Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow...Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils.展开更多
To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS ch...To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration.展开更多
In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation cou...In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity.展开更多
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangleds...We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement.展开更多
Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect corona...Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events.展开更多
To detect radioactive substances with low activity levels,an anticoincidence detector and a high-purity germanium(HPGe)detector are typically used simultaneously to suppress Compton scattering background,thereby resul...To detect radioactive substances with low activity levels,an anticoincidence detector and a high-purity germanium(HPGe)detector are typically used simultaneously to suppress Compton scattering background,thereby resulting in an extremely low detection limit and improving the measurement accuracy.However,the complex and expensive hardware required does not facilitate the application or promotion of this method.Thus,a method is proposed in this study to discriminate the digital waveform of pulse signals output using an HPGe detector,whereby Compton scattering background is suppressed and a low minimum detectable activity(MDA)is achieved without using an expensive and complex anticoincidence detector and device.The electric-field-strength and energy-deposition distributions of the detector are simulated to determine the relationship between pulse shape and energy-deposition location,as well as the characteristics of energy-deposition distributions for fulland partial-energy deposition events.This relationship is used to develop a pulse-shape-discrimination algorithm based on an artificial neural network for pulse-feature identification.To accurately determine the relationship between the deposited energy of gamma(γ)rays in the detector and the deposition location,we extract four shape parameters from the pulse signals output by the detector.Machine learning is used to input the four shape parameters into the detector.Subsequently,the pulse signals are identified and classified to discriminate between partial-and full-energy deposition events.Some partial-energy deposition events are removed to suppress Compton scattering.The proposed method effectively decreases the MDA of an HPGeγ-energy dispersive spectrometer.Test results show that the Compton suppression factors for energy spectra obtained from measurements on ^(152)Eu,^(137)Cs,and ^(60)Co radioactive sources are 1.13(344 keV),1.11(662 keV),and 1.08(1332 keV),respectively,and that the corresponding MDAs are 1.4%,5.3%,and 21.6%lower,respectively.展开更多
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a...A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.展开更多
Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately ...Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer.展开更多
Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,maki...Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production.展开更多
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection...To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.展开更多
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cam...Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios.展开更多
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit...Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.展开更多
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De...The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.展开更多
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the...The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches.展开更多
Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy an...Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy and urine cytology serve as the established diagnostic methods for BC.However,their efficacy is limited by their invasive nature and low sensitivity.Therefore,the development of highly specific biomarkers and effective noninvasive detection strategies is imperative for achieving a precise and timely diagnosis of BC,as well as for facilitating an optimal tumor treatment and an improved prognosis.microRNAs(miRNAs),short noncoding RNA molecules spanning around 20–25 nucleotides,are implicated in the regulation of diverse carcinogenic pathways.Substantially altered miRNAs form robust functional regulatory networks that exert a notable influence on the tumorigenesis and progression of BC.Investigations into aberrant miRNAs derived from blood,urine,or extracellular vesicles indicate their potential roles as diagnostic biomarkers and prognostic indicators in BC,enabling miRNAs to monitor the progression and predict the recurrence of the disease.Simultaneously,the investigation centered on miRNA as a potential therapeutic agent presents a novel approach for the treatment of BC.This review comprehensively analyzes biological roles of miRNAs in tumorigenesis and progression,and systematically summarizes their potential as diagnostic and prognostic biomarkers,as well as therapeutic targets for BC.Additionally,we evaluate the progress made in laboratory techniques within this field and discuss the prospects.展开更多
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have ...A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field.展开更多
Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them...Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities.展开更多
As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex b...As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection.展开更多
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende...Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight.展开更多
文摘Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils.
文摘To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration.
基金This work was supported by the Sichuan Science and Technology Program(No.2020JDRC0108)the National Science Foundation of China(Nos.41774147 and 41774190).
文摘In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity.
基金Supported by National Natural Science Foundation of China under Grant Nos.60873191,60903152,and 60821001SRFDP under Grant No.200800131016+5 种基金Beijing Nova Program under Grant No.2008B51Key Project of Chinese Ministry of Education under Grant No.109014Beijing Natural Science Foundation under Grant No.4072020China Postdoctoral Science Foundation under Grant No.20090450018National Laboratory for Modern Communications Science Foundation of China under Grant No.9140C1101010601ISN Open Foundation
文摘We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement.
文摘Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events.
基金This work was supported by the National Key R&D Program of China(Nos.2022YFF0709503,2022YFB1902700,2017YFC0602101)the Key Research and Development Program of Sichuan province(No.2023YFG0347)the Key Research and Development Program of Sichuan province(No.2020ZDZX0007).
文摘To detect radioactive substances with low activity levels,an anticoincidence detector and a high-purity germanium(HPGe)detector are typically used simultaneously to suppress Compton scattering background,thereby resulting in an extremely low detection limit and improving the measurement accuracy.However,the complex and expensive hardware required does not facilitate the application or promotion of this method.Thus,a method is proposed in this study to discriminate the digital waveform of pulse signals output using an HPGe detector,whereby Compton scattering background is suppressed and a low minimum detectable activity(MDA)is achieved without using an expensive and complex anticoincidence detector and device.The electric-field-strength and energy-deposition distributions of the detector are simulated to determine the relationship between pulse shape and energy-deposition location,as well as the characteristics of energy-deposition distributions for fulland partial-energy deposition events.This relationship is used to develop a pulse-shape-discrimination algorithm based on an artificial neural network for pulse-feature identification.To accurately determine the relationship between the deposited energy of gamma(γ)rays in the detector and the deposition location,we extract four shape parameters from the pulse signals output by the detector.Machine learning is used to input the four shape parameters into the detector.Subsequently,the pulse signals are identified and classified to discriminate between partial-and full-energy deposition events.Some partial-energy deposition events are removed to suppress Compton scattering.The proposed method effectively decreases the MDA of an HPGeγ-energy dispersive spectrometer.Test results show that the Compton suppression factors for energy spectra obtained from measurements on ^(152)Eu,^(137)Cs,and ^(60)Co radioactive sources are 1.13(344 keV),1.11(662 keV),and 1.08(1332 keV),respectively,and that the corresponding MDAs are 1.4%,5.3%,and 21.6%lower,respectively.
文摘A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
基金Supported by Shandong Province Medical and Health Science and Technology Development Plan Project,No.202203030713Clinical Research Funding of Shandong Medical Association-Qilu Specialization,No.YXH2022ZX02031Science and Technology Program of Yantai Affiliated Hospital of Binzhou Medical University,No.YTFY2022KYQD06.
文摘Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer.
基金National Key Research and Development Program of China(Nos.2022YFB4700600 and 2022YFB4700605)National Natural Science Foundation of China(Nos.61771123 and 62171116)+1 种基金Fundamental Research Funds for the Central UniversitiesGraduate Student Innovation Fund of Donghua University,China(No.CUSF-DH-D-2022044)。
文摘Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.
基金supported by the Ningxia Key Research and Development Program(Talent Introduction Special Project)Project(2022YCZX0013)North Minzu University 2022 School-Level Scientific Research Platform“Digital Agriculture Enabling Ningxia Rural Revitalization Innovation Team”(2022PT_S10)+1 种基金Yinchuan City University-Enterprise Joint Innovation Project(2022XQZD009)Ningxia Key Research and Development Program(Key Project)Project(2023BDE02001).
文摘Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios.
基金supported by a grant from the Basic Science Research Program through the National Research Foundation(NRF)(2021R1F1A1063634)funded by the Ministry of Science and ICT(MSIT),Republic of KoreaThe authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Group Funding Program Grant Code(NU/RG/SERC/13/40)+2 种基金Also,the authors are thankful to Prince Satam bin Abdulaziz University for supporting this study via funding from Prince Satam bin Abdulaziz University project number(PSAU/2024/R/1445)This work was also supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R54)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.
基金supported by the National Key Research and Development Plan in China(Grant No.2020YFB1005500)。
文摘The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.
文摘The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches.
基金supported by the China Postdoctoral Science Foundation(Grant No.2022M721404)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220737)+1 种基金the Social Development Foundation of Clinical Frontier Technology of Jiangsu Province(Grant No.BE2017763)the Medical Research Project of Jiangsu Province Health Committee(Grant No.K2019020).
文摘Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy and urine cytology serve as the established diagnostic methods for BC.However,their efficacy is limited by their invasive nature and low sensitivity.Therefore,the development of highly specific biomarkers and effective noninvasive detection strategies is imperative for achieving a precise and timely diagnosis of BC,as well as for facilitating an optimal tumor treatment and an improved prognosis.microRNAs(miRNAs),short noncoding RNA molecules spanning around 20–25 nucleotides,are implicated in the regulation of diverse carcinogenic pathways.Substantially altered miRNAs form robust functional regulatory networks that exert a notable influence on the tumorigenesis and progression of BC.Investigations into aberrant miRNAs derived from blood,urine,or extracellular vesicles indicate their potential roles as diagnostic biomarkers and prognostic indicators in BC,enabling miRNAs to monitor the progression and predict the recurrence of the disease.Simultaneously,the investigation centered on miRNA as a potential therapeutic agent presents a novel approach for the treatment of BC.This review comprehensively analyzes biological roles of miRNAs in tumorigenesis and progression,and systematically summarizes their potential as diagnostic and prognostic biomarkers,as well as therapeutic targets for BC.Additionally,we evaluate the progress made in laboratory techniques within this field and discuss the prospects.
文摘A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field.
基金the financial support from Shenzhen Science and Technology Program (JCYJ20210324142210027, X.D.)the National Natural Science Foundation of China (52103136, 22275028, U22A20153, 22102017, 22302033, and 52106194)+5 种基金the Sichuan Outstanding Young Scholars Foundation (2021JDJQ0013)Natural Science Foundation of Sichuan Province (2022NSFSC1271)Sichuan Science and Technology Program (2023JDRC0082)“Oncology Medical Engineering Innovation Foundation” project of University of Electronic Science and Technology of China and Sichuan Cancer Hospital (ZYGX2021YGCX009)“Medical and Industrial Cross Foundation” of University of Electronic Science and Technology of China and Sichuan Provincial People’s Hospital (ZYGX2021YGLH207)Shandong Key R&D grant (2022CXGC010509)。
文摘Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities.
基金supported in part by the National Natural Science Foundation of China under Grants 32171909,51705365,52205254The Guangdong Basic and Applied Basic Research Foundation under Grants 2020B1515120050,2023A1515011255+2 种基金The Guangdong Key R&D projects under Grant 2020B0404030001the Scientific Research Projects of Universities in Guangdong Province under Grant 2020KCXTD015The Ji Hua Laboratory Open Project under Grant X220931UZ230.
文摘As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection.
基金This research was financially supported by the Ministry of Trade,Industry,and Energy(MOTIE),Korea,under the“Project for Research and Development with Middle Markets Enterprises and DNA(Data,Network,AI)Universities”(AI-based Safety Assessment and Management System for Concrete Structures)(ReferenceNumber P0024559)supervised by theKorea Institute for Advancement of Technology(KIAT).
文摘Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight.