SYO), East Antarctica have been carried out since 1967 after the International Geophysical Year (IGY;1957-1958). Since the development of INTELSAT telecommunication link, digital waveform data have been transmitted to the National Institute of Polar Research (NIPR) for the utilization of phase identification. Arrival times of teleseismic phases, P, PKP, PP, S, SKS have been detected manually and reported to the International Seismological Centre (ISC), and published by “JARE Data Reports” from NIPR. In this paper, hypocentral distribution and time variations for detected earthquakes are demonstrated over the last four decades in 1967-2010. Characteristics of detected events, magnitude dependency, spatial distributions, seasonal variations, together with classification by focal depth are investigated. Besides the natural increase in the occurrence of teleseismic events on the globe, a technical advance in the observing system and station infrastructure, as well as the improvement of procedures for reading seismic phases, could all combine to produce the increase in detection of events in last few decades. Variations in teleseismic detectability for longer terms may be possible by association with the meteorological environment and seaice spreading area around the Antarctic continent. Recorded teleseismic and local seismic signals have sufficient quality for many analyses on dynamics and structure of the Earth as viewed from Antarctica. The continuously recorded data are applied not only to lithospheric studies but also to the Earth’s deep interiors, as a significant contribution to the Federation of Digital Seismological Networks (FDSN) from high southern latitude.
基金This work was supported in part by the Major Program of the National Natural Science Foundation of China(No.61890922)in part by the Major Basic Program of Shandong Provincial Natural Science Foundation(No.ZR2020ZD40).
文摘Rotating stall and surge are two violent unstable phenomena of an aero-engine compressor.The early detection of rotating stall is a critical and difficult issue in the operation of a compressor.Recently,a deterministic learning based stall inception detection approach(SIDA)has been developed for modeling and detecting stall inception in aero-engine compressors.This paper considers the derivation of analytical results on the detection capabilities for the SIDA based on deterministic learning.First,by utilizing the input/output stability of the residual system,a detectability condition of the SIDA is presented,and how to choose the parameters of the diagnostic system is also analyzed.Second,based on the relationship between NN approximation capabilities and radial basis function(RBF)network structures,the influence of RBF network structures on the performance properties of the SIDA is analyzed.Finally,a simulation study is presented,in which the Mansoux-C2 compressor model is utilized to verify the effectiveness of the proposed SIDA.
文摘The ability to estimate earthquake source locations,along with the appraisal of relevant uncertainties,is paramount in monitoring both natural and human-induced micro-seismicity.For this purpose,a monitoring network must be designed to minimize the location errors introduced by geometrically unbalanced networks.In this study,we first review different sources of errors relevant to the localization of seismic events,how they propagate through localization algorithms,and their impact on outcomes.We then propose a quantitative method,based on a Monte Carlo approach,to estimate the uncertainty in earthquake locations that is suited to the design,optimization,and assessment of the performance of a local seismic monitoring network.To illustrate the performance of the proposed approach,we analyzed the distribution of the localization uncertainties and their related dispersion for a highly dense grid of theoretical hypocenters in both the horizontal and vertical directions using an actual monitoring network layout.The results expand,quantitatively,the qualitative indications derived from purely geometrical parameters(azimuthal gap(AG))and classical detectability maps.The proposed method enables the systematic design,optimization,and evaluation of local seismic monitoring networks,enhancing monitoring accuracy in areas proximal to hydrocarbon production,geothermal fields,underground natural gas storage,and other subsurface activities.This approach aids in the accurate estimation of earthquake source locations and their associated uncertainties,which are crucial for assessing and mitigating seismic risks,thereby enabling the implementation of proactive measures to minimize potential hazards.From an operational perspective,reliably estimating location accuracy is crucial for evaluating the position of seismogenic sources and assessing possible links between well activities and the onset of seismicity.
文摘A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
基金Supported by Shandong Province Medical and Health Science and Technology Development Plan Project,No.202203030713Clinical Research Funding of Shandong Medical Association-Qilu Specialization,No.YXH2022ZX02031Science and Technology Program of Yantai Affiliated Hospital of Binzhou Medical University,No.YTFY2022KYQD06.
文摘Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.
基金supported by a grant from the Basic Science Research Program through the National Research Foundation(NRF)(2021R1F1A1063634)funded by the Ministry of Science and ICT(MSIT),Republic of KoreaThe authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Group Funding Program Grant Code(NU/RG/SERC/13/40)+2 种基金Also,the authors are thankful to Prince Satam bin Abdulaziz University for supporting this study via funding from Prince Satam bin Abdulaziz University project number(PSAU/2024/R/1445)This work was also supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R54)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.
基金supported by the National Key Research and Development Plan in China(Grant No.2020YFB1005500)。
文摘The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.
文摘The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches.
基金supported by the China Postdoctoral Science Foundation(Grant No.2022M721404)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220737)+1 种基金the Social Development Foundation of Clinical Frontier Technology of Jiangsu Province(Grant No.BE2017763)the Medical Research Project of Jiangsu Province Health Committee(Grant No.K2019020).
文摘Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy and urine cytology serve as the established diagnostic methods for BC.However,their efficacy is limited by their invasive nature and low sensitivity.Therefore,the development of highly specific biomarkers and effective noninvasive detection strategies is imperative for achieving a precise and timely diagnosis of BC,as well as for facilitating an optimal tumor treatment and an improved prognosis.microRNAs(miRNAs),short noncoding RNA molecules spanning around 20–25 nucleotides,are implicated in the regulation of diverse carcinogenic pathways.Substantially altered miRNAs form robust functional regulatory networks that exert a notable influence on the tumorigenesis and progression of BC.Investigations into aberrant miRNAs derived from blood,urine,or extracellular vesicles indicate their potential roles as diagnostic biomarkers and prognostic indicators in BC,enabling miRNAs to monitor the progression and predict the recurrence of the disease.Simultaneously,the investigation centered on miRNA as a potential therapeutic agent presents a novel approach for the treatment of BC.This review comprehensively analyzes biological roles of miRNAs in tumorigenesis and progression,and systematically summarizes their potential as diagnostic and prognostic biomarkers,as well as therapeutic targets for BC.Additionally,we evaluate the progress made in laboratory techniques within this field and discuss the prospects.
文摘A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field.
基金the financial support from Shenzhen Science and Technology Program (JCYJ20210324142210027, X.D.)the National Natural Science Foundation of China (52103136, 22275028, U22A20153, 22102017, 22302033, and 52106194)+5 种基金the Sichuan Outstanding Young Scholars Foundation (2021JDJQ0013)Natural Science Foundation of Sichuan Province (2022NSFSC1271)Sichuan Science and Technology Program (2023JDRC0082)“Oncology Medical Engineering Innovation Foundation” project of University of Electronic Science and Technology of China and Sichuan Cancer Hospital (ZYGX2021YGCX009)“Medical and Industrial Cross Foundation” of University of Electronic Science and Technology of China and Sichuan Provincial People’s Hospital (ZYGX2021YGLH207)Shandong Key R&D grant (2022CXGC010509)。
文摘Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities.
基金supported in part by the National Natural Science Foundation of China under Grants 32171909,51705365,52205254The Guangdong Basic and Applied Basic Research Foundation under Grants 2020B1515120050,2023A1515011255+2 种基金The Guangdong Key R&D projects under Grant 2020B0404030001the Scientific Research Projects of Universities in Guangdong Province under Grant 2020KCXTD015The Ji Hua Laboratory Open Project under Grant X220931UZ230.
文摘As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection.