The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ...The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.展开更多
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re...The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.展开更多
Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when deal...Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field.展开更多
Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing i...Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms.展开更多
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ...In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.展开更多
In today’s smart city transportation,traffic congestion is a vexing issue,and vehicles seeking parking spaces have been identified as one of the causes leading to approximately 40%of traffic congestion.Identifying pa...In today’s smart city transportation,traffic congestion is a vexing issue,and vehicles seeking parking spaces have been identified as one of the causes leading to approximately 40%of traffic congestion.Identifying parking spaces alone is insufficient because an identified available parking space may have been taken by another vehicle when it arrives,resulting in the driver’s frustration and aggravating traffic jams while searching for another parking space.This explains the need to predict the availability of parking spaces.Recently,deep learning(DL)has been shown to facilitate drivers to find parking spaces efficiently,leading to a promising performance enhancement in parking identification and prediction systems.However,no work reviews DL approaches applied to solve parking identification and prediction problems.Inspired by this gap,the purpose of this work is to investigate,highlight,and report on recent advances inDLapproaches applied to predict and identify the availability of parking spaces.Ataxonomy of DL-based parking identification and prediction systems is established as a methodology by classifying and categorizing existing literature,and by doing so,the salient and supportive features of different DL techniques for providing parking solutions are presented.Moreover,several open research challenges are outlined.This work identifies that there are various DL architectures,datasets,and performance measures used to address parking identification and prediction problems.Moreover,there are some open-source implementations available that can be used directly either to extend existing works or explore a new domain.This is the first short survey article that focuses on the use of DL-based techniques in parking identification and prediction systems for smart cities.This study concludes that although the deployment of DL in parking identification and prediction systems provides various benefits,the convergence of these two types of systems and DL brings about new issues that must be resolved in the near future.展开更多
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe...Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.展开更多
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For...Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.展开更多
With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed ...With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.展开更多
The use of Explainable Artificial Intelligence(XAI)models becomes increasingly important for making decisions in smart healthcare environments.It is to make sure that decisions are based on trustworthy algorithms and ...The use of Explainable Artificial Intelligence(XAI)models becomes increasingly important for making decisions in smart healthcare environments.It is to make sure that decisions are based on trustworthy algorithms and that healthcare workers understand the decisions made by these algorithms.These models can potentially enhance interpretability and explainability in decision-making processes that rely on artificial intelligence.Nevertheless,the intricate nature of the healthcare field necessitates the utilization of sophisticated models to classify cancer images.This research presents an advanced investigation of XAI models to classify cancer images.It describes the different levels of explainability and interpretability associated with XAI models and the challenges faced in deploying them in healthcare applications.In addition,this study proposes a novel framework for cancer image classification that incorporates XAI models with deep learning and advanced medical imaging techniques.The proposed model integrates several techniques,including end-to-end explainable evaluation,rule-based explanation,and useradaptive explanation.The proposed XAI reaches 97.72%accuracy,90.72%precision,93.72%recall,96.72%F1-score,9.55%FDR,9.66%FOR,and 91.18%DOR.It will discuss the potential applications of the proposed XAI models in the smart healthcare environment.It will help ensure trust and accountability in AI-based decisions,which is essential for achieving a safe and reliable smart healthcare environment.展开更多
Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, wh...Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, which combines the advantages of several machine learning models. The ensemble is made up of various base models, such as Decision Trees, K-Nearest Neighbors (KNN), Multi-Layer Perceptrons (MLP), and Naive Bayes, each of which offers a distinct perspective on the properties of the data. The research adheres to a methodical workflow that begins with thorough data preprocessing to guarantee the accuracy and applicability of the data. In order to extract useful attributes from network traffic data—which are essential for efficient model training—feature engineering is used. The ensemble approach combines these models by training a Logistic Regression model meta-learner on base model predictions. In addition to increasing prediction accuracy, this tiered approach helps get around the drawbacks that come with using individual models. High accuracy, precision, and recall are shown in the model’s evaluation of a network intrusion dataset, indicating the model’s efficacy in identifying malicious activity. Cross-validation is used to make sure the models are reliable and well-generalized to new, untested data. In addition to advancing cybersecurity, the research establishes a foundation for the implementation of flexible and scalable intrusion detection systems. This hybrid, stacked ensemble model has a lot of potential for improving cyberattack prevention, lowering the likelihood of cyberattacks, and offering a scalable solution that can be adjusted to meet new threats and technological advancements.展开更多
The material characteristics of a structure will change with temperature variation,and will induce stress within the structure.Currently,the optimal design for the topology of compliant mechanisms is mainly performed ...The material characteristics of a structure will change with temperature variation,and will induce stress within the structure.Currently,the optimal design for the topology of compliant mechanisms is mainly performed in single physical field.However,when compliant mechanisms work in high temperature environments,their displacement outputs are generated not only by mechanical load,but also by the temperature variation which may become the prominent factor.Therefore,the influence of temperature must be considered in the design.In this paper,a novel optimization method for multi-objective topology of thermo-mechanical compliant mechanisms is presented.First,the thermal field is analyzed with finite-element method,where the thermal strain is taken into account in the constitutive relation,and the equivalent nodal thermal load is derived with the principle of virtual work.Then the thermal load is converted into physical loads in elastic field,and the control equation of the thermo-mechanical compliant mechanism is obtained.Second,the mathematical model of the multi-objective topology optimization is built by incorporating both the flexibility and stiffness.Meanwhile,the coupling sensitivity function and the sensitivity analysis equations of thermal steady-state response are derived.Finally,optimality criteria algorithm is employed to obtain numerical solution of the multi-objective topology optimization.Numerical examples show that the compliant mechanisms have better performance and are more applicable if the temperature effect is taken into account in the design process.The presented modeling and analysis methods provide a new idea and an effective approach to topology optimization of compliant mechanisms in electrothermic coupling field and multiphysics fields.展开更多
Aerial imagery is regularly used by crop researchers,growers and farmers to monitor crops during the growing season.To extract meaningful information from large-scale aerial images collected from the field,high-throug...Aerial imagery is regularly used by crop researchers,growers and farmers to monitor crops during the growing season.To extract meaningful information from large-scale aerial images collected from the field,high-throughput phenotypic analysis solutions are required,which not only produce high-quality measures of key crop traits,but also support professionals to make prompt and reliable crop management decisions.Here,we report AirSurf,an automated and open-source analytic platform that combines modern computer vision,up-to-date machine learning,and modular software engineering in order to measure yield-related phenotypes from ultra-large aerial imagery.To quantify millions of in-field lettuces acquired by fixed-wing light aircrafts equipped with normalised difference vegetation index(NDVI)sensors,we customised AirSurf by combining computer vision algorithms and a deep-learning classifier trained with over 100,000 labelled lettuce signals.The tailored platform,AirSurf-Lettuce,is capable of scoring and categorising iceberg lettuces with high accuracy(>98%).Furthermore,novel analysis functions have been developed to map lettuce size distribution across the field,based on which associated global positioning system(GPS)tagged harvest regions have been identified to enable growers and farmers to conduct precision agricultural practises in order to improve the actual yield as well as crop marketability before the harvest.展开更多
With the development of online social networks,a special group of online users named organized posters(or Internet water army,Internet paid posters in some literatures) have fl ooded the social network communities. Th...With the development of online social networks,a special group of online users named organized posters(or Internet water army,Internet paid posters in some literatures) have fl ooded the social network communities. They are organized in groups to post with specific purposes and sometimes even confuse or mislead normal users.In this paper,we study the individual and group characteristics of organized posters. A classifier is constructed based on the individual and group characteristics to detect them. Extensive experimental results on three real datasets demonstrate that our method based on individual and group characteristics using SVM model(IGCSVM) is effective in detecting organized posters and better than existing methods. We take a first look at finding the promoters based on the detected organized posters of our IGCSVM method. Our experiments show that it is effective in detecting promoters.展开更多
The complex composition of herbal metabolites necessitates the development of powerful analytical techniques aimed to identify the bioactive components.The seeds of Descurainia sophia(SDS)are utilized in China as a co...The complex composition of herbal metabolites necessitates the development of powerful analytical techniques aimed to identify the bioactive components.The seeds of Descurainia sophia(SDS)are utilized in China as a cough and asthma relieving agent.Herein,a dimension-enhanced integral approach,by combining ultra-high performance liquid chromatography/ion mobility-quadrupole time-of-flight mass spectrometry(UHPLC/IMQTOF-MS)and intelligent peak annotation,was developed to rapidly characterize the multicomponents from SDS.Good chromatographic separation was achieved within 38 min on a UPLC CSH C18(2.1×100 mm,1.7μm)column which was eluted by 0.1%formic acid in water(water phase)and acetonitrile(organic phase).Collision-induced dissociation-MS^(2)data were acquired by the data-independent high-definition MS^(E)(HDMS^(E))in both the negative and positive electrospray ionization modes.A major components knockout strategy was applied to improve the characterization of those minor ingredients by enhancing the injection volume.Moreover,a self-built chemistry library was established,which could be matched by the UNIFI software enabling automatic peak annotation of the obtained HDMS^(E)data.As a result of applying the intelligent peak annotation workflows and further confirmation process,a total of 53 compounds were identified or tentatively characterized from the SDS,including 29 flavonoids,one uridine derivative,four glucosides,one lignin,one phenolic compound,and 17 others.Notably,four-dimensional information related to the structure(e.g.,retention time,collision cross section,MS^(1)and MS^(2)data)was obtained for each component by the developed integral approach,and the results would greatly benefit the quality control of SDS.展开更多
This paper presents the preclinical evaluation of a novel immobilization system for patients undergoing external beam radiation treatment of head and neck tumors. An immobilization mask is manufactured directly from a...This paper presents the preclinical evaluation of a novel immobilization system for patients undergoing external beam radiation treatment of head and neck tumors. An immobilization mask is manufactured directly from a 3-D model, built using the CT data routinely acquired for treatment planning so there is no need to take plaster of Paris moulds. Research suggests that many patients find the mould room visit distressing and so rapid prototyping could potentially improve the overall patient experience. Evaluation of a computer model of the immobilization system using an anthropomorphic phantom shows that >99% of vertices are within a tolerance of ±0.2 mm. Hausdorff distance was used to analyze CT slices obtained by rescanning the phantom with a printed mask in position. These results show that for >80% of the slices the median “worse-case” tolerance is approximately 4 mm. These measurements suggest that printed masks can achieve similar levels of immobilization to those of systems currently in clinical use.展开更多
Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of ...Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model.展开更多
This study is to illustrate alpine vegetation dynamics in Qinghai-Tibetan Plateau of China from simulated filed experimental climate change, vegetation community dynamic simulation integrated with scenarios of global ...This study is to illustrate alpine vegetation dynamics in Qinghai-Tibetan Plateau of China from simulated filed experimental climate change, vegetation community dynamic simulation integrated with scenarios of global temperature increase of 1 to 3°C, and simulated regional alpine vegetation distribution changes in responses to global warming. Our warming treatment increased air temperatures by 5°C on average and soil temperatures were elevated by 3°C at 5 cm depth. Above- ground biomass of grasses responded rapidly to the warmer conditions whereby biomass was 25% greater than that of controls after only 5 wk of experimental warming. This increase was accompanied by a simultaneous decrease in forb biomass, resulting in almost no net change in community biomass after 5 wk. Under warmed conditions, peak community bio-mass was extended into October due in part to continued growth of grasses and the postponement of senescence. The Vegetation Dynamic Simulation Model calculates a probability surface for each vegetation type, and then combines all vegetation types into a composite map, determined by the maximum likelihood that each vegetation type should distribute to each raster unit. With scenarios of global temperature increase of 1°C to 3°C, the vegetation types such as Dry Kobresia Meadow and Dry Potentilla Shrub that are adapted to warm and dry conditions tend to become more dominant in the study area.展开更多
The integration of the two fast-developing scientific research areas Semantic Web and Web Mining is known as Semantic Web Mining. The huge increase in the amount of Semantic Web data became a perfect target for many r...The integration of the two fast-developing scientific research areas Semantic Web and Web Mining is known as Semantic Web Mining. The huge increase in the amount of Semantic Web data became a perfect target for many researchers to apply Data Mining techniques on it. This paper gives a detailed state-of-the-art survey of on-going research in this new area. It shows the positive effects of Semantic Web Mining, the obstacles faced by researchers and propose number of approaches to deal with the very complex and heterogeneous information and knowledge which are produced by the technologies of Semantic Web.展开更多
Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance computation.Cloud provides infrastructure,platform and software as different on-demand services.China ha...Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance computation.Cloud provides infrastructure,platform and software as different on-demand services.China has made remarkable progress in cloudbased products and operating system technology.The government,enterprises and research institutions are all active in the development of cloud computing-related projects.Despite the progress,many important展开更多
基金supported by project TRANSACT funded under H2020-EU.2.1.1.-INDUSTRIAL LEADERSHIP-Leadership in Enabling and Industrial Technologies-Information and Communication Technologies(Grant Agreement ID:101007260).
文摘The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
基金This work is supported by EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab,Prince Sultan University,Kingdom of Saudi Arabia,by paying the APC.
文摘The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.
文摘Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field.
基金supported in part by the National Natural Science Foun-dation of China(61902029)R&D Program of Beijing Municipal Education Commission(No.KM202011232015)Project for Acceleration of University Classi cation Development(Nos.5112211036,5112211037,5112211038).
文摘Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms.
文摘In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
文摘In today’s smart city transportation,traffic congestion is a vexing issue,and vehicles seeking parking spaces have been identified as one of the causes leading to approximately 40%of traffic congestion.Identifying parking spaces alone is insufficient because an identified available parking space may have been taken by another vehicle when it arrives,resulting in the driver’s frustration and aggravating traffic jams while searching for another parking space.This explains the need to predict the availability of parking spaces.Recently,deep learning(DL)has been shown to facilitate drivers to find parking spaces efficiently,leading to a promising performance enhancement in parking identification and prediction systems.However,no work reviews DL approaches applied to solve parking identification and prediction problems.Inspired by this gap,the purpose of this work is to investigate,highlight,and report on recent advances inDLapproaches applied to predict and identify the availability of parking spaces.Ataxonomy of DL-based parking identification and prediction systems is established as a methodology by classifying and categorizing existing literature,and by doing so,the salient and supportive features of different DL techniques for providing parking solutions are presented.Moreover,several open research challenges are outlined.This work identifies that there are various DL architectures,datasets,and performance measures used to address parking identification and prediction problems.Moreover,there are some open-source implementations available that can be used directly either to extend existing works or explore a new domain.This is the first short survey article that focuses on the use of DL-based techniques in parking identification and prediction systems for smart cities.This study concludes that although the deployment of DL in parking identification and prediction systems provides various benefits,the convergence of these two types of systems and DL brings about new issues that must be resolved in the near future.
基金supported by the National Natural Science Foundation of China under Grant 92046001,61962009,the JSPS KAKENHI Grant Numbers JP19K20250,JP20H04174,JP22K11989Leading Initiative for Excellent Young Researchers (LEADER),MEXT,Japan,and JST,PRESTO Grant Number JPMJPR21P3+1 种基金Japan.Mianxiong Dong is the corresponding author,the Doctor Scientific Research Fund of Zhengzhou University of Light Industry under Grant 2021BSJJ033Key Scientific Research Project of Colleges and Universities in Henan Province (CN)under Grant No.22A413010.
文摘Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.
基金supported by the Natural Science Foundation under Grant No.61962009Major Scientific and Technological Special Project of Guizhou Province under Grant No.20183001Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No.2018BDKFJJ003,2018BDKFJJ005 and 2019BDKFJJ009.
文摘Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
文摘With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.
基金supported by theCONAHCYT(Consejo Nacional deHumanidades,Ciencias y Tecnologias).
文摘The use of Explainable Artificial Intelligence(XAI)models becomes increasingly important for making decisions in smart healthcare environments.It is to make sure that decisions are based on trustworthy algorithms and that healthcare workers understand the decisions made by these algorithms.These models can potentially enhance interpretability and explainability in decision-making processes that rely on artificial intelligence.Nevertheless,the intricate nature of the healthcare field necessitates the utilization of sophisticated models to classify cancer images.This research presents an advanced investigation of XAI models to classify cancer images.It describes the different levels of explainability and interpretability associated with XAI models and the challenges faced in deploying them in healthcare applications.In addition,this study proposes a novel framework for cancer image classification that incorporates XAI models with deep learning and advanced medical imaging techniques.The proposed model integrates several techniques,including end-to-end explainable evaluation,rule-based explanation,and useradaptive explanation.The proposed XAI reaches 97.72%accuracy,90.72%precision,93.72%recall,96.72%F1-score,9.55%FDR,9.66%FOR,and 91.18%DOR.It will discuss the potential applications of the proposed XAI models in the smart healthcare environment.It will help ensure trust and accountability in AI-based decisions,which is essential for achieving a safe and reliable smart healthcare environment.
文摘Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, which combines the advantages of several machine learning models. The ensemble is made up of various base models, such as Decision Trees, K-Nearest Neighbors (KNN), Multi-Layer Perceptrons (MLP), and Naive Bayes, each of which offers a distinct perspective on the properties of the data. The research adheres to a methodical workflow that begins with thorough data preprocessing to guarantee the accuracy and applicability of the data. In order to extract useful attributes from network traffic data—which are essential for efficient model training—feature engineering is used. The ensemble approach combines these models by training a Logistic Regression model meta-learner on base model predictions. In addition to increasing prediction accuracy, this tiered approach helps get around the drawbacks that come with using individual models. High accuracy, precision, and recall are shown in the model’s evaluation of a network intrusion dataset, indicating the model’s efficacy in identifying malicious activity. Cross-validation is used to make sure the models are reliable and well-generalized to new, untested data. In addition to advancing cybersecurity, the research establishes a foundation for the implementation of flexible and scalable intrusion detection systems. This hybrid, stacked ensemble model has a lot of potential for improving cyberattack prevention, lowering the likelihood of cyberattacks, and offering a scalable solution that can be adjusted to meet new threats and technological advancements.
基金supported by National Science Foundation for Distinguished Young Scholars of China (Grant No. 50825504)United Fund of National Natural Science Foundation of China and Guangdong Province (Grant No. U0934004)+1 种基金National Hi-tech Research and Development Program of National China (863 Program, Grant No. 2009AA04Z204)Fundamental Research Funds for the Central Universities (Grant No. D2102380)
文摘The material characteristics of a structure will change with temperature variation,and will induce stress within the structure.Currently,the optimal design for the topology of compliant mechanisms is mainly performed in single physical field.However,when compliant mechanisms work in high temperature environments,their displacement outputs are generated not only by mechanical load,but also by the temperature variation which may become the prominent factor.Therefore,the influence of temperature must be considered in the design.In this paper,a novel optimization method for multi-objective topology of thermo-mechanical compliant mechanisms is presented.First,the thermal field is analyzed with finite-element method,where the thermal strain is taken into account in the constitutive relation,and the equivalent nodal thermal load is derived with the principle of virtual work.Then the thermal load is converted into physical loads in elastic field,and the control equation of the thermo-mechanical compliant mechanism is obtained.Second,the mathematical model of the multi-objective topology optimization is built by incorporating both the flexibility and stiffness.Meanwhile,the coupling sensitivity function and the sensitivity analysis equations of thermal steady-state response are derived.Finally,optimality criteria algorithm is employed to obtain numerical solution of the multi-objective topology optimization.Numerical examples show that the compliant mechanisms have better performance and are more applicable if the temperature effect is taken into account in the design process.The presented modeling and analysis methods provide a new idea and an effective approach to topology optimization of compliant mechanisms in electrothermic coupling field and multiphysics fields.
基金the support of NVIDIA Corporation with the award of the Quadro GPU used for this research.J.Z.was partially funded by UKRI Biotechnology and Biological Sciences Research Council’s(BBSRC)Designing Future Wheat Cross-institute Strategic Programme(BB/P016855/1)to Graham Moore,BBS/E/T/000PR9785 to J.Z.J.B.were partially supported by the Core Strategic Programme Grant(BB/CSP17270/1)at the Earlham Institute+1 种基金A.G.B.and C.A.were also partially supported by G’s Growers’s industrial fund awarded to J.Z.A.B.was partially supported by the Newton UK-China Agri-Tech Network+Grant(GP131JZ1G)awarded to J.Z.
文摘Aerial imagery is regularly used by crop researchers,growers and farmers to monitor crops during the growing season.To extract meaningful information from large-scale aerial images collected from the field,high-throughput phenotypic analysis solutions are required,which not only produce high-quality measures of key crop traits,but also support professionals to make prompt and reliable crop management decisions.Here,we report AirSurf,an automated and open-source analytic platform that combines modern computer vision,up-to-date machine learning,and modular software engineering in order to measure yield-related phenotypes from ultra-large aerial imagery.To quantify millions of in-field lettuces acquired by fixed-wing light aircrafts equipped with normalised difference vegetation index(NDVI)sensors,we customised AirSurf by combining computer vision algorithms and a deep-learning classifier trained with over 100,000 labelled lettuce signals.The tailored platform,AirSurf-Lettuce,is capable of scoring and categorising iceberg lettuces with high accuracy(>98%).Furthermore,novel analysis functions have been developed to map lettuce size distribution across the field,based on which associated global positioning system(GPS)tagged harvest regions have been identified to enable growers and farmers to conduct precision agricultural practises in order to improve the actual yield as well as crop marketability before the harvest.
基金supported by 973 Program of China(Grant No.2013CB329601, 2013CB329602,2013CB329604)NSFC of China(Grant No.60933005,91124002)+1 种基金863 Program of China(Grant No.2012AA01A401, 2012AA01A402)National Key Technology RD Program of China(Grant No.2012BAH38B04, 2012BAH38B06)
文摘With the development of online social networks,a special group of online users named organized posters(or Internet water army,Internet paid posters in some literatures) have fl ooded the social network communities. They are organized in groups to post with specific purposes and sometimes even confuse or mislead normal users.In this paper,we study the individual and group characteristics of organized posters. A classifier is constructed based on the individual and group characteristics to detect them. Extensive experimental results on three real datasets demonstrate that our method based on individual and group characteristics using SVM model(IGCSVM) is effective in detecting organized posters and better than existing methods. We take a first look at finding the promoters based on the detected organized posters of our IGCSVM method. Our experiments show that it is effective in detecting promoters.
基金This work was financially supported by the National Key Research and Development Program of China(Grant No.2018YFC1704500)Tianjin Committee of Science and Technology of China(Grant No.21ZYJDJC00080)National Natural Science Foundation of China(Grant No.81872996).
文摘The complex composition of herbal metabolites necessitates the development of powerful analytical techniques aimed to identify the bioactive components.The seeds of Descurainia sophia(SDS)are utilized in China as a cough and asthma relieving agent.Herein,a dimension-enhanced integral approach,by combining ultra-high performance liquid chromatography/ion mobility-quadrupole time-of-flight mass spectrometry(UHPLC/IMQTOF-MS)and intelligent peak annotation,was developed to rapidly characterize the multicomponents from SDS.Good chromatographic separation was achieved within 38 min on a UPLC CSH C18(2.1×100 mm,1.7μm)column which was eluted by 0.1%formic acid in water(water phase)and acetonitrile(organic phase).Collision-induced dissociation-MS^(2)data were acquired by the data-independent high-definition MS^(E)(HDMS^(E))in both the negative and positive electrospray ionization modes.A major components knockout strategy was applied to improve the characterization of those minor ingredients by enhancing the injection volume.Moreover,a self-built chemistry library was established,which could be matched by the UNIFI software enabling automatic peak annotation of the obtained HDMS^(E)data.As a result of applying the intelligent peak annotation workflows and further confirmation process,a total of 53 compounds were identified or tentatively characterized from the SDS,including 29 flavonoids,one uridine derivative,four glucosides,one lignin,one phenolic compound,and 17 others.Notably,four-dimensional information related to the structure(e.g.,retention time,collision cross section,MS^(1)and MS^(2)data)was obtained for each component by the developed integral approach,and the results would greatly benefit the quality control of SDS.
文摘This paper presents the preclinical evaluation of a novel immobilization system for patients undergoing external beam radiation treatment of head and neck tumors. An immobilization mask is manufactured directly from a 3-D model, built using the CT data routinely acquired for treatment planning so there is no need to take plaster of Paris moulds. Research suggests that many patients find the mould room visit distressing and so rapid prototyping could potentially improve the overall patient experience. Evaluation of a computer model of the immobilization system using an anthropomorphic phantom shows that >99% of vertices are within a tolerance of ±0.2 mm. Hausdorff distance was used to analyze CT slices obtained by rescanning the phantom with a printed mask in position. These results show that for >80% of the slices the median “worse-case” tolerance is approximately 4 mm. These measurements suggest that printed masks can achieve similar levels of immobilization to those of systems currently in clinical use.
文摘Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model.
文摘This study is to illustrate alpine vegetation dynamics in Qinghai-Tibetan Plateau of China from simulated filed experimental climate change, vegetation community dynamic simulation integrated with scenarios of global temperature increase of 1 to 3°C, and simulated regional alpine vegetation distribution changes in responses to global warming. Our warming treatment increased air temperatures by 5°C on average and soil temperatures were elevated by 3°C at 5 cm depth. Above- ground biomass of grasses responded rapidly to the warmer conditions whereby biomass was 25% greater than that of controls after only 5 wk of experimental warming. This increase was accompanied by a simultaneous decrease in forb biomass, resulting in almost no net change in community biomass after 5 wk. Under warmed conditions, peak community bio-mass was extended into October due in part to continued growth of grasses and the postponement of senescence. The Vegetation Dynamic Simulation Model calculates a probability surface for each vegetation type, and then combines all vegetation types into a composite map, determined by the maximum likelihood that each vegetation type should distribute to each raster unit. With scenarios of global temperature increase of 1°C to 3°C, the vegetation types such as Dry Kobresia Meadow and Dry Potentilla Shrub that are adapted to warm and dry conditions tend to become more dominant in the study area.
文摘The integration of the two fast-developing scientific research areas Semantic Web and Web Mining is known as Semantic Web Mining. The huge increase in the amount of Semantic Web data became a perfect target for many researchers to apply Data Mining techniques on it. This paper gives a detailed state-of-the-art survey of on-going research in this new area. It shows the positive effects of Semantic Web Mining, the obstacles faced by researchers and propose number of approaches to deal with the very complex and heterogeneous information and knowledge which are produced by the technologies of Semantic Web.
文摘Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance computation.Cloud provides infrastructure,platform and software as different on-demand services.China has made remarkable progress in cloudbased products and operating system technology.The government,enterprises and research institutions are all active in the development of cloud computing-related projects.Despite the progress,many important