期刊文献+
共找到8,739篇文章
< 1 2 250 >
每页显示 20 50 100
Evaluating the Effect of Tillage on Carbon Sequestration Using the Minimum Detectable Difference Concept 被引量:13
1
作者 X. M. YANG C. F. DRURY +1 位作者 M. M. WANDER B. D. KAY 《Pedosphere》 SCIE CAS CSCD 2008年第4期421-430,共10页
Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow... Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils. 展开更多
关键词 carbon sequestration minimum detectable difference moldboard plow NO-TILLAGE soil depth
下载PDF
Effective path planning method for low detectable aircraft 被引量:2
2
作者 Wang Lingxiao Zhou Deyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期784-789,共6页
To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS ch... To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration. 展开更多
关键词 path planning low detectable aircraft radar scattering cross section threat lever cost function
下载PDF
Investigating the minimum detectable activity concentration and contributing factors in airborne gamma-ray spectrometry 被引量:1
3
作者 Yi Gu Kun Sun +6 位作者 Liang-Quan Ge Yuan-Dong Li Qing-Xian Zhang Xuan Guan Wan-Chang Lai Zhong-Xiang Lin Xiao-Zhong Han 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2021年第10期30-38,共9页
In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation cou... In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity. 展开更多
关键词 Airborne gamma-ray spectrometry(AGS) Minimum detectable activity concentration(MDAC) Sensitivity
下载PDF
A New Solution to Detectable Byzantine Agreement Problem
4
作者 QIN Su-Juan WEN Qiao-Yan +1 位作者 MENG Luo-Ming ZHU Fu-Chen 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第12期1013-1015,共3页
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangleds... We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement. 展开更多
关键词 quantum protocol detectable Byzantine agreement entangled state
下载PDF
Clinical Signifi cance of Angiographically Detectable Neovascularity in Patients with Cardiac Myxoma
5
作者 Xiaofan Peng Yichao Xiao +7 位作者 Yanan Guo Zhaowei Zhu Liyan Liao Xiaobo Liao Xinqun Hu Zhenfei Fang Xuping Li Shenghua Zhou 《Cardiovascular Innovations and Applications》 2021年第4期99-108,共10页
Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect corona... Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events. 展开更多
关键词 Cardiac myxomas coronary angiography angiographically detectable neovascularity major adverse cardiac and cerebrovascular events
下载PDF
Artificial neural network-based method for discriminating Compton scattering events in high-purity germaniumγ-ray spectrometer
6
作者 Chun-Di Fan Guo-Qiang Zeng +5 位作者 Hao-Wen Deng Lei Yan Jian Yang Chuan-Hao Hu Song Qing Yang Hou 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第2期64-84,共21页
To detect radioactive substances with low activity levels,an anticoincidence detector and a high-purity germanium(HPGe)detector are typically used simultaneously to suppress Compton scattering background,thereby resul... To detect radioactive substances with low activity levels,an anticoincidence detector and a high-purity germanium(HPGe)detector are typically used simultaneously to suppress Compton scattering background,thereby resulting in an extremely low detection limit and improving the measurement accuracy.However,the complex and expensive hardware required does not facilitate the application or promotion of this method.Thus,a method is proposed in this study to discriminate the digital waveform of pulse signals output using an HPGe detector,whereby Compton scattering background is suppressed and a low minimum detectable activity(MDA)is achieved without using an expensive and complex anticoincidence detector and device.The electric-field-strength and energy-deposition distributions of the detector are simulated to determine the relationship between pulse shape and energy-deposition location,as well as the characteristics of energy-deposition distributions for fulland partial-energy deposition events.This relationship is used to develop a pulse-shape-discrimination algorithm based on an artificial neural network for pulse-feature identification.To accurately determine the relationship between the deposited energy of gamma(γ)rays in the detector and the deposition location,we extract four shape parameters from the pulse signals output by the detector.Machine learning is used to input the four shape parameters into the detector.Subsequently,the pulse signals are identified and classified to discriminate between partial-and full-energy deposition events.Some partial-energy deposition events are removed to suppress Compton scattering.The proposed method effectively decreases the MDA of an HPGeγ-energy dispersive spectrometer.Test results show that the Compton suppression factors for energy spectra obtained from measurements on ^(152)Eu,^(137)Cs,and ^(60)Co radioactive sources are 1.13(344 keV),1.11(662 keV),and 1.08(1332 keV),respectively,and that the corresponding MDAs are 1.4%,5.3%,and 21.6%lower,respectively. 展开更多
关键词 High-purity germaniumγ-ray spectrometer Pulse-shape discrimination Compton scattering Artificial neural network Minimum detectable activity
下载PDF
基于改进Detection Transformer的棉花幼苗与杂草检测模型研究
7
作者 冯向萍 杜晨 +3 位作者 李永可 张世豪 舒芹 赵昀杰 《计算机与数字工程》 2024年第7期2176-2182,共7页
基于深度学习的目标检测技术在棉花幼苗与杂草检测领域已取得一定进展。论文提出了基于改进Detection Transformer的棉花幼苗与杂草检测模型,以提高杂草目标检测的准确率和效率。首先,引入了可变形注意力模块替代原始模型中的Transforme... 基于深度学习的目标检测技术在棉花幼苗与杂草检测领域已取得一定进展。论文提出了基于改进Detection Transformer的棉花幼苗与杂草检测模型,以提高杂草目标检测的准确率和效率。首先,引入了可变形注意力模块替代原始模型中的Transformer注意力模块,提高模型对特征图目标形变的处理能力。提出新的降噪训练机制,解决了二分图匹配不稳定问题。提出混合查询选择策略,提高解码器对目标类别和位置信息的利用效率。使用Swin Transformer作为网络主干,提高模型特征提取能力。通过对比原网络,论文提出的模型方法在训练过程中表现出更快的收敛速度,并且在准确率方面提高了6.7%。 展开更多
关键词 目标检测 Detection Transformer 棉花幼苗 杂草检测
下载PDF
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic 被引量:3
8
作者 Farhan Ullah Shamsher Ullah +1 位作者 Gautam Srivastava Jerry Chun-Wei Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第1期190-204,共15页
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a... A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model. 展开更多
关键词 Network intrusion detection Transfer learning Features extraction Imbalance data Explainable AI CYBERSECURITY
下载PDF
Esophageal cancer screening,early detection and treatment:Current insights and future directions 被引量:3
9
作者 Hong-Tao Qu Qing Li +7 位作者 Liang Hao Yan-Jing Ni Wen-Yu Luan Zhe Yang Xiao-Dong Chen Tong-Tong Zhang Yan-Dong Miao Fang Zhang 《World Journal of Gastrointestinal Oncology》 SCIE 2024年第4期1180-1191,共12页
Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately ... Esophageal cancer ranks among the most prevalent malignant tumors globally,primarily due to its highly aggressive nature and poor survival rates.According to the 2020 global cancer statistics,there were approximately 604000 new cases of esophageal cancer,resulting in 544000 deaths.The 5-year survival rate hovers around a mere 15%-25%.Notably,distinct variations exist in the risk factors associated with the two primary histological types,influencing their worldwide incidence and distribution.Squamous cell carcinoma displays a high incidence in specific regions,such as certain areas in China,where it meets the cost-effect-iveness criteria for widespread endoscopy-based early diagnosis within the local population.Conversely,adenocarcinoma(EAC)represents the most common histological subtype of esophageal cancer in Europe and the United States.The role of early diagnosis in cases of EAC originating from Barrett's esophagus(BE)remains a subject of controversy.The effectiveness of early detection for EAC,particularly those arising from BE,continues to be a debated topic.The variations in how early-stage esophageal carcinoma is treated in different regions are largely due to the differing rates of early-stage cancer diagnoses.In areas with higher incidences,such as China and Japan,early diagnosis is more common,which has led to the advancement of endoscopic methods as definitive treatments.These techniques have demonstrated remarkable efficacy with minimal complications while preserving esophageal functionality.Early screening,prompt diagnosis,and timely treatment are key strategies that can significantly lower both the occurrence and death rates associated with esophageal cancer. 展开更多
关键词 Esophageal cancer SCREENING Early detection Treatment Endoscopic mucosal resection Endoscopic submucosal dissection
下载PDF
Improvement of High-Speed Detection Algorithm for Nonwoven Material Defects Based on Machine Vision 被引量:2
10
作者 LI Chengzu WEI Kehan +4 位作者 ZHAO Yingbo TIAN Xuehui QIAN Yang ZHANG Lu WANG Rongwu 《Journal of Donghua University(English Edition)》 CAS 2024年第4期416-427,共12页
Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,maki... Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production. 展开更多
关键词 defect detection nonwoven materials deep learning object detection algorithm transfer learning halfprecision quantization
下载PDF
A Hybrid Intrusion Detection Method Based on Convolutional Neural Network and AdaBoost 被引量:1
11
作者 Wu Zhijun Li Yuqi Yue Meng 《China Communications》 SCIE CSCD 2024年第11期180-189,共10页
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection... To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data. 展开更多
关键词 ADABOOST CNN detection rate false positive rate feature extraction intrusion detection
下载PDF
Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles 被引量:1
12
作者 Qunyue Mu Qiancheng Yu +2 位作者 Chengchen Zhou Lei Liu Xulong Yu 《Computers, Materials & Continua》 SCIE EI 2024年第7期449-466,共18页
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cam... Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios. 展开更多
关键词 YOLOv8 object detection electric bicycle helmet detection electric bicycle license plate detection
下载PDF
Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features 被引量:1
13
作者 Asifa Mehmood Qureshi Naif Al Mudawi +2 位作者 Mohammed Alonazi Samia Allaoua Chelloug Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2024年第3期3683-3701,共19页
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit... Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved. 展开更多
关键词 Unmanned Aerial Vehicles(UAV) aerial images DATASET object detection object tracking data elimination template matching blob detection SIFT VAID
下载PDF
Automated Vulnerability Detection of Blockchain Smart Contacts Based on BERT Artificial Intelligent Model 被引量:1
14
作者 Feng Yiting Ma Zhaofeng +1 位作者 Duan Pengfei Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期237-251,共15页
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De... The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy. 展开更多
关键词 BERT blockchain smart contract vulnerability detection
下载PDF
An Intelligent SDN-IoT Enabled Intrusion Detection System for Healthcare Systems Using a Hybrid Deep Learning and Machine Learning Approach 被引量:1
15
作者 R Arthi S Krishnaveni Sherali Zeadally 《China Communications》 SCIE CSCD 2024年第10期267-287,共21页
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the... The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches. 展开更多
关键词 deep neural network healthcare intrusion detection system IOT machine learning software-defined networks
下载PDF
Potential clinical application of microRNAs in bladder cancer 被引量:1
16
作者 Pei Wang Xiaowei Wei +1 位作者 Xiaojun Qu Yefei Zhu 《Journal of Biomedical Research》 CAS CSCD 2024年第4期289-306,共18页
Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy an... Bladder cancer(BC)is the tenth most prevalent malignancy globally,presenting significant clinical and societal challenges because of its high incidence,rapid progression,and frequent recurrence.Presently,cystoscopy and urine cytology serve as the established diagnostic methods for BC.However,their efficacy is limited by their invasive nature and low sensitivity.Therefore,the development of highly specific biomarkers and effective noninvasive detection strategies is imperative for achieving a precise and timely diagnosis of BC,as well as for facilitating an optimal tumor treatment and an improved prognosis.microRNAs(miRNAs),short noncoding RNA molecules spanning around 20–25 nucleotides,are implicated in the regulation of diverse carcinogenic pathways.Substantially altered miRNAs form robust functional regulatory networks that exert a notable influence on the tumorigenesis and progression of BC.Investigations into aberrant miRNAs derived from blood,urine,or extracellular vesicles indicate their potential roles as diagnostic biomarkers and prognostic indicators in BC,enabling miRNAs to monitor the progression and predict the recurrence of the disease.Simultaneously,the investigation centered on miRNA as a potential therapeutic agent presents a novel approach for the treatment of BC.This review comprehensively analyzes biological roles of miRNAs in tumorigenesis and progression,and systematically summarizes their potential as diagnostic and prognostic biomarkers,as well as therapeutic targets for BC.Additionally,we evaluate the progress made in laboratory techniques within this field and discuss the prospects. 展开更多
关键词 bladder cancer MICRORNAS BIOMARKER DIAGNOSIS detection method
下载PDF
Feature extraction for machine learning-based intrusion detection in IoT networks 被引量:1
17
作者 Mohanad Sarhan Siamak Layeghy +2 位作者 Nour Moustafa Marcus Gallagher Marius Portmann 《Digital Communications and Networks》 SCIE CSCD 2024年第1期205-216,共12页
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have ... A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field. 展开更多
关键词 Feature extraction Machine learning Network intrusion detection system IOT
下载PDF
Superhydrophobic Surface-Assisted Preparation of Microspheres and Supraparticles and Their Applications 被引量:1
18
作者 Mengyao Pan Huijuan Shao +11 位作者 Yue Fan Jinlong Yang Jiaxin Liu Zhongqian Deng Zhenda Liu Zhidi Chen Jun Zhang Kangfeng Yi Yucai Su Dehui Wang Xu Deng Fei Deng 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第4期110-138,共29页
Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them... Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities. 展开更多
关键词 Superhydrophobic surface Microspheres and supraparticles Photonic devices CATALYSTS Biomedical and trace detections
下载PDF
YOLO-DD:Improved YOLOv5 for Defect Detection 被引量:1
19
作者 Jinhai Wang Wei Wang +4 位作者 Zongyin Zhang Xuemin Lin Jingxian Zhao Mingyou Chen Lufeng Luo 《Computers, Materials & Continua》 SCIE EI 2024年第1期759-780,共22页
As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex b... As computer technology continues to advance,factories have increasingly higher demands for detecting defects.However,detecting defects in a plant environment remains a challenging task due to the presence of complex backgrounds and defects of varying shapes and sizes.To address this issue,this paper proposes YOLO-DD,a defect detectionmodel based on YOLOv5 that is effective and robust.To improve the feature extraction process and better capture global information,the vanilla YOLOv5 is augmented with a new module called Relative-Distance-Aware Transformer(RDAT).Additionally,an Information Gap Filling Strategy(IGFS)is proposed to improve the fusion of features at different scales.The classic lightweight attention mechanism Squeeze-and-Excitation(SE)module is also incorporated into the neck section to enhance feature expression and improve the model’s performance.Experimental results on the NEU-DET dataset demonstrate that YOLO-DDachieves competitive results compared to state-of-the-art methods,with a 2.0% increase in accuracy compared to the original YOLOv5,achieving 82.41% accuracy and38.25FPS(framesper second).Themodel is also testedon a self-constructed fabric defect dataset,and the results show that YOLO-DD is more stable and has higher accuracy than the original YOLOv5,demonstrating its stability and generalization ability.The high efficiency of YOLO-DD enables it to meet the requirements of industrial high accuracy and real-time detection. 展开更多
关键词 YOLO-DD defect detection feature fusion attention mechanism
下载PDF
Defect Detection Model Using Time Series Data Augmentation and Transformation 被引量:1
20
作者 Gyu-Il Kim Hyun Yoo +1 位作者 Han-Jin Cho Kyungyong Chung 《Computers, Materials & Continua》 SCIE EI 2024年第2期1713-1730,共18页
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende... Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight. 展开更多
关键词 Defect detection time series deep learning data augmentation data transformation
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部