期刊文献+
共找到359篇文章
< 1 2 18 >
每页显示 20 50 100
Carbon Catabolite Repressor UvCreA is Required for Development and Pathogenicity in Ustilaginoidea virens
1
作者 XIE Shuwei SHI Huanbin +4 位作者 WEN Hui LIU Zhiquan QIU Jiehua JIANG Nan KOU Yanjun 《Rice science》 SCIE CSCD 2024年第2期203-214,I0029-I0031,共15页
The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilizatio... The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilization of carbon nutrients and enzyme regulation in the presence of complex nutritionalconditions. Although significant progress has been made in understanding carbon catabolite repression infungi such as Aspergillus nidulans and Magnaporthe oryzae, its role in U. virens remains unclear. Toaddress this knowledge gap, we identified UvCreA, a pivotal component of carbon catabolite repression,in U. virens. Our investigation revealed that UvCreA localized to the nucleus. Deletion of UvCreA resultedin decreased growth and pathogenicity in U. virens. Through RNA-seq analysis, it was found that theknockout of UvCreA led to the up-regulation of 514 genes and down-regulation of 640 genes. Moreover,UvCreA was found to be involved in the transcriptional regulation of pathogenic genes and genesassociated with carbon metabolism in U. virens. In summary, our findings indicated that UvCreA isimportant in fungal development, virulence, and the utilization of carbon sources through transcriptionalregulation, thus making it a critical element of carbon catabolite repression. 展开更多
关键词 Ustilaginoidea virens VIRULENCE carbon catabolite repression Oryza sativa rice false smut
下载PDF
Deep Learning-Based ECG Classification for Arterial Fibrillation Detection
2
作者 Muhammad Sohail Irshad Tehreem Masood +3 位作者 Arfan Jaffar Muhammad Rashid Sheeraz Akram Abeer Aljohani 《Computers, Materials & Continua》 SCIE EI 2024年第6期4805-4824,共20页
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnos... The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes. 展开更多
关键词 Convolution neural network atrial fibrillation area under curve ECG false positive rate deep learning CLASSIFICatION
下载PDF
Cross-Modal Consistency with Aesthetic Similarity for Multimodal False Information Detection
3
作者 Weijian Fan Ziwei Shi 《Computers, Materials & Continua》 SCIE EI 2024年第5期2723-2741,共19页
With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to mult... With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods. 展开更多
关键词 Social media false information detection image aesthetic assessment cross-modal consistency
下载PDF
Zeno and the Wrong Understanding of Motion—A Philosophical-Mathematical Inquiry into the Concept of Finitude as a Peculiarity of Infinity
4
作者 Andreas Herberg-Rothe 《Journal of Applied Mathematics and Physics》 2024年第3期912-929,共18页
In contrast to the solutions of applied mathematics to Zeno’s paradoxes, I focus on the concept of motion and show that, by distinguishing two different forms of motion, Zeno’s apparent paradoxes are not paradoxical... In contrast to the solutions of applied mathematics to Zeno’s paradoxes, I focus on the concept of motion and show that, by distinguishing two different forms of motion, Zeno’s apparent paradoxes are not paradoxical at all. Zeno’s paradoxes indirectly prove that distances are not composed of extensionless points and, in general, that a higher dimension cannot be completely composed of lower ones. Conversely, lower dimensions can be understood as special cases of higher dimensions. To illustrate this approach, I consider Cantor’s only apparent proof that the real numbers are uncountable. However, his widely accepted indirect proof has the disadvantage that it depends on whether there is another way to make the real numbers countable. Cantor rightly assumes that there can be no smallest number between 0 and 1, and therefore no beginning of counting. For this reason he arbitrarily lists the real numbers in order to show with his diagonal method that this list can never be complete. The situation is different if we start with the largest number between 0 and 1 (0.999…) and use the method of an inverted triangle, which can be understood as a special fractal form. Here we can construct a vertical and a horizontal stratification with which it is actually possible to construct all real numbers between 0 and 1 without exception. Each column is infinite, and each number in that column is the starting point of a new triangle, while each row is finite. Even in a simple sine curve, we experience finiteness with respect to the y-axis and infinity with respect to the x-axis. The first parts of this article show that Zeno’s assumptions contradict the concept of motion as such, so it is not surprising that this misconstruction leads to contradictions. In the last part, I discuss Cantor’s diagonal method and explain the method of an inverted triangle that is internally structured like a fractal by repeating this inverted triangle at each column. The consequence is that we encounter two very different methods of counting. Vertically it is continuous, horizontally it is discrete. While Frege, Tarski, Cantor, Gödel and the Vienna Circle tried to derive the higher dimension from the lower, a procedure that always leads to new contradictions and antinomies (Tarski, Russell), I take the opposite approach here, in which I derive the lower dimension from the higher. This perspective seems to fail because Tarski, Russell, Wittgenstein, and especially the Vienna Circle have shown that the completeness of the absolute itself is logically contradictory. For this reason, we agree with Hegel in assuming that we can never fully comprehend the Absolute, but only its particular manifestations—otherwise we would be putting ourselves in the place of the Absolute, or even God. Nevertheless, we can understand the Absolute in its particular expressions, as I will show with the modest example of the triangle proof of the combined horizontal and vertical countability of the real numbers, which I developed in rejection of Cantor’s diagonal proof. . 展开更多
关键词 Zeno False Assumptions about Motion Finitude INFINITY Cantor’s Diagonal Method Inverted Triangle as a Different Method Vertical and Horizontal Dimensions Quantum Theory Relativity of Space and Time Depending on Velocity
下载PDF
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:4
5
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(FDI)attacks remote state estimation stealthy attacks
下载PDF
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:1
6
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULatORS remote kinematic control
下载PDF
Optimal Hybrid Deep Learning Enabled Attack Detection and Classificationin IoT Environment
7
作者 Fahad F.Alruwaili 《Computers, Materials & Continua》 SCIE EI 2023年第4期99-115,共17页
The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand ... The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand networks connected in the IoT environment. In recent years, False DataInjection Attacks (FDIAs) have gained considerable interest in the IoT environment.Cybercriminals compromise the devices connected to the networkand inject the data. Such attacks on the IoT environment can result in a considerableloss and interrupt normal activities among the IoT network devices.The FDI attacks have been effectively overcome so far by conventional threatdetection techniques. The current research article develops a Hybrid DeepLearning to Combat Sophisticated False Data Injection Attacks detection(HDL-FDIAD) for the IoT environment. The presented HDL-FDIAD modelmajorly recognizes the presence of FDI attacks in the IoT environment.The HDL-FDIAD model exploits the Equilibrium Optimizer-based FeatureSelection (EO-FS) technique to select the optimal subset of the features.Moreover, the Long Short Term Memory with Recurrent Neural Network(LSTM-RNN) model is also utilized for the purpose of classification. At last,the Bayesian Optimization (BO) algorithm is employed as a hyperparameteroptimizer in this study. To validate the enhanced performance of the HDLFDIADmodel, a wide range of simulations was conducted, and the resultswere investigated in detail. A comparative study was conducted between theproposed model and the existing models. The outcomes revealed that theproposed HDL-FDIAD model is superior to other models. 展开更多
关键词 False data injection attacks hyperparameter optimizer deep learning feature selection IOT SECURITY
下载PDF
Water Extract of Rice False Smut Balls Activates Nrf2/HO-1 and Apoptosis Pathways,Causing Liver Injury
8
作者 ZHANG Guomei LI Han +4 位作者 LIU Shanshan ZHOU Xuming LU Mingyang TANG Liang SUN Lihua 《Rice science》 SCIE CSCD 2023年第5期473-485,I0025-I0028,共17页
Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice f... Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action. 展开更多
关键词 water extract rice false smut ball ustiloxin liver injury Nrf2/HO-1 pathway apoptosis pathway
下载PDF
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network
9
作者 Tarcizio Ferrao Franklin Manene Adeyemi Abel Ajibesin 《Computers, Materials & Continua》 SCIE EI 2023年第6期4985-5007,共23页
Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,f... Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset. 展开更多
关键词 Dataset selection false alarm intrusion detection systems IoT security machine learning SDN-IoT security software-defined networks
下载PDF
Association RuleMining Frequent-Pattern-Based Intrusion Detection in Network
10
作者 S.Sivanantham V.Mohanraj +1 位作者 Y.Suresh J.Senthilkumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1617-1631,共15页
In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of da... In the network security system,intrusion detection plays a significant role.The network security system detects the malicious actions in the network and also conforms the availability,integrity and confidentiality of data informa-tion resources.Intrusion identification system can easily detect the false positive alerts.If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks.Many research works have been done.The issues in the existing algo-rithms are more memory space and need more time to execute the transactions of records.This paper proposes a novel framework of network security Intrusion Detection System(IDS)using Modified Frequent Pattern(MFP-Tree)via K-means algorithm.The accuracy rate of Modified Frequent Pattern Tree(MFPT)-K means method infinding the various attacks are Normal 94.89%,for DoS based attack 98.34%,for User to Root(U2R)attacks got 96.73%,Remote to Local(R2L)got 95.89%and Probe attack got 92.67%and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 展开更多
关键词 IDS K-MEANS frequent pattern tree false alert MINING L1-norm
下载PDF
SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management
11
作者 Ana María Peco Chacón Isaac Segovia Ramírez Fausto Pedro García Márquez 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2595-2608,共14页
Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working co... Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification. 展开更多
关键词 Machine learning classification support vector machine false alarm wind turbine cross-validation
下载PDF
Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition
12
作者 T.Satyanarayana Murthy P.Udayakumar +2 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期255-271,共17页
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation... The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%. 展开更多
关键词 False data injection attack security internet of things deep learning coot optimization algorithm
下载PDF
A PCR-Based Method for Detecting Pathogen of Rice False Smut
13
作者 Liu Lian-fu HaseebYounis +6 位作者 Peng Li-li Yang Shuo Yang Song-run Shu Yu-wei Wang Meng Mukadasi Rexiti Zhang Jun-hua 《Journal of Northeast Agricultural University(English Edition)》 CAS 2023年第3期30-35,共6页
Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to dete... Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established. 展开更多
关键词 rice false smut PCR reaction system molecular detection
下载PDF
Intrusion Detection Using Federated Learning for Computing
14
作者 R.S.Aashmi T.Jaya 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1295-1308,共14页
The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle computing.This novel technique has the aptitude to tackle high performance computation systems a... The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle computing.This novel technique has the aptitude to tackle high performance computation systems and it manages the usage of all computing platforms at a time.Federated learning is a collaborative machine learning approach without centralized training data.The proposed system effectively detects the intrusion attack without human intervention and subsequently detects anomalous deviations in device communication behavior,potentially caused by malicious adversaries and it can emerge with new and unknown attacks.The main objective is to learn overall behavior of an intruder while performing attacks to the assumed target service.Moreover,the updated system model is send to the centralized server in jungle computing,to detect their pattern.Federated learning greatly helps the machine to study the type of attack from each device and this technique paves a way to complete dominion over all malicious behaviors.In our proposed work,we have implemented an intrusion detection system that has high accuracy,low False Positive Rate(FPR)scalable,and versatile for the jungle computing environment.The execution time taken to complete a round is less than two seconds,with an accuracy rate of 96%. 展开更多
关键词 Jungle computing high performance computation federated learning false positive rate intrusion detection system(IDS)
下载PDF
Iatrogenic bladder neck rupture due to traumatic urethral catheterization: A case report
15
作者 Ozgur Ekici Ercüment Keskin +1 位作者 Fatih Kocoglu Ali Seydi Bozkurt 《World Journal of Clinical Cases》 SCIE 2023年第30期7413-7417,共5页
BACKGROUND In this article,we present a case of iatrogenic bladder neck rupture due to catheter insertion in a 94-year-old comorbid male patient.CASE SUMMARY The patient,who had a urethral catheter inserted in the pal... BACKGROUND In this article,we present a case of iatrogenic bladder neck rupture due to catheter insertion in a 94-year-old comorbid male patient.CASE SUMMARY The patient,who had a urethral catheter inserted in the palliative service 3 d ago,was consulted because the catheter did not work.Because the fluid given to the bladder could not be recovered,computed tomography was performed,which revealed that the catheter had passed the bladder neck first into the retrovesical area then into the intraabdominal area.The appearance of the anterior urethra and verumontanum was normal at cystoscopy.However,extremely severe stenosis of the bladder neck,and perforated posterior wall of the urethral segment between the prostatic urethra and the bladder neck were observed.Internal urethrotomy was applied to the bladder neck with a urethrotome.An urethral catheter was sent over the guide wire into the bladder.The patient was followed in the palliative care service and the catheter was removed 7 d later.No extravasation was observed in the control urethrography.CONCLUSION Although catheter insertion is a simple and frequently performed procedure in hospitalized patients,it is necessary to avoid unnecessary extra-indication catheter insertion. 展开更多
关键词 Bladder neck rupture Uretrhral catheterization IatROGENIC EXTRAVASatION False route Case report
下载PDF
Effect of False Windows on Light Exposure and Sleep Quality in Hospitalized Patients
16
作者 Hiroki Onodera Mitsuru Ida Masahiko Kawaguchi 《Health》 CAS 2023年第4期281-288,共8页
Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients ... Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window. 展开更多
关键词 ACTIGRAPH False Window Sleep Efficiency
下载PDF
Lung Cancer Prediction from Elvira Biomedical Dataset Using Ensemble Classifier with Principal Component Analysis
17
作者 Teresa Kwamboka Abuya 《Journal of Data Analysis and Information Processing》 2023年第2期175-199,共25页
Machine learning algorithms (MLs) can potentially improve disease diagnostics, leading to early detection and treatment of these diseases. As a malignant tumor whose primary focus is located in the bronchial mucosal e... Machine learning algorithms (MLs) can potentially improve disease diagnostics, leading to early detection and treatment of these diseases. As a malignant tumor whose primary focus is located in the bronchial mucosal epithelium, lung cancer has the highest mortality and morbidity among cancer types, threatening health and life of patients suffering from the disease. Machine learning algorithms such as Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Naïve Bayes (NB) have been used for lung cancer prediction. However they still face challenges such as high dimensionality of the feature space, over-fitting, high computational complexity, noise and missing data, low accuracies, low precision and high error rates. Ensemble learning, which combines classifiers, may be helpful to boost prediction on new data. However, current ensemble ML techniques rarely consider comprehensive evaluation metrics to evaluate the performance of individual classifiers. The main purpose of this study was to develop an ensemble classifier that improves lung cancer prediction. An ensemble machine learning algorithm is developed based on RF, SVM, NB, and KNN. Feature selection is done based on Principal Component Analysis (PCA) and Analysis of Variance (ANOVA). This algorithm is then executed on lung cancer data and evaluated using execution time, true positives (TP), true negatives (TN), false positives (FP), false negatives (FN), false positive rate (FPR), recall (R), precision (P) and F-measure (FM). Experimental results show that the proposed ensemble classifier has the best classification of 0.9825% with the lowest error rate of 0.0193. This is followed by SVM in which the probability of having the best classification is 0.9652% at an error rate of 0.0206. On the other hand, NB had the worst performance of 0.8475% classification at 0.0738 error rate. 展开更多
关键词 ACCURACY False Positive Rate Naïve Bayes Random Forest Lung Cancer Prediction Principal Component Analysis Support Vector Machine K-Nearest Neighbor
下载PDF
Exciting News from Indentations onto Silicon, Copper, and Tungsten
18
作者 Gerd Kaupp 《Journal of Applied Mathematics and Physics》 2023年第12期4042-4078,共37页
Indentations onto crystalline silicon and copper with various indenter geometries, loading forces at room temperature belong to the widest interests in the field, because of the physical detection of structural phase ... Indentations onto crystalline silicon and copper with various indenter geometries, loading forces at room temperature belong to the widest interests in the field, because of the physical detection of structural phase transitions. By using the mathematically deduced F<sub>N</sub>h<sup>3/2 </sup>relation for conical and pyramidal indentations we have a toolbox for deciding between faked and experimental loading curves. Four printed silicon indentation loading curves (labelled with 292 K, 260 K, 240 K and 210 K) proved to be faked and not experimental. This is problematic for the AI (artificial intelligence) that will probably not be able to sort faked data out by itself but must be told to do so. High risks arise, when published faked indentation reports remain unidentified and unreported for the mechanics engineers by reading, or via AI. For example, when AI recommends a faked quality such as “no phase changes” of a technical material that is therefore used, it might break down due to an actually present low force, low transition energy phase-change. This paper thus installed a tool box for the distinction of experimental and faked loading curves of indentations. We found experimental and faked loading curves of the same research group with overall 14 authoring co-workers in three publications where valid and faked ones were next to each other and I can thus only report on the experimental ones. The comparison of Si and Cu with W at 20-fold higher physical hardness shows its enormous influence to the energies of phase transition and of their transition energies. Thus, the commonly preferred ISO14577-ASTM hardness values HISO (these violate the energy law and are simulated!) leads to almost blind characterization and use of mechanically stressed technical materials (e.g. airplanes, windmills, bridges, etc). The reasons are carefully detected and reported to disprove that the coincidence or very close coincidence of all of the published loading curves from 150 K to 298 K are constructed but not experimental. A tool-box for distinction of experimental from faked indentation loading curves (simulations must be indicated) is established in view of protecting the AI from faked data, which it might not be able by itself to sort them out, so that technical materials with wrongly attributed mechanical properties might lead to catastrophic accidents such as all of us know of. There is also the risk that false theories might lead to discourage the design of important research projects or for not getting them granted. This might for example hamper or ill-fame new low temperature indentation projects. The various hints for identifying faked claims are thus presented in great detail. The low-temperature instrumental indentations onto silicon have been faked in two consecutive publications and their reporting in the third one, so that these are not available for the calculation of activation energies. Conversely, the same research group published an indentation loading curve of copper as taken at 150 K that could be tested for its validity with the therefore created tools of validity tests. The physical algebraic calculations provided the epochal detection of two highly exothermic phase transitions of copper that created two polymorphs with negative standard energy content. This is world-wide the second case and the first one far above the 77 K of liquid nitrogen. Its existence poses completely new thoughts for physics chemistry and perhaps techniques but all of them are open and unprepared for our comprehension. The first chemical reactions might be in-situ photolysis and the phase transitions can be calculated from experimental curves. But several further reported low temperature indentation loading curves of silicon were tested for their experimental reality. And the results are compared to new analyses with genuine room temperature results. A lot is to be learned from the differences at room and low temperature. 展开更多
关键词 Phase-Transition-Onset and -Energy Indentation of Silicone COPPER Copper Nanoparticles Tungsten with Polymorphs Low-Temperature Indentations Detection of Faked Loading Curves Protection of AI from False Advices Risk of Catastrophic Crashes Physical Hardness Exothermic Copper-Transitions Algebraic Calculations Negative-Standard-Energy Polymorphs
下载PDF
Secure Tracking Control via Fixed-Time Convergent Reinforcement Learning for a UAV CPS
19
作者 Zhenyu Gong Feisheng Yang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1699-1701,共3页
Dear Editor,This letter is concerned with the secure tracking control problem in the unmanned aerial vehicle(UAV) system by fixed-time convergent reinforcement learning(RL). By virtue of the zero-sum game,the false da... Dear Editor,This letter is concerned with the secure tracking control problem in the unmanned aerial vehicle(UAV) system by fixed-time convergent reinforcement learning(RL). By virtue of the zero-sum game,the false data injection(FDI) attacker and secure controller are viewed as game players. 展开更多
关键词 SECURE Fixed false
下载PDF
Interaction Between Ustilaginoidea virens and Rice and Its Sustainable Control
20
作者 ZHANG Fengmin CAO Zhenzhen +3 位作者 ZHENG Xin HE Yuntao CHEN Mingxue LIN Xiaoyan 《Rice science》 SCIE CSCD 2024年第3期269-284,共16页
Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature ... Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature review of research since the discovery of rice false smut.We provide a comprehensive and,at times,critical overview of the main results and findings from related research,and propose future research directions.Firstly,we delve into the interaction between U.virens and rice,including the regulation of transcription factors,the process of U.virens infecting rice panicles,and the plant immune response caused by rice infection.Following that,we discuss the identification and characterization of mycotoxins produced by the pathogenic fungus,as well as strategies for disease management.We emphasize the importance of comprehensive agricultural prevention and control methods for the sustainable management of U.virens.This knowledge will update our understanding of the interaction between U.virens and rice plants,offering a valuable perspective for those interested in U.virens. 展开更多
关键词 rice false smut flower-specific infection MYCOTOXIN food safety plant disease
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部