The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness...The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things.展开更多
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized...Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives.展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advan...The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.展开更多
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with ...Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.展开更多
Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie ...Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie detection systems are non-intrusive,cost-effective,and mobile by identifying facial expressions.Over the last decade,numerous studies have been conducted on deception detection using several advanced techniques.Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception.So,it could be challenging to spot trends,practical approaches,gaps,and chances for contribution.However,there are still a lot of opportunities for innovative deception detection methods.Therefore,we used a variety of machine learning(ML)and deep learning(DL)approaches to experiment with this work.This research aims to do the following:(i)review and analyze the current lie detection(LD)systems;(ii)create a dataset;(iii)use several ML and DL techniques to identify lying;and(iv)create a hybrid model known as LDNet.By combining layers from Vgg16 and DeneseNet121,LDNet was developed and offered the best accuracy(99.50%)of all the models.Our developed hybrid model is a great addition that significantly advances the study of LD.The findings from this research endeavor are expected to advance our understanding of the effectiveness of ML and DL techniques in LD.Furthermore,it has significant practical applications in diverse domains such as security,law enforcement,border control,organizations,and investigation cases where accurate lie detection is paramount.展开更多
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a...Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates.展开更多
In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), s...In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), such as extracting information related to people’s behaviors and interactions to analyze feelings or understand the behavior of users or groups, and many others. This extracted knowledge has a very important role in decision-making, creating and improving marketing objectives and competitive advantage, monitoring events, whether political or economic, and development in all fields. Therefore, to extract this knowledge, we need to analyze the vast amount of data found within social media using the most popular data mining techniques and applications related to social media sites.展开更多
Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehens...Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance.展开更多
This paper examines the progression and advancements in fault detection techniques for photovoltaic (PV) panels, a target for optimizing the efficiency and longevity of solar energy systems. As the adoption of PV tech...This paper examines the progression and advancements in fault detection techniques for photovoltaic (PV) panels, a target for optimizing the efficiency and longevity of solar energy systems. As the adoption of PV technology grows, the need for effective fault detection strategies becomes increasingly paramount to maximize energy output and minimize operational downtimes of solar power systems. These approaches include the use of machine learning and deep learning methodologies to be able to detect the identified faults in PV technology. Here, we delve into how machine learning models, specifically kernel-based extreme learning machines and support vector machines, trained on current-voltage characteristic (I-V curve) data, provide information on fault identification. We explore deep learning approaches by taking models like EfficientNet-B0, which looks at infrared images of solar panels to detect subtle defects not visible to the human eye. We highlight the utilization of advanced image processing techniques and algorithms to exploit aerial imagery data, from Unmanned Aerial Vehicles (UAVs), for inspecting large solar installations. Some other techniques like DeepLabV3 , Feature Pyramid Networks (FPN), and U-Net will be detailed as such tools enable effective segmentation and anomaly detection in aerial panel images. Finally, we discuss implications of these technologies on labor costs, fault detection precision, and sustainability of PV installations.展开更多
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow...Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.展开更多
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advanta...The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advantages for users,it remains vulnerable to many types of attacks that attract cyber criminals.Distributed Denial of Service(DDoS)is the most common type of attack on cloud computing.Consequently,Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks.Since DDoS attacks have become increasingly widespread,it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish various types of DDoS attacks.Further,the monitoring pattern of traffic changes and accurate detection of DDoS attacks are most important and urgent.In this research work,DDoS attack detection methods based on deep belief network feature extraction and Hybrid Long Short-Term Memory(LSTM)model have been proposed with NSL-KDD dataset.In Hybrid LSTM method,the Particle Swarm Optimization(PSO)technique,which is combined to optimize the weights of the LSTM neural network,reduces the prediction error.This deep belief network method is used to extract the features of IP packets,and it identifies DDoS attacks based on PSO-LSTM model.Moreover,it accurately predicts normal network traffic and detects anomalies resulting from DDoS attacks.The proposed PSO-LSTM architecture outperforms the classification techniques including standard Support Vector Machine(SVM)and LSTM in terms of attack detection performance along with the results of the measurement of accuracy,recall,f-measure,precision.展开更多
Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social me...Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social media has become an integral part of adolescents’lives and how serious the impacts of cyberbullying and online harassment can be,particularly among teenagers.This paper contains a systematic literature review of modern strategies,machine learning methods,and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet.We undertake an in-depth review of 13 papers from four scientific databases.The article provides an overview of scientific literature to analyze the problem of cyberbullying detection from the point of view of machine learning and natural language processing.In this review,we consider a cyberbullying detection framework on social media platforms,which includes data collection,data processing,feature selection,feature extraction,and the application ofmachine learning to classify whether texts contain cyberbullying or not.This article seeks to guide future research on this topic toward a more consistent perspective with the phenomenon’s description and depiction,allowing future solutions to be more practical and effective.展开更多
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastru...Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastructure.An effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network activity.Finding unusual internet traffic has become a severe security risk for intelligent devices.These systems are negatively impacted by several attacks,which are slowing computation.In addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried data.The NSL-KDD dataset shall be utilized for both training and testing.In this paper,we present a custom ANN model architecture using the Keras open-source software package.The specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network data.The performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and ANN.It is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all evaluations.This result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy in identifying and categorizing instances of network intrusion.展开更多
Pesticide residue detection is an important work to ensure the quality safety of agricultural products.In the process of agricultural production,in order to prevent and control agricultural diseases and pests,a certai...Pesticide residue detection is an important work to ensure the quality safety of agricultural products.In the process of agricultural production,in order to prevent and control agricultural diseases and pests,a certain amount of pesticides need to be used.However,if pesticides are used excessively,there will be certain pesticide residues in crops and related products.Therefore,it is necessary to do a good job in pesticide residue detection.The gas chromatography-mass spectrometry(GC-MS)and liquid chromatography-mass spectrometry(LC-MS)detection methods have good results and can effectively detect pesticide residues in related products.This paper reviewed and analyzed the application of GC-MS and LC-MS in pesticide residue detection,and proposed optimization measures based on practical experience,hoping to provide reference for relevant scholars.展开更多
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ...Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score.展开更多
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr...Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset.展开更多
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second...This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.展开更多
In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten hum...In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten human health reported by the World Health Organization,food allergy ranks fourth,and food allergy has become a global security problem.As of now,no definitive treatment for food allergies exists,making the avoidance of allergen-containing foods the most effective prevention method.Consequently,labeling foods with allergen information serves as a crucial warning for allergic populations.Moreover,to enhance comprehension of food allergies,this article provides a brief overview of their definition and sensitization mechanisms.The main focus lies in highlighting the structure of primary allergens found in eight commonly allergenic foods and the resulting clinical symptoms they cause.Additionally,a summary of commonly employed allergen detection techniques is presented,with an analysis of their principles,advantages,and limitations.Looking ahead,the integration of diverse technological approaches to establish an efficient,accurate,and affordable allergen detection method remains a significant trend.This article has certain reference value for understanding the direction of food allergies.展开更多
文摘The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things.
基金Supported by Special Project of the Central Government in Guidance of Local Science and Technology Development (Scientific and Technological Innovation Base Project) (226Z5504G)The Fourth Batch of High-end Talent Project in Hebei Province.
文摘Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives.
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
文摘The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R513),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
基金funded by the Ministry of Higher Education(MOHE),Malaysia under the Fundamental Research Grant Project(FRGS/1/2021/SS0/TAYLOR/02/6)。
文摘Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie detection systems are non-intrusive,cost-effective,and mobile by identifying facial expressions.Over the last decade,numerous studies have been conducted on deception detection using several advanced techniques.Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception.So,it could be challenging to spot trends,practical approaches,gaps,and chances for contribution.However,there are still a lot of opportunities for innovative deception detection methods.Therefore,we used a variety of machine learning(ML)and deep learning(DL)approaches to experiment with this work.This research aims to do the following:(i)review and analyze the current lie detection(LD)systems;(ii)create a dataset;(iii)use several ML and DL techniques to identify lying;and(iv)create a hybrid model known as LDNet.By combining layers from Vgg16 and DeneseNet121,LDNet was developed and offered the best accuracy(99.50%)of all the models.Our developed hybrid model is a great addition that significantly advances the study of LD.The findings from this research endeavor are expected to advance our understanding of the effectiveness of ML and DL techniques in LD.Furthermore,it has significant practical applications in diverse domains such as security,law enforcement,border control,organizations,and investigation cases where accurate lie detection is paramount.
基金the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant number RGP-1444-0054.
文摘Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates.
文摘In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), such as extracting information related to people’s behaviors and interactions to analyze feelings or understand the behavior of users or groups, and many others. This extracted knowledge has a very important role in decision-making, creating and improving marketing objectives and competitive advantage, monitoring events, whether political or economic, and development in all fields. Therefore, to extract this knowledge, we need to analyze the vast amount of data found within social media using the most popular data mining techniques and applications related to social media sites.
文摘Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance.
文摘This paper examines the progression and advancements in fault detection techniques for photovoltaic (PV) panels, a target for optimizing the efficiency and longevity of solar energy systems. As the adoption of PV technology grows, the need for effective fault detection strategies becomes increasingly paramount to maximize energy output and minimize operational downtimes of solar power systems. These approaches include the use of machine learning and deep learning methodologies to be able to detect the identified faults in PV technology. Here, we delve into how machine learning models, specifically kernel-based extreme learning machines and support vector machines, trained on current-voltage characteristic (I-V curve) data, provide information on fault identification. We explore deep learning approaches by taking models like EfficientNet-B0, which looks at infrared images of solar panels to detect subtle defects not visible to the human eye. We highlight the utilization of advanced image processing techniques and algorithms to exploit aerial imagery data, from Unmanned Aerial Vehicles (UAVs), for inspecting large solar installations. Some other techniques like DeepLabV3 , Feature Pyramid Networks (FPN), and U-Net will be detailed as such tools enable effective segmentation and anomaly detection in aerial panel images. Finally, we discuss implications of these technologies on labor costs, fault detection precision, and sustainability of PV installations.
文摘Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.
文摘The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advantages for users,it remains vulnerable to many types of attacks that attract cyber criminals.Distributed Denial of Service(DDoS)is the most common type of attack on cloud computing.Consequently,Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks.Since DDoS attacks have become increasingly widespread,it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish various types of DDoS attacks.Further,the monitoring pattern of traffic changes and accurate detection of DDoS attacks are most important and urgent.In this research work,DDoS attack detection methods based on deep belief network feature extraction and Hybrid Long Short-Term Memory(LSTM)model have been proposed with NSL-KDD dataset.In Hybrid LSTM method,the Particle Swarm Optimization(PSO)technique,which is combined to optimize the weights of the LSTM neural network,reduces the prediction error.This deep belief network method is used to extract the features of IP packets,and it identifies DDoS attacks based on PSO-LSTM model.Moreover,it accurately predicts normal network traffic and detects anomalies resulting from DDoS attacks.The proposed PSO-LSTM architecture outperforms the classification techniques including standard Support Vector Machine(SVM)and LSTM in terms of attack detection performance along with the results of the measurement of accuracy,recall,f-measure,precision.
文摘Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social media has become an integral part of adolescents’lives and how serious the impacts of cyberbullying and online harassment can be,particularly among teenagers.This paper contains a systematic literature review of modern strategies,machine learning methods,and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet.We undertake an in-depth review of 13 papers from four scientific databases.The article provides an overview of scientific literature to analyze the problem of cyberbullying detection from the point of view of machine learning and natural language processing.In this review,we consider a cyberbullying detection framework on social media platforms,which includes data collection,data processing,feature selection,feature extraction,and the application ofmachine learning to classify whether texts contain cyberbullying or not.This article seeks to guide future research on this topic toward a more consistent perspective with the phenomenon’s description and depiction,allowing future solutions to be more practical and effective.
基金extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research(IFKSURC-1-7109).
文摘Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastructure.An effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network activity.Finding unusual internet traffic has become a severe security risk for intelligent devices.These systems are negatively impacted by several attacks,which are slowing computation.In addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried data.The NSL-KDD dataset shall be utilized for both training and testing.In this paper,we present a custom ANN model architecture using the Keras open-source software package.The specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network data.The performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and ANN.It is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all evaluations.This result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy in identifying and categorizing instances of network intrusion.
基金Supported by The Fourth Batch of High-end Talent Project in Hebei ProvinceTangshan Science and Technology Entrepreneurship and Innovation Leading Talent Project(21130243A)+1 种基金Special Project of the Central Government in Guidance of Local Science and Technology Development(226Z5504G)Tangshan Talent Project(A202202005).
文摘Pesticide residue detection is an important work to ensure the quality safety of agricultural products.In the process of agricultural production,in order to prevent and control agricultural diseases and pests,a certain amount of pesticides need to be used.However,if pesticides are used excessively,there will be certain pesticide residues in crops and related products.Therefore,it is necessary to do a good job in pesticide residue detection.The gas chromatography-mass spectrometry(GC-MS)and liquid chromatography-mass spectrometry(LC-MS)detection methods have good results and can effectively detect pesticide residues in related products.This paper reviewed and analyzed the application of GC-MS and LC-MS in pesticide residue detection,and proposed optimization measures based on practical experience,hoping to provide reference for relevant scholars.
基金supported by the Deanship of Scientific Research at the University of Tabuk through Research No.S-1443-0111.
文摘Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score.
文摘Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset.
文摘This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.
文摘In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten human health reported by the World Health Organization,food allergy ranks fourth,and food allergy has become a global security problem.As of now,no definitive treatment for food allergies exists,making the avoidance of allergen-containing foods the most effective prevention method.Consequently,labeling foods with allergen information serves as a crucial warning for allergic populations.Moreover,to enhance comprehension of food allergies,this article provides a brief overview of their definition and sensitization mechanisms.The main focus lies in highlighting the structure of primary allergens found in eight commonly allergenic foods and the resulting clinical symptoms they cause.Additionally,a summary of commonly employed allergen detection techniques is presented,with an analysis of their principles,advantages,and limitations.Looking ahead,the integration of diverse technological approaches to establish an efficient,accurate,and affordable allergen detection method remains a significant trend.This article has certain reference value for understanding the direction of food allergies.