BACKGROUND Diagnosing bacterial infections(BI)in patients with cirrhosis can be challenging because of unclear symptoms,low diagnostic accuracy,and lengthy culture testing times.Various biomarkers have been studied,in...BACKGROUND Diagnosing bacterial infections(BI)in patients with cirrhosis can be challenging because of unclear symptoms,low diagnostic accuracy,and lengthy culture testing times.Various biomarkers have been studied,including serum procal-citonin(PCT)and presepsin.However,the diagnostic performance of these markers remains unclear,requiring further informative studies to ascertain their diagnostic value.AIM To evaluate the pooled diagnostic performance of PCT and presepsin in detecting BI among patients with cirrhosis.INTRODUCTION Bacterial infections(BI)commonly occur in patients with cirrhosis,resulting in poor outcomes,including the development of cirrhotic complications,septic shock,acute-on-chronic liver failure(ACLF),multiple organ failures,and mortality[1,2].BI is observed in 20%-30%of hospitalized patients,with and without ACLF[3].Patients with cirrhosis are susceptible to BI because of internal and external factors.The major internal factors are changes in gut microbial composition and function,bacterial translocation,and cirrhosis-associated immune dysfunction syndrome[4,5].External factors include alcohol use,proton-pump inhibitor use,frailty,readmission,and invasive procedures.Spontaneous bacterial peritonitis(SBP),urinary tract infection,pneumonia,and primary bacteremia are the common BIs in hospit-alized patients with cirrhosis[6].Early diagnosis and adequate empirical antibiotic therapy are two critical factors that improve the prognosis of BI in patients with cirrhosis.However,early detection of BI in cirrhosis is challenging due to subtle clinical signs and symptoms,low sensitivity and specificity of systemic inflammatory response syndrome criteria,and low sensitivity of bacterial cultures.Thus,effective biomarkers need to be identified for the early detection of BI.Several biomarkers have been evaluated,but their efficacy in detecting BI is unclear.Procalcitonin(PCT)is a precursor of the hormone calcitonin,which is secreted by parafollicular cells of the thyroid gland[7].In the presence of BI,PCT gene expression increases in extrathyroidal tissues,causing a subsequent increase in serum PCT level[8].Changes in serum PCT are detectable as early as 4 hours after infection onset and peaks between 8 and 24 hours,making it a valuable diagnostic biomarker for BI.Several studies have demonstrated the favorable diagnostic accuracy of PCT in the diagnosis of BI in individuals with cirrhosis[9-13]and without cirrhosis[14-16].Since 2014,two meta-analyses have been published on the diagnostic value of PCT for SBP and BI in patients with cirrhosis[17,18].Other related studies have been conducted since then[10-12,19-33].Serum presepsin has recently emerged as a promising biomarker for diagnosing BI.This biomarker is the N-terminal fraction protein of the soluble CD14 g-negative bacterial lipopolysaccharide–lipopolysaccharide binding protein(sCD14-LPS-LBP)complex,which is cleaved by inflammatory serum protease in response to BI[34].Presepsin levels increase within 2 hours and peaks in 3 hours[35].This is useful for detecting BI since presepsin levels increase earlier than serum Our systematic review and meta-analysis was performed with adherence to PRISMA guidelines[37].展开更多
A system of on-line contamination detecting in hydraulic oil based on silting principle is accomplished, where, metal filter membrane as detector, solenoid as active force to propel piston to blotter and gain differen...A system of on-line contamination detecting in hydraulic oil based on silting principle is accomplished, where, metal filter membrane as detector, solenoid as active force to propel piston to blotter and gain differential pressure, step motor drives the membrane to filtrate and counter-flush, LabVIEW as detecting software platform, oil's contamination detecting indirectly by gauging differential pressure. Based on theory analysis, accomplished is relation between contamination level and differential pressure, realizing polynomial curve fitting, and calibration experiment. Field experiment is simulated in the condition of experimental laboratory, has credible precision and real-time performance, which can popularize to the field of production.展开更多
Transformers are required to demonstrate the ability to withstand short circuit currents.Over currents caused by short circuit can give rise to windings deformation.In this paper,a novel method is proposed to monitor ...Transformers are required to demonstrate the ability to withstand short circuit currents.Over currents caused by short circuit can give rise to windings deformation.In this paper,a novel method is proposed to monitor the state of transformer windings,which is achieved through on-line detecting the leakage inductance of the windings.Specifically,the mathematical model is established for online identifying the leakage inductance of the windings by applying least square algorithm(LSA) to the equivalent circuit equations.The effect of measurement and model inaccuracy on the identification error is analyzed,and the corrected model is also given to decrease these adverse effect on the results.Finally,dynamic test is carried out to verify our method.The test results clearly show that our method is very accurate even under the fluctuation of load or power factor.Therefore,our method can be effectively used to on-line detect the windings deformation.展开更多
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cam...Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios.展开更多
In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector machines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMP...In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector machines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMPLS, integrates the SVM with the MPLS model. Process data from normal historical batches are used to develop the MPLS model, and a series of single-input-single-output SVM networks are adopted to approximate nonlinear inner relationship between input and output variables. In addition, the application of a time-lagged window technique not only makes the complementarities of unmeasured data of the monitored batch unnecessary, but also significantly reduces the computation and storage requirements in comparison with the traditional MPLS. The proposed approach is validated by a simulation study of on-line fault detection for a fed-batch penicillin production.展开更多
This paper studies a strongly convergent inertial forward-backward-forward algorithm for the variational inequality problem in Hilbert spaces.In our convergence analysis,we do not assume the on-line rule of the inerti...This paper studies a strongly convergent inertial forward-backward-forward algorithm for the variational inequality problem in Hilbert spaces.In our convergence analysis,we do not assume the on-line rule of the inertial parameters and the iterates,which have been assumed by several authors whenever a strongly convergent algorithm with an inertial extrapolation step is proposed for a variational inequality problem.Consequently,our proof arguments are different from what is obtainable in the relevant literature.Finally,we give numerical tests to confirm the theoretical analysis and show that our proposed algorithm is superior to related ones in the literature.展开更多
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t...The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats.展开更多
Seven polycyclic aromatic hydrocarbons (PAHs) in atmospheric particulates were determinated by high performance liquid chromatography (HPLC) with fluorescence detector using direction injection and an on-line enri...Seven polycyclic aromatic hydrocarbons (PAHs) in atmospheric particulates were determinated by high performance liquid chromatography (HPLC) with fluorescence detector using direction injection and an on-line enrichment trap column. The method simplified the sample pretreatment, saved time and increased the efficiency. With the on-line trap column, PAHs were separated availably even underground injecting 1.0 ml sample with relatively high column efficiency. The recoveries of the seven PAHs were from 85% to 120% for spiked atmospheric particulate sample. The limit of detection was 15.3-39.6 ng/L (S/N=3.3). There were good linear correlations between the peak areas and concentrations of the seven kinds of PAHs in the range of 1-50 ng/ml with the correlation coefficients over 0.9970. Furthermore, it also indicated that the method is available to determine PAHs in atmospheric particulates well.展开更多
In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector ma- chines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based D...In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector ma- chines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMPLS, integrates the SVM with the MPLS model. Process data from normal historical batches are used to de- velop the MPLS model, and a series of single-input-single-output SVM networks are adopted to approximate nonlinear inner relationship between input and output variables. In addition, the application of a time-lagged win- dow technique not only makes the complementarities of unmeasured data of the monitored batch unnecessary, but also significantly reduces the computation and storage requirements in comparison with the traditional MPLS. The proposed approach is validated by a simulation study of on-line fault detection for a fed-batch penicillin production.展开更多
A quite new type of chelating resin Carboxymethylated Polyethylenimine-Polymethylenepolyphenylene Isocyanate(CPPI)is used for the preconcentration of Zn from high salt water such as seawater. The preconcentration is c...A quite new type of chelating resin Carboxymethylated Polyethylenimine-Polymethylenepolyphenylene Isocyanate(CPPI)is used for the preconcentration of Zn from high salt water such as seawater. The preconcentration is controlled through the technique of Flow Injection Analysis(FIA).The concentrated sample solution is then directly transferred to an Inductively Coupled Plasma-Atomic Fluorescence Spectrometer(ICP-AFS)for determination.The detection limit of Zn by the technique is about 0.06 ppb.展开更多
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.展开更多
The detection of outliers and change points from time series has become research focus in the area of time series data mining since it can be used for fraud detection, rare event discovery, event/trend change detectio...The detection of outliers and change points from time series has become research focus in the area of time series data mining since it can be used for fraud detection, rare event discovery, event/trend change detection, etc. In most previous works, outlier detection and change point detection have not been related explicitly and the change point detections did not consider the influence of outliers, in this work, a unified detection framework was presented to deal with both of them. The framework is based on ALARCON-AQUINO and BARRIA's change points detection method and adopts two-stage detection to divide the outliers and change points. The advantages of it lie in that: firstly, unified structure for change detection and outlier detection further reduces the computational complexity and make the detective procedure simple; Secondly, the detection strategy of outlier detection before change point detection avoids the influence of outliers to the change point detection, and thus improves the accuracy of the change point detection. The simulation experiments of the proposed method for both model data and actual application data have been made and gotten 100% detection accuracy. The comparisons between traditional detection method and the proposed method further demonstrate that the unified detection structure is more accurate when the time series are contaminated by outliers.展开更多
In the era of the Internet,widely used web applications have become the target of hacker attacks because they contain a large amount of personal information.Among these vulnerabilities,stealing private data through cr...In the era of the Internet,widely used web applications have become the target of hacker attacks because they contain a large amount of personal information.Among these vulnerabilities,stealing private data through crosssite scripting(XSS)attacks is one of the most commonly used attacks by hackers.Currently,deep learning-based XSS attack detection methods have good application prospects;however,they suffer from problems such as being prone to overfitting,a high false alarm rate,and low accuracy.To address these issues,we propose a multi-stage feature extraction and fusion model for XSS detection based on Random Forest feature enhancement.The model utilizes RandomForests to capture the intrinsic structure and patterns of the data by extracting leaf node indices as features,which are subsequentlymergedwith the original data features to forma feature setwith richer information content.Further feature extraction is conducted through three parallel channels.Channel I utilizes parallel onedimensional convolutional layers(1Dconvolutional layers)with different convolutional kernel sizes to extract local features at different scales and performmulti-scale feature fusion;Channel II employsmaximum one-dimensional pooling layers(max 1D pooling layers)of various sizes to extract key features from the data;and Channel III extracts global information bi-directionally using a Bi-Directional Long-Short TermMemory Network(Bi-LSTM)and incorporates a multi-head attention mechanism to enhance global features.Finally,effective classification and prediction of XSS are performed by fusing the features of the three channels.To test the effectiveness of the model,we conduct experiments on six datasets.We achieve an accuracy of 100%on the UNSW-NB15 dataset and 99.99%on the CICIDS2017 dataset,which is higher than that of the existing models.展开更多
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)h...The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT environments.To rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT networks.The DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT attacks.The BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal packets.The experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy rates.LSTMs are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack detection.This method,without feature selection,demonstrates advantages in training time and detection accuracy.Consequently,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.展开更多
With the advent of Industry 4.0,marked by a surge in intelligent manufacturing,advanced sensors embedded in smart factories now enable extensive data collection on equipment operation.The analysis of such data is pivo...With the advent of Industry 4.0,marked by a surge in intelligent manufacturing,advanced sensors embedded in smart factories now enable extensive data collection on equipment operation.The analysis of such data is pivotal for ensuring production safety,a critical factor in monitoring the health status of manufacturing apparatus.Conventional defect detection techniques,typically limited to specific scenarios,often require manual feature extraction,leading to inefficiencies and limited versatility in the overall process.Our research presents an intelligent defect detection methodology that leverages deep learning techniques to automate feature extraction and defect localization processes.Our proposed approach encompasses a suite of components:the high-level feature learning block(HLFLB),the multi-scale feature learning block(MSFLB),and a dynamic adaptive fusion block(DAFB),working in tandem to extract meticulously and synergistically aggregate defect-related characteristics across various scales and hierarchical levels.We have conducted validation of the proposed method using datasets derived from gearbox and bearing assessments.The empirical outcomes underscore the superior defect detection capability of our approach.It demonstrates consistently high performance across diverse datasets and possesses the accuracy required to categorize defects,taking into account their specific locations and the extent of damage,proving the method’s effectiveness and reliability in identifying defects in industrial components.展开更多
With the rapid spread of Internet information and the spread of fake news,the detection of fake news becomes more and more important.Traditional detection methods often rely on a single emotional or semantic feature t...With the rapid spread of Internet information and the spread of fake news,the detection of fake news becomes more and more important.Traditional detection methods often rely on a single emotional or semantic feature to identify fake news,but these methods have limitations when dealing with news in specific domains.In order to solve the problem of weak feature correlation between data from different domains,a model for detecting fake news by integrating domain-specific emotional and semantic features is proposed.This method makes full use of the attention mechanism,grasps the correlation between different features,and effectively improves the effect of feature fusion.The algorithm first extracts the semantic features of news text through the Bi-LSTM(Bidirectional Long Short-Term Memory)layer to capture the contextual relevance of news text.Senta-BiLSTM is then used to extract emotional features and predict the probability of positive and negative emotions in the text.It then uses domain features as an enhancement feature and attention mechanism to fully capture more fine-grained emotional features associated with that domain.Finally,the fusion features are taken as the input of the fake news detection classifier,combined with the multi-task representation of information,and the MLP and Softmax functions are used for classification.The experimental results show that on the Chinese dataset Weibo21,the F1 value of this model is 0.958,4.9% higher than that of the sub-optimal model;on the English dataset FakeNewsNet,the F1 value of the detection result of this model is 0.845,1.8% higher than that of the sub-optimal model,which is advanced and feasible.展开更多
Railway turnouts often develop defects such as chipping,cracks,and wear during use.If not detected and addressed promptly,these defects can pose significant risks to train operation safety and passenger security.Despi...Railway turnouts often develop defects such as chipping,cracks,and wear during use.If not detected and addressed promptly,these defects can pose significant risks to train operation safety and passenger security.Despite advances in defect detection technologies,research specifically targeting railway turnout defects remains limited.To address this gap,we collected images from railway inspectors and constructed a dataset of railway turnout defects in complex environments.To enhance detection accuracy,we propose an improved YOLOv8 model named YOLO-VSS-SOUP-Inner-CIoU(YOLO-VSI).The model employs a state-space model(SSM)to enhance the C2f module in the YOLOv8 backbone,proposed the C2f-VSS module to better capture long-range dependencies and contextual features,thus improving feature extraction in complex environments.In the network’s neck layer,we integrate SPDConv and Omni-Kernel Network(OKM)modules to improve the original PAFPN(Path Aggregation Feature Pyramid Network)structure,and proposed the Small Object Upgrade Pyramid(SOUP)structure to enhance small object detection capabilities.Additionally,the Inner-CIoU loss function with a scale factor is applied to further enhance the model’s detection capabilities.Compared to the baseline model,YOLO-VSI demonstrates a 3.5%improvement in average precision on our railway turnout dataset,showcasing increased accuracy and robustness.Experiments on the public NEU-DET dataset reveal a 2.3%increase in average precision over the baseline,indicating that YOLO-VSI has good generalization capabilities.展开更多
Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition,we present a deep learning-based approach for Yi character detec...Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition,we present a deep learning-based approach for Yi character detection and recognition.In the detection stage,an improved Differentiable Binarization Network(DBNet)framework is introduced to detect Yi characters,in which the Omni-dimensional Dynamic Convolution(ODConv)is combined with the ResNet-18 feature extraction module to obtain multi-dimensional complementary features,thereby improving the accuracy of Yi character detection.Then,the feature pyramid network fusion module is used to further extract Yi character image features,improving target recognition at different scales.Further,the previously generated feature map is passed through a head network to produce two maps:a probability map and an adaptive threshold map of the same size as the original map.These maps are then subjected to a differentiable binarization process,resulting in an approximate binarization map.This map helps to identify the boundaries of the text boxes.Finally,the text detection box is generated after the post-processing stage.In the recognition stage,an improved lightweight MobileNetV3 framework is used to recognize the detect character regions,where the original Squeeze-and-Excitation(SE)block is replaced by the efficient Shuffle Attention(SA)that integrates spatial and channel attention,improving the accuracy of Yi characters recognition.Meanwhile,the use of depth separable convolution and reversible residual structure can reduce the number of parameters and computation of the model,so that the model can better understand the contextual information and improve the accuracy of text recognition.The experimental results illustrate that the proposed method achieves good results in detecting and recognizing Yi characters,with detection and recognition accuracy rates of 97.5%and 96.8%,respectively.And also,we have compared the detection and recognition algorithms proposed in this paper with other typical algorithms.In these comparisons,the proposed model achieves better detection and recognition results with a certain reliability.展开更多
On-line chatter detection can avoid unstable cutting through monitoring the machining process.In order to identify chatter in a timely manner,an improved Support Vector Machine(SVM)is developed in this paper,based on ...On-line chatter detection can avoid unstable cutting through monitoring the machining process.In order to identify chatter in a timely manner,an improved Support Vector Machine(SVM)is developed in this paper,based on extracted features.In the SVM model,the penalty factor(e)and the core parameter(g)have important influence on the classification,more than from Kernel Functions(KFs).Hence,first the classification results are conducted using different KFs.Then two methods are presented for exploring the best parameters.The chatter identification results show that the Genetic Algorithm(GA)approach is more suitable for deciding the parameters than the Grid Explore(GE)approach.展开更多
Real-time detection of unhealthy fish remains a significant challenge in intensive recirculating aquaculture.Early recognition of unhealthy fish and the implementation of appropriate treatment measures are crucial for...Real-time detection of unhealthy fish remains a significant challenge in intensive recirculating aquaculture.Early recognition of unhealthy fish and the implementation of appropriate treatment measures are crucial for preventing the spread of diseases and minimizing economic losses.To address this issue,an improved algorithm based on the You Only Look Once v5s(YOLOv5s)lightweight model has been proposed.This enhanced model incorporates a faster lightweight structure and a new Convolutional Block Attention Module(CBAM)to achieve high recognition accuracy.Furthermore,the model introduces theα-SIoU loss function,which combines theα-Intersection over Union(α-IoU)and Shape Intersection over Union(SIoU)loss functions,thereby improving the accuracy of bounding box regression and object recognition.The average precision of the improved model reaches 94.2%for detecting unhealthy fish,representing increases of 11.3%,9.9%,9.7%,2.5%,and 2.1%compared to YOLOv3-tiny,YOLOv4,YOLOv5s,GhostNet-YOLOv5,and YOLOv7,respectively.Additionally,the improved model positively impacts hardware efficiency,reducing requirements for memory size by 59.0%,67.0%,63.0%,44.7%,and 55.6%in comparison to the five models mentioned above.The experimental results underscore the effectiveness of these approaches in addressing the challenges associated with fish health detection,and highlighting their significant practical implications and broad application prospects.展开更多
文摘BACKGROUND Diagnosing bacterial infections(BI)in patients with cirrhosis can be challenging because of unclear symptoms,low diagnostic accuracy,and lengthy culture testing times.Various biomarkers have been studied,including serum procal-citonin(PCT)and presepsin.However,the diagnostic performance of these markers remains unclear,requiring further informative studies to ascertain their diagnostic value.AIM To evaluate the pooled diagnostic performance of PCT and presepsin in detecting BI among patients with cirrhosis.INTRODUCTION Bacterial infections(BI)commonly occur in patients with cirrhosis,resulting in poor outcomes,including the development of cirrhotic complications,septic shock,acute-on-chronic liver failure(ACLF),multiple organ failures,and mortality[1,2].BI is observed in 20%-30%of hospitalized patients,with and without ACLF[3].Patients with cirrhosis are susceptible to BI because of internal and external factors.The major internal factors are changes in gut microbial composition and function,bacterial translocation,and cirrhosis-associated immune dysfunction syndrome[4,5].External factors include alcohol use,proton-pump inhibitor use,frailty,readmission,and invasive procedures.Spontaneous bacterial peritonitis(SBP),urinary tract infection,pneumonia,and primary bacteremia are the common BIs in hospit-alized patients with cirrhosis[6].Early diagnosis and adequate empirical antibiotic therapy are two critical factors that improve the prognosis of BI in patients with cirrhosis.However,early detection of BI in cirrhosis is challenging due to subtle clinical signs and symptoms,low sensitivity and specificity of systemic inflammatory response syndrome criteria,and low sensitivity of bacterial cultures.Thus,effective biomarkers need to be identified for the early detection of BI.Several biomarkers have been evaluated,but their efficacy in detecting BI is unclear.Procalcitonin(PCT)is a precursor of the hormone calcitonin,which is secreted by parafollicular cells of the thyroid gland[7].In the presence of BI,PCT gene expression increases in extrathyroidal tissues,causing a subsequent increase in serum PCT level[8].Changes in serum PCT are detectable as early as 4 hours after infection onset and peaks between 8 and 24 hours,making it a valuable diagnostic biomarker for BI.Several studies have demonstrated the favorable diagnostic accuracy of PCT in the diagnosis of BI in individuals with cirrhosis[9-13]and without cirrhosis[14-16].Since 2014,two meta-analyses have been published on the diagnostic value of PCT for SBP and BI in patients with cirrhosis[17,18].Other related studies have been conducted since then[10-12,19-33].Serum presepsin has recently emerged as a promising biomarker for diagnosing BI.This biomarker is the N-terminal fraction protein of the soluble CD14 g-negative bacterial lipopolysaccharide–lipopolysaccharide binding protein(sCD14-LPS-LBP)complex,which is cleaved by inflammatory serum protease in response to BI[34].Presepsin levels increase within 2 hours and peaks in 3 hours[35].This is useful for detecting BI since presepsin levels increase earlier than serum Our systematic review and meta-analysis was performed with adherence to PRISMA guidelines[37].
文摘A system of on-line contamination detecting in hydraulic oil based on silting principle is accomplished, where, metal filter membrane as detector, solenoid as active force to propel piston to blotter and gain differential pressure, step motor drives the membrane to filtrate and counter-flush, LabVIEW as detecting software platform, oil's contamination detecting indirectly by gauging differential pressure. Based on theory analysis, accomplished is relation between contamination level and differential pressure, realizing polynomial curve fitting, and calibration experiment. Field experiment is simulated in the condition of experimental laboratory, has credible precision and real-time performance, which can popularize to the field of production.
基金This work was supported in part by National Natural Science Foundation of China(No.50577050).
文摘Transformers are required to demonstrate the ability to withstand short circuit currents.Over currents caused by short circuit can give rise to windings deformation.In this paper,a novel method is proposed to monitor the state of transformer windings,which is achieved through on-line detecting the leakage inductance of the windings.Specifically,the mathematical model is established for online identifying the leakage inductance of the windings by applying least square algorithm(LSA) to the equivalent circuit equations.The effect of measurement and model inaccuracy on the identification error is analyzed,and the corrected model is also given to decrease these adverse effect on the results.Finally,dynamic test is carried out to verify our method.The test results clearly show that our method is very accurate even under the fluctuation of load or power factor.Therefore,our method can be effectively used to on-line detect the windings deformation.
基金supported by the Ningxia Key Research and Development Program(Talent Introduction Special Project)Project(2022YCZX0013)North Minzu University 2022 School-Level Scientific Research Platform“Digital Agriculture Enabling Ningxia Rural Revitalization Innovation Team”(2022PT_S10)+1 种基金Yinchuan City University-Enterprise Joint Innovation Project(2022XQZD009)Ningxia Key Research and Development Program(Key Project)Project(2023BDE02001).
文摘Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios.
基金Supported by the National Natural Science Foundation of China (No.60574038) and the Open Project Program of the State Key Laboratory of Bioreactor Engineering/ECUST.
文摘In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector machines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMPLS, integrates the SVM with the MPLS model. Process data from normal historical batches are used to develop the MPLS model, and a series of single-input-single-output SVM networks are adopted to approximate nonlinear inner relationship between input and output variables. In addition, the application of a time-lagged window technique not only makes the complementarities of unmeasured data of the monitored batch unnecessary, but also significantly reduces the computation and storage requirements in comparison with the traditional MPLS. The proposed approach is validated by a simulation study of on-line fault detection for a fed-batch penicillin production.
文摘This paper studies a strongly convergent inertial forward-backward-forward algorithm for the variational inequality problem in Hilbert spaces.In our convergence analysis,we do not assume the on-line rule of the inertial parameters and the iterates,which have been assumed by several authors whenever a strongly convergent algorithm with an inertial extrapolation step is proposed for a variational inequality problem.Consequently,our proof arguments are different from what is obtainable in the relevant literature.Finally,we give numerical tests to confirm the theoretical analysis and show that our proposed algorithm is superior to related ones in the literature.
基金The authors would like to thank Princess Nourah bint Abdulrahman University for funding this project through the researchers supporting project(PNURSP2024R435)and this research was funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats.
基金Project supported by the National Natural Science Foundation of China (No.20437020)Major Research Program of Chinese Academy of Sciences (No.KZCX3-SW-432).
文摘Seven polycyclic aromatic hydrocarbons (PAHs) in atmospheric particulates were determinated by high performance liquid chromatography (HPLC) with fluorescence detector using direction injection and an on-line enrichment trap column. The method simplified the sample pretreatment, saved time and increased the efficiency. With the on-line trap column, PAHs were separated availably even underground injecting 1.0 ml sample with relatively high column efficiency. The recoveries of the seven PAHs were from 85% to 120% for spiked atmospheric particulate sample. The limit of detection was 15.3-39.6 ng/L (S/N=3.3). There were good linear correlations between the peak areas and concentrations of the seven kinds of PAHs in the range of 1-50 ng/ml with the correlation coefficients over 0.9970. Furthermore, it also indicated that the method is available to determine PAHs in atmospheric particulates well.
基金the National Natural Science Foundation of China (No.60574038) the Open Project Program of the State KeyLaboratory of Bioreactor Engineering/ECUST.
文摘In this article, a nonlinear dynamic multiway partial least squares (MPLS) based on support vector ma- chines (SVM) is developed for on-line fault detection in batch processes. The approach, referred to as SVM-based DMPLS, integrates the SVM with the MPLS model. Process data from normal historical batches are used to de- velop the MPLS model, and a series of single-input-single-output SVM networks are adopted to approximate nonlinear inner relationship between input and output variables. In addition, the application of a time-lagged win- dow technique not only makes the complementarities of unmeasured data of the monitored batch unnecessary, but also significantly reduces the computation and storage requirements in comparison with the traditional MPLS. The proposed approach is validated by a simulation study of on-line fault detection for a fed-batch penicillin production.
文摘A quite new type of chelating resin Carboxymethylated Polyethylenimine-Polymethylenepolyphenylene Isocyanate(CPPI)is used for the preconcentration of Zn from high salt water such as seawater. The preconcentration is controlled through the technique of Flow Injection Analysis(FIA).The concentrated sample solution is then directly transferred to an Inductively Coupled Plasma-Atomic Fluorescence Spectrometer(ICP-AFS)for determination.The detection limit of Zn by the technique is about 0.06 ppb.
基金the Deanship of Scientific Research,Najran University,Kingdom of Saudi Arabia,for funding this work under the Research Groups Funding Program Grant Code Number(NU/RG/SERC/12/43).
文摘Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
基金Project(2011AA040603) supported by the National High Technology Ressarch & Development Program of ChinaProject(201202226) supported by the Natural Science Foundation of Liaoning Province, China
文摘The detection of outliers and change points from time series has become research focus in the area of time series data mining since it can be used for fraud detection, rare event discovery, event/trend change detection, etc. In most previous works, outlier detection and change point detection have not been related explicitly and the change point detections did not consider the influence of outliers, in this work, a unified detection framework was presented to deal with both of them. The framework is based on ALARCON-AQUINO and BARRIA's change points detection method and adopts two-stage detection to divide the outliers and change points. The advantages of it lie in that: firstly, unified structure for change detection and outlier detection further reduces the computational complexity and make the detective procedure simple; Secondly, the detection strategy of outlier detection before change point detection avoids the influence of outliers to the change point detection, and thus improves the accuracy of the change point detection. The simulation experiments of the proposed method for both model data and actual application data have been made and gotten 100% detection accuracy. The comparisons between traditional detection method and the proposed method further demonstrate that the unified detection structure is more accurate when the time series are contaminated by outliers.
文摘In the era of the Internet,widely used web applications have become the target of hacker attacks because they contain a large amount of personal information.Among these vulnerabilities,stealing private data through crosssite scripting(XSS)attacks is one of the most commonly used attacks by hackers.Currently,deep learning-based XSS attack detection methods have good application prospects;however,they suffer from problems such as being prone to overfitting,a high false alarm rate,and low accuracy.To address these issues,we propose a multi-stage feature extraction and fusion model for XSS detection based on Random Forest feature enhancement.The model utilizes RandomForests to capture the intrinsic structure and patterns of the data by extracting leaf node indices as features,which are subsequentlymergedwith the original data features to forma feature setwith richer information content.Further feature extraction is conducted through three parallel channels.Channel I utilizes parallel onedimensional convolutional layers(1Dconvolutional layers)with different convolutional kernel sizes to extract local features at different scales and performmulti-scale feature fusion;Channel II employsmaximum one-dimensional pooling layers(max 1D pooling layers)of various sizes to extract key features from the data;and Channel III extracts global information bi-directionally using a Bi-Directional Long-Short TermMemory Network(Bi-LSTM)and incorporates a multi-head attention mechanism to enhance global features.Finally,effective classification and prediction of XSS are performed by fusing the features of the three channels.To test the effectiveness of the model,we conduct experiments on six datasets.We achieve an accuracy of 100%on the UNSW-NB15 dataset and 99.99%on the CICIDS2017 dataset,which is higher than that of the existing models.
文摘The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT security.Deep learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT environments.To rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT networks.The DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT attacks.The BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal packets.The experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy rates.LSTMs are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack detection.This method,without feature selection,demonstrates advantages in training time and detection accuracy.Consequently,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
基金supported by the Natural Science Foundation of Heilongjiang Province(Grant Number:LH2021F002).
文摘With the advent of Industry 4.0,marked by a surge in intelligent manufacturing,advanced sensors embedded in smart factories now enable extensive data collection on equipment operation.The analysis of such data is pivotal for ensuring production safety,a critical factor in monitoring the health status of manufacturing apparatus.Conventional defect detection techniques,typically limited to specific scenarios,often require manual feature extraction,leading to inefficiencies and limited versatility in the overall process.Our research presents an intelligent defect detection methodology that leverages deep learning techniques to automate feature extraction and defect localization processes.Our proposed approach encompasses a suite of components:the high-level feature learning block(HLFLB),the multi-scale feature learning block(MSFLB),and a dynamic adaptive fusion block(DAFB),working in tandem to extract meticulously and synergistically aggregate defect-related characteristics across various scales and hierarchical levels.We have conducted validation of the proposed method using datasets derived from gearbox and bearing assessments.The empirical outcomes underscore the superior defect detection capability of our approach.It demonstrates consistently high performance across diverse datasets and possesses the accuracy required to categorize defects,taking into account their specific locations and the extent of damage,proving the method’s effectiveness and reliability in identifying defects in industrial components.
基金The authors are highly thankful to the National Social Science Foundation of China(20BXW101,18XXW015)Innovation Research Project for the Cultivation of High-Level Scientific and Technological Talents(Top-Notch Talents of theDiscipline)(ZZKY2022303)+3 种基金National Natural Science Foundation of China(Nos.62102451,62202496)Basic Frontier Innovation Project of Engineering University of People’s Armed Police(WJX202316)This work is also supported by National Natural Science Foundation of China(No.62172436)Engineering University of PAP’s Funding for Scientific Research Innovation Team,Engineering University of PAP’s Funding for Basic Scientific Research,and Engineering University of PAP’s Funding for Education and Teaching.Natural Science Foundation of Shaanxi Province(No.2023-JCYB-584).
文摘With the rapid spread of Internet information and the spread of fake news,the detection of fake news becomes more and more important.Traditional detection methods often rely on a single emotional or semantic feature to identify fake news,but these methods have limitations when dealing with news in specific domains.In order to solve the problem of weak feature correlation between data from different domains,a model for detecting fake news by integrating domain-specific emotional and semantic features is proposed.This method makes full use of the attention mechanism,grasps the correlation between different features,and effectively improves the effect of feature fusion.The algorithm first extracts the semantic features of news text through the Bi-LSTM(Bidirectional Long Short-Term Memory)layer to capture the contextual relevance of news text.Senta-BiLSTM is then used to extract emotional features and predict the probability of positive and negative emotions in the text.It then uses domain features as an enhancement feature and attention mechanism to fully capture more fine-grained emotional features associated with that domain.Finally,the fusion features are taken as the input of the fake news detection classifier,combined with the multi-task representation of information,and the MLP and Softmax functions are used for classification.The experimental results show that on the Chinese dataset Weibo21,the F1 value of this model is 0.958,4.9% higher than that of the sub-optimal model;on the English dataset FakeNewsNet,the F1 value of the detection result of this model is 0.845,1.8% higher than that of the sub-optimal model,which is advanced and feasible.
文摘Railway turnouts often develop defects such as chipping,cracks,and wear during use.If not detected and addressed promptly,these defects can pose significant risks to train operation safety and passenger security.Despite advances in defect detection technologies,research specifically targeting railway turnout defects remains limited.To address this gap,we collected images from railway inspectors and constructed a dataset of railway turnout defects in complex environments.To enhance detection accuracy,we propose an improved YOLOv8 model named YOLO-VSS-SOUP-Inner-CIoU(YOLO-VSI).The model employs a state-space model(SSM)to enhance the C2f module in the YOLOv8 backbone,proposed the C2f-VSS module to better capture long-range dependencies and contextual features,thus improving feature extraction in complex environments.In the network’s neck layer,we integrate SPDConv and Omni-Kernel Network(OKM)modules to improve the original PAFPN(Path Aggregation Feature Pyramid Network)structure,and proposed the Small Object Upgrade Pyramid(SOUP)structure to enhance small object detection capabilities.Additionally,the Inner-CIoU loss function with a scale factor is applied to further enhance the model’s detection capabilities.Compared to the baseline model,YOLO-VSI demonstrates a 3.5%improvement in average precision on our railway turnout dataset,showcasing increased accuracy and robustness.Experiments on the public NEU-DET dataset reveal a 2.3%increase in average precision over the baseline,indicating that YOLO-VSI has good generalization capabilities.
基金The work was supported by the National Natural Science Foundation of China(61972062,62306060)the Basic Research Project of Liaoning Province(2023JH2/101300191)+1 种基金the Liaoning Doctoral Research Start-Up Fund Project(2023-BS-078)the Dalian Academy of Social Sciences(2023dlsky028).
文摘Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition,we present a deep learning-based approach for Yi character detection and recognition.In the detection stage,an improved Differentiable Binarization Network(DBNet)framework is introduced to detect Yi characters,in which the Omni-dimensional Dynamic Convolution(ODConv)is combined with the ResNet-18 feature extraction module to obtain multi-dimensional complementary features,thereby improving the accuracy of Yi character detection.Then,the feature pyramid network fusion module is used to further extract Yi character image features,improving target recognition at different scales.Further,the previously generated feature map is passed through a head network to produce two maps:a probability map and an adaptive threshold map of the same size as the original map.These maps are then subjected to a differentiable binarization process,resulting in an approximate binarization map.This map helps to identify the boundaries of the text boxes.Finally,the text detection box is generated after the post-processing stage.In the recognition stage,an improved lightweight MobileNetV3 framework is used to recognize the detect character regions,where the original Squeeze-and-Excitation(SE)block is replaced by the efficient Shuffle Attention(SA)that integrates spatial and channel attention,improving the accuracy of Yi characters recognition.Meanwhile,the use of depth separable convolution and reversible residual structure can reduce the number of parameters and computation of the model,so that the model can better understand the contextual information and improve the accuracy of text recognition.The experimental results illustrate that the proposed method achieves good results in detecting and recognizing Yi characters,with detection and recognition accuracy rates of 97.5%and 96.8%,respectively.And also,we have compared the detection and recognition algorithms proposed in this paper with other typical algorithms.In these comparisons,the proposed model achieves better detection and recognition results with a certain reliability.
文摘On-line chatter detection can avoid unstable cutting through monitoring the machining process.In order to identify chatter in a timely manner,an improved Support Vector Machine(SVM)is developed in this paper,based on extracted features.In the SVM model,the penalty factor(e)and the core parameter(g)have important influence on the classification,more than from Kernel Functions(KFs).Hence,first the classification results are conducted using different KFs.Then two methods are presented for exploring the best parameters.The chatter identification results show that the Genetic Algorithm(GA)approach is more suitable for deciding the parameters than the Grid Explore(GE)approach.
基金supported by The Agricultural Science and Technology Independent Innovation Fund Project of Jiangsu Province(CX(22)3111)the National Natural Science Foundation of China Project(62173162)partly by the Changzhou Science and Technology Support Project(CE20225016).
文摘Real-time detection of unhealthy fish remains a significant challenge in intensive recirculating aquaculture.Early recognition of unhealthy fish and the implementation of appropriate treatment measures are crucial for preventing the spread of diseases and minimizing economic losses.To address this issue,an improved algorithm based on the You Only Look Once v5s(YOLOv5s)lightweight model has been proposed.This enhanced model incorporates a faster lightweight structure and a new Convolutional Block Attention Module(CBAM)to achieve high recognition accuracy.Furthermore,the model introduces theα-SIoU loss function,which combines theα-Intersection over Union(α-IoU)and Shape Intersection over Union(SIoU)loss functions,thereby improving the accuracy of bounding box regression and object recognition.The average precision of the improved model reaches 94.2%for detecting unhealthy fish,representing increases of 11.3%,9.9%,9.7%,2.5%,and 2.1%compared to YOLOv3-tiny,YOLOv4,YOLOv5s,GhostNet-YOLOv5,and YOLOv7,respectively.Additionally,the improved model positively impacts hardware efficiency,reducing requirements for memory size by 59.0%,67.0%,63.0%,44.7%,and 55.6%in comparison to the five models mentioned above.The experimental results underscore the effectiveness of these approaches in addressing the challenges associated with fish health detection,and highlighting their significant practical implications and broad application prospects.