Rockbursts have become a significant hazard in underground mining,underscoring the need for a robust early warning model to ensure safety management.This study presents a novel approach for rockburst prediction,integr...Rockbursts have become a significant hazard in underground mining,underscoring the need for a robust early warning model to ensure safety management.This study presents a novel approach for rockburst prediction,integrating the Mann-Kendall trend test(MKT)and multi-indices fusion to enable real-time and quantitative assessment of rockburst hazards.The methodology employed in this study involves the development of a comprehensive precursory index library for rockbursts.The MKT is then applied to analyze the real-time trend of each index,with adherence to rockburst characterization laws serving as the warning criterion.By employing a confusion matrix,the warning effectiveness of each index is assessed,enabling index preference determination.Ultimately,the integrated rockburst hazard index Q is derived through data fusion.The results demonstrate that the proposed model achieves a warning effectiveness of 0.563 for Q,surpassing the performance of any individual index.Moreover,the model’s adaptability and scalability are enhanced through periodic updates driven by actual field monitoring data,making it suitable for complex underground working environments.By providing an efficient and accurate basis for decision-making,the proposed model holds great potential for the prevention and control of rockbursts.It offers a valuable tool for enhancing safety measures in underground mining operations.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
[Objectives]This study aimed to investigate the incidence and risk factors associated with SSD in patients following cardiac surgery.[Methods]A total of 378 patients who underwent cardiac surgery in Taihe Hospital wer...[Objectives]This study aimed to investigate the incidence and risk factors associated with SSD in patients following cardiac surgery.[Methods]A total of 378 patients who underwent cardiac surgery in Taihe Hospital were recruited and screened.Diagnosis of delirium was made using evaluation methods and DSM-5 criteria.SSD was defined as the presence of one or more core features of delirium without meeting the full diagnostic criteria.Statistical analysis included independent samples t-test for group comparisons and binary logistic regression analysis to identify independent risk factors for SSD after cardiac surgery.[Results]Among the 378 subjects,112(29.63%)had SSD,28(7.41%)had delirium,and the remaining 238 patients(62.96%)did not present with delirium.Univariate analysis revealed that age,APACHE II score,duration of aortic clamping,length of ICU stay,duration of sedation use,and daily sleep time were significant risk factors for the occurrence of SSD(P<0.05).Logistic regression analysis identified age>70 years old,APACHE II score>20 points,length of ICU stay>5 d,and duration of sedation use>24 h as independent risk factors for SSD after cardiac surgery(P<0.05).A functional model was fitted based on the analysis results of the binary logistic regression model,yielding the equation logit P=1.472X_(1)+2.213X_(2)+3.028X_(3)+1.306X_(4).[Conclusions]Comprehensive clinical assessment is crucial for patients undergoing cardiac surgery,and appropriate preventive measures should be taken for patients with identified risk factors.Close monitoring of the patient s consciousness should be implemented postoperatively,and timely interventions should be conducted.Further research should focus on model validation and optimization.展开更多
This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.展开更多
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new SBox.The proposed chaos system achieves three positive Lyapunov values.So results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.展开更多
IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical sciences.The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune disease...IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical sciences.The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune diseases.The use of IIF for detecting autoimmune diseases is widespread in different medical areas.Nearly 80 different types of autoimmune diseases have existed in various body parts.The IIF has been used for image classification in both ways,manually and by using the Computer-Aided Detection(CAD)system.The data scientists conducted various research works using an automatic CAD system with low accuracy.The diseases in the human body can be detected with the help of Transfer Learning(TL),an advanced Convolutional Neural Network(CNN)approach.The baseline paper applied the manual classification to the MIVIA dataset of Human Epithelial cells(HEP)type II cells and the Sub Class Discriminant(SDA)analysis technique used to detect autoimmune diseases.The technique yielded an accuracy of up to 90.03%,which was not reliable for detecting autoimmune disease in the mitotic cells of the body.In the current research,the work has been performed on the MIVIA data set of HEP type II cells by using four well-known models of TL.Data augmentation and normalization have been applied to the dataset to overcome the problem of overfitting and are also used to improve the performance of TL models.These models are named Inception V3,Dens Net 121,VGG-16,and Mobile Net,and their performance can be calculated through parameters of the confusion matrix(accuracy,precision,recall,and F1 measures).The results show that the accuracy value of VGG-16 is 78.00%,Inception V3 is 92.00%,Dense Net 121 is 95.00%,and Mobile Net shows 88.00%accuracy,respectively.Therefore,DenseNet-121 shows the highest performance with suitable analysis of autoimmune diseases.The overall performance highlighted that TL is a suitable and enhanced technique compared to its counterparts.Also,the proposed technique is used to detect autoimmune diseases with a minimal margin of errors and flaws.展开更多
Fraud detection for credit/debit card,loan defaulters and similar types is achievable with the assistance of Machine Learning(ML)algorithms as they are well capable of learning from previous fraud trends or historical...Fraud detection for credit/debit card,loan defaulters and similar types is achievable with the assistance of Machine Learning(ML)algorithms as they are well capable of learning from previous fraud trends or historical data and spot them in current or future transactions.Fraudulent cases are scant in the comparison of non-fraudulent observations,almost in all the datasets.In such cases detecting fraudulent transaction are quite difficult.The most effective way to prevent loan default is to identify non-performing loans as soon as possible.Machine learning algorithms are coming into sight as adept at handling such data with enough computing influence.In this paper,the rendering of different machine learning algorithms such as Decision Tree,Random Forest,linear regression,and Gradient Boosting method are compared for detection and prediction of fraud cases using loan fraudulent manifestations.Further model accuracy metric have been performed with confusion matrix and calculation of accuracy,precision,recall and F-1 score along with Receiver Operating Characteristic(ROC)curves.展开更多
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami...Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.展开更多
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery dete...With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery detection techniques.In this paper,a U-Net with multiple sensory field feature extraction(MSCU-Net)for image forgery detection is proposed.The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing.MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the features of different perceptual fields use residual propagation and residual feedback to recall the input feature information and consolidate the input feature information to make the difference in image attributes between the untampered and tampered regions more obvious,and introduce the channel coordinate confusion attention mechanism(CCCA)in skip-connection to further improve the segmentation accuracy of the network.In this paper,extensive experiments are conducted on various mainstream datasets,and the results verify the effectiveness of the proposed method,which outperforms the state-of-the-art image forgery detection methods.展开更多
Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable t...Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger weights.The probability margin(PM)method is a promising approach to continuously and path-independently mea-suring such closeness between the example and decision boundary.However,the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories,where the latter is closer to multi-classification decision boundaries and is supported to be more critical in our observation.To tackle this problem,this paper proposed an improved PM criterion,called confused-label-based PM(CL-PM),to measure the closeness mentioned above and reweight adversarial examples during training.Specifi-cally,a confused label(CL)is defined as the label whose prediction probability is greater than that of the ground truth label given a specific adversarial example.Instead of considering the discrepancy between the probability of the true label and the probability of the most misclassified label as the PM method does,we evaluate the closeness by accumulating the probability differences of all the CLs and ground truth label.CL-PM shares a negative correlation with data vulnerability:data with larger/smaller CL-PM is safer/riskier and should have a smaller/larger weight.Experiments demonstrated that CL-PM is more reliable in indicating the closeness regarding multiple misclassified categories,and reweighting adversarial training based on CL-PM outperformed state-of-the-art counterparts.展开更多
With the guidance of Erikson’s identity theory,the article analyzes the clones’identity exploration through role identification in Never Let Me Go.It interprets the clones’puzzlement about their identity,and the pr...With the guidance of Erikson’s identity theory,the article analyzes the clones’identity exploration through role identification in Never Let Me Go.It interprets the clones’puzzlement about their identity,and the process of their identity quest as well as role identification.Through the specific analysis,it is concluded that the clones,represented by Kathy,Tommy and Ruth,have gained self-certainty and social identity by realizing the role identity as a“carer”and a“donor”,in the meantime,they have constructed their identity as social persons with souls like ordinary people.Furthermore,the findings shows that Never Let Me Go is actually a microcosm of human’s quest for identity.Ishiguro aims to express his meditation on human life in the novel:human life is a process of seeking self-identity and social roles,and then fulfilling the obligations of the roles,which confirms Ishiguro’s internationalism that he attempts to convey his contemplation on human existence through his works.展开更多
To overcome the problem that the confusion between texts limits the precision in text re- trieval, a new text retrieval algorithm that decrease confusion (DCTR) is proposed. The algorithm constructs the searching te...To overcome the problem that the confusion between texts limits the precision in text re- trieval, a new text retrieval algorithm that decrease confusion (DCTR) is proposed. The algorithm constructs the searching template to represent the user' s searching intention through positive and negative training. By using the prior probabilities in the template, the supported probability and anti- supported probability of each text in the text library can be estimated for discrimination. The search- ing result can be ranked according to similarities between retrieved texts and the template. The com- plexity of DCTR is close to term frequency and mversed document frequency (TF-IDF). Its distin- guishing ability to confusable texts could be advanced and the performance of the result would be im- proved with increasing of training times.展开更多
1.文学常识1.Modernism-It is a label loosely applied to theworks of certain writers of the late nineteenthand early twentieth centuries who investigatedthe structure and texture of literature andchallenged its CONVENTI...1.文学常识1.Modernism-It is a label loosely applied to theworks of certain writers of the late nineteenthand early twentieth centuries who investigatedthe structure and texture of literature andchallenged its CONVENTIONS.The years from1910 to 1930 are often called the Era of Moder-nism,for there seems to have been in both展开更多
This study aimed to assess the potential of in-situ measured soil and vegetation characteristics in landslide susceptibility analyses.First,data for eight independent variables,i.e.,soil moisture content,soil organic ...This study aimed to assess the potential of in-situ measured soil and vegetation characteristics in landslide susceptibility analyses.First,data for eight independent variables,i.e.,soil moisture content,soil organic content,compaction of soil(soil toughness),plant root strength,crop biomass,tree diameter at knee height,Shannon Wiener Index(SWI)for trees and herbs was assembled from field tests at two historic landslide locations:Aranayaka and Kurukudegama,Sri Lanka.An economical,finer resolution database was obtained as the field tests were not cost-prohibitive.The logistic regression(LR)analysis showed that soil moisture content,compaction of soil,SWI for trees and herbs were statistically significant at P<0.05.The variance inflation factors(VIFs)were computed to test for multicollinearity.VIF values(<2)confirmed the absence of multicollinearity between four independent variables in the LR model.Receiver Operating Characteristics(ROC)curve and Confusion Metrix(CM)methods were used to validate the model.In ROC analysis,areas under the curve of Success Rate Curve and Prediction Rate Curve were 84.5% and 96.6%,respectively,demonstrating the model’s excellent compatibility and predictability.According to the CM,the model demonstrated a 79.6% accuracy,63.6% precision,100% recall,and a F-measure of 77.8%.The model coefficients revealed that the vegetation cover has a more significant contribution to landslide susceptibility than soil characteristics.Finally,the susceptibility map,which was then classified as low,medium,and highly susceptible areas based on the natural breaks(Jenks)method,was generated using geographical information systems(GIS)techniques.All the historic landslide locations fell into the high susceptibility areas.Thus,validation of the model and inspection of the susceptibility map indicated that the in-situ soil and vegetation characteristics used in the model could be employed to demarcate historical landslide patches and identify landslide susceptible locations with high confidence.展开更多
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them....Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional(4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes,and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication.展开更多
Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as i...Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as its need for a concurrent guaranteed trusted third party,should not be overlooked.With the advent of blockchain technology in recent years,its features such as decentralization,anonymity,and non-tampering have made it a good candidate in solving the problems that electronic voting faces.In this study,we propose a multi-candidate voting model based on the blockchain technology.With the introduction of an asymmetric encryption and an anonymity-preserving voting algorithm,votes can be counted without relying on a third party,and the voting results can be displayed in real time in a manner that satisfies various levels of voting security and privacy requirements.Experimental results show that the proposed model solves the aforementioned problems of electronic voting without significant negative impact from an increasing number of voters or candidates.展开更多
The purpose of this paper is to propose a new multi stage algorithm for the recognition of isolated characters. It was similar work done before using only the center of gravity (This paper is extended version of “A f...The purpose of this paper is to propose a new multi stage algorithm for the recognition of isolated characters. It was similar work done before using only the center of gravity (This paper is extended version of “A fast recognition system for isolated printed characters using center of gravity”, LAP LAMBERT Academic Publishing 2011, ISBN: 978-38465-0002-6), but here we add using principal axis in order to make the algorithm rotation invariant. In my previous work which is published in LAP LAMBERT, I face a big problem that when the character is rotated I can’t recognize the character. So this adds constrain on the document to be well oriented but here I use the principal axis in order to unify the orientation of the character set and the characters in the scanned document. The algorithm can be applied for any isolated character such as Latin, Chinese, Japanese, and Arabic characters but it has been applied in this paper for Arabic characters. The approach uses normalized and isolated characters of the same size and extracts an image signature based on the center of gravity of the character after making the character principal axis vertical, and then the system compares these values to a set of signatures for typical characters of the set. The system then provides the closeness of match to all other characters in the set.展开更多
G. El Sela is located in the Southern Eastern Desert of Egypt cropping as two parts, occupied by monzogranites that were categorized as biotite granite, muscovite granite and two mica granites. The northern part is mo...G. El Sela is located in the Southern Eastern Desert of Egypt cropping as two parts, occupied by monzogranites that were categorized as biotite granite, muscovite granite and two mica granites. The northern part is more significant according its high concentrations of uranium that controlled by complicated structure regime;faulting, infrastructures and shearing are the most common structural criteria of this part. The Egyptian Nuclear Materials Authority (NMA) mined this part to produce the uranium ore. The previous mineralogical studies indicated that this granite was dominated by primary uranium minerals (pitchblende and coffinite) and secondary minerals belong to the autunite group (autunite, metautunite, phurcalite) in addition to uranophane. In the present work, petrographic and mineralogical studies are applied for the granites using the polarized and stereo microscopes and followed by electron microscope and XRD. The result of the microscopic examinations revealed the tectonic regime controlling the radioactivity and recognized the sodic autunite (meta-natroautunite) beside the pre-mentioned autunite group minerals completing the paragenetic sequrnce of these minerals. In this study, it is concluded that the sheared biotite granite is monzogranite originated during the episode of the continental plate collision (syncollision). The study finished to presence of two main types of the alteration corresponding to the two high levels of radioactivity (moderate and anomalous). The first is the thermal alteration (saussiritization, sericitization, kaolinization, silicification and hematization) and the second is the chemical transformation (oxidation, dehydration, ion substitutions and confusion) responsible for formation of the secondary uranium minerals. The temperature needed for the thermal alteration is sourced by the hydrothermal solutions, while the temperature needed for the uranium minerals transformation may be generated during the episode of the continental plate collision (syncollision). Paragenesis of these minerals indicates that they represent a series of uranyl phosphate minerals (autunite group) with paragenetic sequence starting by autunite (calcic uranyl phosphate) and ends by meta-natroautunite (sodic uranyl phosphate). An advanced process of dehydration accompanies the process of mineral transformation from autunite to meta-natroautunite leading to formation of the anhydrous uranyl mineral (phurcalite) formed by oxidation and dehydration of autunite. Meta-autunite is recorded as a transitional mineral composed of sodic-calcic uranyl phosphate. Uranophane is created by thermal confusion of autunite with the silica.展开更多
Oddly enough FDR1 and Churchill were eighth cousins once removed2, if the researches of one genealogist3 are correct. Both men, it appears, can trace a common descent4 from a personage known as John Cooke who came to ...Oddly enough FDR1 and Churchill were eighth cousins once removed2, if the researches of one genealogist3 are correct. Both men, it appears, can trace a common descent4 from a personage known as John Cooke who came to America on the Mayflower. John married Sarah Warren; one of their daughters was the great-great-great-great-great-great-grandmother of Sara Delano, FDR’s mother, and another was a direct ancestress5 of Churchill’s American-born mother, Jennie Jerome.展开更多
Araby is one of the short stories in James Joyce's collection,Dubliners.In the novel Araby,James Joyce used several religious images,such as the priest's books,the chalice,the wild garden and the name of bazaa...Araby is one of the short stories in James Joyce's collection,Dubliners.In the novel Araby,James Joyce used several religious images,such as the priest's books,the chalice,the wild garden and the name of bazaar,Araby.This paper is an attempt to analyze these religious images within the context,finding the idea that the Catholic belief's decline and people's confusion of the traditional faith which the writer intended to convey.展开更多
基金The authors gratefully acknowledge the financial support from the National Natural Science Foundation of China(Grant Nos.52011530037 and 51904019)the Fundamental Research Funds for the Central Universities and the Youth Teacher International Exchange&Growth Program(Grant No.QNXM20210004).We also greatly appreciate the assistance provided by Kuangou coal mine,China Energy Group Xinjiang Energy Co.,Ltd.
文摘Rockbursts have become a significant hazard in underground mining,underscoring the need for a robust early warning model to ensure safety management.This study presents a novel approach for rockburst prediction,integrating the Mann-Kendall trend test(MKT)and multi-indices fusion to enable real-time and quantitative assessment of rockburst hazards.The methodology employed in this study involves the development of a comprehensive precursory index library for rockbursts.The MKT is then applied to analyze the real-time trend of each index,with adherence to rockburst characterization laws serving as the warning criterion.By employing a confusion matrix,the warning effectiveness of each index is assessed,enabling index preference determination.Ultimately,the integrated rockburst hazard index Q is derived through data fusion.The results demonstrate that the proposed model achieves a warning effectiveness of 0.563 for Q,surpassing the performance of any individual index.Moreover,the model’s adaptability and scalability are enhanced through periodic updates driven by actual field monitoring data,making it suitable for complex underground working environments.By providing an efficient and accurate basis for decision-making,the proposed model holds great potential for the prevention and control of rockbursts.It offers a valuable tool for enhancing safety measures in underground mining operations.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.
基金Supported by Philosophy and Social Science Research Project of Hubei Education Department in 2022(22D092)Guiding Scientific Research Project of Shiyan Science and Technology Bureau in 2022(22Y34).
文摘[Objectives]This study aimed to investigate the incidence and risk factors associated with SSD in patients following cardiac surgery.[Methods]A total of 378 patients who underwent cardiac surgery in Taihe Hospital were recruited and screened.Diagnosis of delirium was made using evaluation methods and DSM-5 criteria.SSD was defined as the presence of one or more core features of delirium without meeting the full diagnostic criteria.Statistical analysis included independent samples t-test for group comparisons and binary logistic regression analysis to identify independent risk factors for SSD after cardiac surgery.[Results]Among the 378 subjects,112(29.63%)had SSD,28(7.41%)had delirium,and the remaining 238 patients(62.96%)did not present with delirium.Univariate analysis revealed that age,APACHE II score,duration of aortic clamping,length of ICU stay,duration of sedation use,and daily sleep time were significant risk factors for the occurrence of SSD(P<0.05).Logistic regression analysis identified age>70 years old,APACHE II score>20 points,length of ICU stay>5 d,and duration of sedation use>24 h as independent risk factors for SSD after cardiac surgery(P<0.05).A functional model was fitted based on the analysis results of the binary logistic regression model,yielding the equation logit P=1.472X_(1)+2.213X_(2)+3.028X_(3)+1.306X_(4).[Conclusions]Comprehensive clinical assessment is crucial for patients undergoing cardiac surgery,and appropriate preventive measures should be taken for patients with identified risk factors.Close monitoring of the patient s consciousness should be implemented postoperatively,and timely interventions should be conducted.Further research should focus on model validation and optimization.
基金This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
文摘This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.
文摘Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new SBox.The proposed chaos system achieves three positive Lyapunov values.So results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
基金supported by the EIAS Data Science and Blockchain Lab,College of Computer and Information Sciences,Prince Sultan University,Riyadh Saudi Arabia.
文摘IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical sciences.The primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune diseases.The use of IIF for detecting autoimmune diseases is widespread in different medical areas.Nearly 80 different types of autoimmune diseases have existed in various body parts.The IIF has been used for image classification in both ways,manually and by using the Computer-Aided Detection(CAD)system.The data scientists conducted various research works using an automatic CAD system with low accuracy.The diseases in the human body can be detected with the help of Transfer Learning(TL),an advanced Convolutional Neural Network(CNN)approach.The baseline paper applied the manual classification to the MIVIA dataset of Human Epithelial cells(HEP)type II cells and the Sub Class Discriminant(SDA)analysis technique used to detect autoimmune diseases.The technique yielded an accuracy of up to 90.03%,which was not reliable for detecting autoimmune disease in the mitotic cells of the body.In the current research,the work has been performed on the MIVIA data set of HEP type II cells by using four well-known models of TL.Data augmentation and normalization have been applied to the dataset to overcome the problem of overfitting and are also used to improve the performance of TL models.These models are named Inception V3,Dens Net 121,VGG-16,and Mobile Net,and their performance can be calculated through parameters of the confusion matrix(accuracy,precision,recall,and F1 measures).The results show that the accuracy value of VGG-16 is 78.00%,Inception V3 is 92.00%,Dense Net 121 is 95.00%,and Mobile Net shows 88.00%accuracy,respectively.Therefore,DenseNet-121 shows the highest performance with suitable analysis of autoimmune diseases.The overall performance highlighted that TL is a suitable and enhanced technique compared to its counterparts.Also,the proposed technique is used to detect autoimmune diseases with a minimal margin of errors and flaws.
文摘Fraud detection for credit/debit card,loan defaulters and similar types is achievable with the assistance of Machine Learning(ML)algorithms as they are well capable of learning from previous fraud trends or historical data and spot them in current or future transactions.Fraudulent cases are scant in the comparison of non-fraudulent observations,almost in all the datasets.In such cases detecting fraudulent transaction are quite difficult.The most effective way to prevent loan default is to identify non-performing loans as soon as possible.Machine learning algorithms are coming into sight as adept at handling such data with enough computing influence.In this paper,the rendering of different machine learning algorithms such as Decision Tree,Random Forest,linear regression,and Gradient Boosting method are compared for detection and prediction of fraud cases using loan fraudulent manifestations.Further model accuracy metric have been performed with confusion matrix and calculation of accuracy,precision,recall and F-1 score along with Receiver Operating Characteristic(ROC)curves.
基金the National Natural Science Foundation of China(Grant No.61972103)the Natural Science Foundation of Guangdong Province of China(Grant No.2023A1515011207)+3 种基金the Special Project in Key Area of General University in Guangdong Province of China(Grant No.2020ZDZX3064)the Characteristic Innovation Project of General University in Guangdong Province of China(Grant No.2022KTSCX051)the Postgraduate Education Innovation Project of Guangdong Ocean University of China(Grant No.202263)the Foundation of Guangdong Provincial Engineering and Technology Research Center of Far Sea Fisheries Management and Fishing of South China Sea.
文摘Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.
基金supported in part by the National Natural Science Foundation of China(Grant Number 61971078)Chongqing University of Technology Graduate Innovation Foundation(Grant Number gzlcx20222064).
文摘With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery detection techniques.In this paper,a U-Net with multiple sensory field feature extraction(MSCU-Net)for image forgery detection is proposed.The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing.MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the features of different perceptual fields use residual propagation and residual feedback to recall the input feature information and consolidate the input feature information to make the difference in image attributes between the untampered and tampered regions more obvious,and introduce the channel coordinate confusion attention mechanism(CCCA)in skip-connection to further improve the segmentation accuracy of the network.In this paper,extensive experiments are conducted on various mainstream datasets,and the results verify the effectiveness of the proposed method,which outperforms the state-of-the-art image forgery detection methods.
基金supported by the National Natural Science Foundation of China (No.62072127,No.62002076,No.61906049)Natural Science Foundation of Guangdong Province (No.2023A1515011774,No.2020A1515010423)+3 种基金Project 6142111180404 supported by CNKLSTISS,Science and Technology Program of Guangzhou,China (No.202002030131)Guangdong basic and applied basic research fund joint fund Youth Fund (No.2019A1515110213)Open Fund Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) (No.MJUKF-IPIC202101)Scientific research project for Guangzhou University (No.RP2022003).
文摘Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks,which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger weights.The probability margin(PM)method is a promising approach to continuously and path-independently mea-suring such closeness between the example and decision boundary.However,the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories,where the latter is closer to multi-classification decision boundaries and is supported to be more critical in our observation.To tackle this problem,this paper proposed an improved PM criterion,called confused-label-based PM(CL-PM),to measure the closeness mentioned above and reweight adversarial examples during training.Specifi-cally,a confused label(CL)is defined as the label whose prediction probability is greater than that of the ground truth label given a specific adversarial example.Instead of considering the discrepancy between the probability of the true label and the probability of the most misclassified label as the PM method does,we evaluate the closeness by accumulating the probability differences of all the CLs and ground truth label.CL-PM shares a negative correlation with data vulnerability:data with larger/smaller CL-PM is safer/riskier and should have a smaller/larger weight.Experiments demonstrated that CL-PM is more reliable in indicating the closeness regarding multiple misclassified categories,and reweighting adversarial training based on CL-PM outperformed state-of-the-art counterparts.
文摘With the guidance of Erikson’s identity theory,the article analyzes the clones’identity exploration through role identification in Never Let Me Go.It interprets the clones’puzzlement about their identity,and the process of their identity quest as well as role identification.Through the specific analysis,it is concluded that the clones,represented by Kathy,Tommy and Ruth,have gained self-certainty and social identity by realizing the role identity as a“carer”and a“donor”,in the meantime,they have constructed their identity as social persons with souls like ordinary people.Furthermore,the findings shows that Never Let Me Go is actually a microcosm of human’s quest for identity.Ishiguro aims to express his meditation on human life in the novel:human life is a process of seeking self-identity and social roles,and then fulfilling the obligations of the roles,which confirms Ishiguro’s internationalism that he attempts to convey his contemplation on human existence through his works.
文摘To overcome the problem that the confusion between texts limits the precision in text re- trieval, a new text retrieval algorithm that decrease confusion (DCTR) is proposed. The algorithm constructs the searching template to represent the user' s searching intention through positive and negative training. By using the prior probabilities in the template, the supported probability and anti- supported probability of each text in the text library can be estimated for discrimination. The search- ing result can be ranked according to similarities between retrieved texts and the template. The com- plexity of DCTR is close to term frequency and mversed document frequency (TF-IDF). Its distin- guishing ability to confusable texts could be advanced and the performance of the result would be im- proved with increasing of training times.
文摘1.文学常识1.Modernism-It is a label loosely applied to theworks of certain writers of the late nineteenthand early twentieth centuries who investigatedthe structure and texture of literature andchallenged its CONVENTIONS.The years from1910 to 1930 are often called the Era of Moder-nism,for there seems to have been in both
基金funded by the National Research Council,Sri Lanka[NRC 17-066]。
文摘This study aimed to assess the potential of in-situ measured soil and vegetation characteristics in landslide susceptibility analyses.First,data for eight independent variables,i.e.,soil moisture content,soil organic content,compaction of soil(soil toughness),plant root strength,crop biomass,tree diameter at knee height,Shannon Wiener Index(SWI)for trees and herbs was assembled from field tests at two historic landslide locations:Aranayaka and Kurukudegama,Sri Lanka.An economical,finer resolution database was obtained as the field tests were not cost-prohibitive.The logistic regression(LR)analysis showed that soil moisture content,compaction of soil,SWI for trees and herbs were statistically significant at P<0.05.The variance inflation factors(VIFs)were computed to test for multicollinearity.VIF values(<2)confirmed the absence of multicollinearity between four independent variables in the LR model.Receiver Operating Characteristics(ROC)curve and Confusion Metrix(CM)methods were used to validate the model.In ROC analysis,areas under the curve of Success Rate Curve and Prediction Rate Curve were 84.5% and 96.6%,respectively,demonstrating the model’s excellent compatibility and predictability.According to the CM,the model demonstrated a 79.6% accuracy,63.6% precision,100% recall,and a F-measure of 77.8%.The model coefficients revealed that the vegetation cover has a more significant contribution to landslide susceptibility than soil characteristics.Finally,the susceptibility map,which was then classified as low,medium,and highly susceptible areas based on the natural breaks(Jenks)method,was generated using geographical information systems(GIS)techniques.All the historic landslide locations fell into the high susceptibility areas.Thus,validation of the model and inspection of the susceptibility map indicated that the in-situ soil and vegetation characteristics used in the model could be employed to demarcate historical landslide patches and identify landslide susceptible locations with high confidence.
基金supported by the National Natural Science Foundation of China(Grant Nos.61203094 and 61305042)the Natural Science Foundation of the United States(Grant Nos.CNS-1253424 and ECCS-1202225)+3 种基金the Science and Technology Foundation of Henan Province,China(Grant No.152102210048)the Foundation and Frontier Project of Henan Province,China(Grant No.162300410196)the Natural Science Foundation of Educational Committee of Henan Province,China(Grant No.14A413015)the Research Foundation of Henan University,China(Grant No.xxjc20140006)
文摘Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional(4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes,and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication.
基金This work was supported in part by Shandong Provincial Natural Science Foundation(ZR2019PF007)the National Key Research and Development Plan of China(2018YFB0803504)+2 种基金Basic Scientific Research Operating Expenses of Shandong University(2018ZQXM004)Guangdong Province Key Research and Development Plan(2019B010137004)the National Natural Science Foundation of China(U20B2046).
文摘Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as its need for a concurrent guaranteed trusted third party,should not be overlooked.With the advent of blockchain technology in recent years,its features such as decentralization,anonymity,and non-tampering have made it a good candidate in solving the problems that electronic voting faces.In this study,we propose a multi-candidate voting model based on the blockchain technology.With the introduction of an asymmetric encryption and an anonymity-preserving voting algorithm,votes can be counted without relying on a third party,and the voting results can be displayed in real time in a manner that satisfies various levels of voting security and privacy requirements.Experimental results show that the proposed model solves the aforementioned problems of electronic voting without significant negative impact from an increasing number of voters or candidates.
文摘The purpose of this paper is to propose a new multi stage algorithm for the recognition of isolated characters. It was similar work done before using only the center of gravity (This paper is extended version of “A fast recognition system for isolated printed characters using center of gravity”, LAP LAMBERT Academic Publishing 2011, ISBN: 978-38465-0002-6), but here we add using principal axis in order to make the algorithm rotation invariant. In my previous work which is published in LAP LAMBERT, I face a big problem that when the character is rotated I can’t recognize the character. So this adds constrain on the document to be well oriented but here I use the principal axis in order to unify the orientation of the character set and the characters in the scanned document. The algorithm can be applied for any isolated character such as Latin, Chinese, Japanese, and Arabic characters but it has been applied in this paper for Arabic characters. The approach uses normalized and isolated characters of the same size and extracts an image signature based on the center of gravity of the character after making the character principal axis vertical, and then the system compares these values to a set of signatures for typical characters of the set. The system then provides the closeness of match to all other characters in the set.
文摘G. El Sela is located in the Southern Eastern Desert of Egypt cropping as two parts, occupied by monzogranites that were categorized as biotite granite, muscovite granite and two mica granites. The northern part is more significant according its high concentrations of uranium that controlled by complicated structure regime;faulting, infrastructures and shearing are the most common structural criteria of this part. The Egyptian Nuclear Materials Authority (NMA) mined this part to produce the uranium ore. The previous mineralogical studies indicated that this granite was dominated by primary uranium minerals (pitchblende and coffinite) and secondary minerals belong to the autunite group (autunite, metautunite, phurcalite) in addition to uranophane. In the present work, petrographic and mineralogical studies are applied for the granites using the polarized and stereo microscopes and followed by electron microscope and XRD. The result of the microscopic examinations revealed the tectonic regime controlling the radioactivity and recognized the sodic autunite (meta-natroautunite) beside the pre-mentioned autunite group minerals completing the paragenetic sequrnce of these minerals. In this study, it is concluded that the sheared biotite granite is monzogranite originated during the episode of the continental plate collision (syncollision). The study finished to presence of two main types of the alteration corresponding to the two high levels of radioactivity (moderate and anomalous). The first is the thermal alteration (saussiritization, sericitization, kaolinization, silicification and hematization) and the second is the chemical transformation (oxidation, dehydration, ion substitutions and confusion) responsible for formation of the secondary uranium minerals. The temperature needed for the thermal alteration is sourced by the hydrothermal solutions, while the temperature needed for the uranium minerals transformation may be generated during the episode of the continental plate collision (syncollision). Paragenesis of these minerals indicates that they represent a series of uranyl phosphate minerals (autunite group) with paragenetic sequence starting by autunite (calcic uranyl phosphate) and ends by meta-natroautunite (sodic uranyl phosphate). An advanced process of dehydration accompanies the process of mineral transformation from autunite to meta-natroautunite leading to formation of the anhydrous uranyl mineral (phurcalite) formed by oxidation and dehydration of autunite. Meta-autunite is recorded as a transitional mineral composed of sodic-calcic uranyl phosphate. Uranophane is created by thermal confusion of autunite with the silica.
文摘Oddly enough FDR1 and Churchill were eighth cousins once removed2, if the researches of one genealogist3 are correct. Both men, it appears, can trace a common descent4 from a personage known as John Cooke who came to America on the Mayflower. John married Sarah Warren; one of their daughters was the great-great-great-great-great-great-grandmother of Sara Delano, FDR’s mother, and another was a direct ancestress5 of Churchill’s American-born mother, Jennie Jerome.
文摘Araby is one of the short stories in James Joyce's collection,Dubliners.In the novel Araby,James Joyce used several religious images,such as the priest's books,the chalice,the wild garden and the name of bazaar,Araby.This paper is an attempt to analyze these religious images within the context,finding the idea that the Catholic belief's decline and people's confusion of the traditional faith which the writer intended to convey.