The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric an...The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications i...Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.展开更多
The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools.In this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplo...The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools.In this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19,pneumonia,and normal conditions in chest X-ray images(CXIs)is proposed coupled with Explainable Artificial Intelligence(XAI).Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3,VGG16,and VGG19 that excel in the task of feature extraction.The methodology is further enhanced by the inclusion of the t-SNE(t-Distributed Stochastic Neighbor Embedding)technique for visualizing the extracted image features and Contrast Limited Adaptive Histogram Equalization(CLAHE)to improve images before extraction of features.Additionally,an AttentionMechanism is utilized,which helps clarify how the modelmakes decisions,which builds trust in artificial intelligence(AI)systems.To evaluate the effectiveness of the proposed approach,both benchmark datasets and a private dataset obtained with permissions from Jinnah PostgraduateMedical Center(JPMC)in Karachi,Pakistan,are utilized.In 12 experiments,VGG19 showcased remarkable performance in the hybrid dataset approach,achieving 100%accuracy in COVID-19 vs.pneumonia classification and 97%in distinguishing normal cases.Overall,across all classes,the approach achieved 98%accuracy,demonstrating its efficiency in detecting COVID-19 and differentiating it fromother chest disorders(Pneumonia and healthy)while also providing insights into the decision-making process of the models.展开更多
The magnhc network model of a hybrid step motor is established by the air gap rate permeance method,and the expression of harmonic back EMF is deduced, and from the analysis above, a vovel use of harmonic backEMF sed ...The magnhc network model of a hybrid step motor is established by the air gap rate permeance method,and the expression of harmonic back EMF is deduced, and from the analysis above, a vovel use of harmonic backEMF sed to extract rotor peition is proposed and a new position sensor integral with the motoris designed .Experi-ments verified the correctness of the theorecal analysis. Ths type of rotor position sensor lays a foundation for closed-loop conrol of step motor.展开更多
Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate protection.The aim of Intrusion Detection Systems(I...Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate protection.The aim of Intrusion Detection Systems(IDS)is to prevent malicious attacks that corrupt operations and interrupt data flow,which might have significant impact on critical industries and infrastructure.This research examines existing IDS,based on Artificial Intelligence(AI)for IoT devices,methods,and techniques.The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy,precision,recall and F1-score;this research also considers training time.Results demonstrate that Graph Neural Networks(GNN)have several benefits over other traditional AI frameworks through their ability to achieve in excess of 99%accuracy in a relatively short training time,while also capable of learning from network traffic the inherent characteristics of different cyber-attacks.These findings identify the GNN(a Deep Learning AI method)as the most efficient IDS system.The novelty of this research lies also in the linking between high yielding AI-based IDS algorithms and the AI-based learning approach for data privacy protection.This research recommends Federated Learning(FL)as the AI training model,which increases data privacy protection and reduces network data flow,resulting in a more secure and efficient IDS solution.展开更多
One of the most basic and difficult areas of computer vision and image understanding applications is still object detection. Deep neural network models and enhanced object representation have led to significant progre...One of the most basic and difficult areas of computer vision and image understanding applications is still object detection. Deep neural network models and enhanced object representation have led to significant progress in object detection. This research investigates in greater detail how object detection has changed in the recent years in the deep learning age. We provide an overview of the literature on a range of cutting-edge object identification algorithms and the theoretical underpinnings of these techniques. Deep learning technologies are contributing to substantial innovations in the field of object detection. While Convolutional Neural Networks (CNN) have laid a solid foundation, new models such as You Only Look Once (YOLO) and Vision Transformers (ViTs) have expanded the possibilities even further by providing high accuracy and fast detection in a variety of settings. Even with these developments, integrating CNN, YOLO and ViTs, into a coherent framework still poses challenges with juggling computing demand, speed, and accuracy especially in dynamic contexts. Real-time processing in applications like surveillance and autonomous driving necessitates improvements that take use of each model type’s advantages. The goal of this work is to provide an object detection system that maximizes detection speed and accuracy while decreasing processing requirements by integrating YOLO, CNN, and ViTs. Improving real-time detection performance in changing weather and light exposure circumstances, as well as detecting small or partially obscured objects in crowded cities, are among the goals. We provide a hybrid architecture which leverages CNN for robust feature extraction, YOLO for rapid detection, and ViTs for remarkable global context capture via self-attention techniques. Using an innovative training regimen that prioritizes flexible learning rates and data augmentation procedures, the model is trained on an extensive dataset of urban settings. Compared to solo YOLO, CNN, or ViTs models, the suggested model exhibits an increase in detection accuracy. This improvement is especially noticeable in difficult situations such settings with high occlusion and low light. In addition, it attains a decrease in inference time in comparison to baseline models, allowing real-time object detection without performance loss. This work introduces a novel method of object identification that integrates CNN, YOLO and ViTs, in a synergistic way. The resultant framework extends the use of integrated deep learning models in practical applications while also setting a new standard for detection performance under a variety of conditions. Our research advances computer vision by providing a scalable and effective approach to object identification problems. Its possible uses include autonomous navigation, security, and other areas.展开更多
In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developi...In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developing detection and treatment methods should continue.The diagnostic path typically begins with learning the medical history of a patient;this is followed by basic blood tests and imaging tests to indicate where cancer may be located to schedule a needle biopsy.Prompt initiation of diagnosis is crucial since delayed cancer detection entails higher costs of treatment and hospitalization.Thus,there is a need for novel cancer detection methods such as liquid biopsy,elastography,synthetic biosensors,fluorescence imaging,and reflectance confocal microscopy.Conventional therapeutic methods,although still common in clinical practice,pose many limitations and are unsatisfactory.Nowadays,there is a dynamic advancement of clinical research and the development of more precise and effective methods such as oncolytic virotherapy,exosome-based therapy,nanotechnology,dendritic cells,chimeric antigen receptors,immune checkpoint inhibitors,natural product-based therapy,tumor-treating fields,and photodynamic therapy.The present paper compares available data on conventional and modern methods of cancer detection and therapy to facilitate an understanding of this rapidly advancing field and its future directions.As evidenced,modern methods are not without drawbacks;there is still a need to develop new detection strategies and therapeutic approaches to improve sensitivity,specificity,safety,and efficacy.Nevertheless,an appropriate route has been taken,as confirmed by the approval of some modern methods by the Food and Drug Administration.展开更多
By numerically solving the semiconductor Bloch equation(SBEs),we theoretically study the high-harmonic generation of ZnO crystals driven by one-color and two-color intense laser pulses.The results show the enhancement...By numerically solving the semiconductor Bloch equation(SBEs),we theoretically study the high-harmonic generation of ZnO crystals driven by one-color and two-color intense laser pulses.The results show the enhancement of harmonics and the cut-off remains the same in the two-color field,which can be explained by the recollision trajectories and electron excitation from multi-channels.Based on the quantum path analysis,we investigate contribution of different ranges of the crystal momentum k of ZnO to the harmonic yield,and find that in two-color laser fields,the intensity of the harmonic yield of different ranges from the crystal momentum makes a big difference and the harmonic intensity is depressed from all k channels,which is related to the interferences between harmonics from symmetric k channels.展开更多
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,...We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.展开更多
Power Quality measures the reliable operation between the system and to the connected loads of same system. A poor power quality causes physical damage to the equipment and also results in lower productivity with incr...Power Quality measures the reliable operation between the system and to the connected loads of same system. A poor power quality causes physical damage to the equipment and also results in lower productivity with increase in energy costs. Power disturbances range from micro seconds to hours and the prolonged disturbances in hours would damage the equipments. The power quality decreases due to growth of nonlinear loads in domestic appliances, such as home Uninterrupted Power Supplies (UPS), Induction stove, Television etc. Nowadays Domestic loads are controlled or powered with power electronic devices. The power electronic devices with Direct Current (DC) components generate high frequency signal for DC-Alternating Current (AC) conversion. The conversion introduces multiple frequencies in the AC power supply. The multiple frequencies in AC power supply are called as harmonics. The harmonics in AC supply affects the lifetime of home appliances, consumes more electric current, affects the power factor, transformer efficiency, and other electricity supply systems. Till now, to avoid harmonics, the filters are erected only in industrial loads or in the substations. In this paper a novel method to detect and control harmonics in domestic appliances is proposed. Harmonic control with various filters in the filter bank, based on detection of harmonic voltage let out from the domestic appliances for power saving. To select the appropriate filter to improve power quality, we apply a novel Genetic Algorithm based Linear Regression Method (GLRM) algorithm for optimum Filter Selection. From the results we were able to reduce the total harmonic distortion level to 3.68%.The current consumption of each household appliance is reduced considerably and finally the electricity bill is reduced to 15% and overall system efficiency improves to 85%.展开更多
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.展开更多
Since the empirical mode decomposition (EMD) lacks strict orthogonality, the method of orthogonal empirical mode decomposition (OEMD) is innovationally proposed. The primary thought of this method is to obtain the...Since the empirical mode decomposition (EMD) lacks strict orthogonality, the method of orthogonal empirical mode decomposition (OEMD) is innovationally proposed. The primary thought of this method is to obtain the intrinsic mode function (IMF) and the residual function by auto-adaptive band-pass filtering. OEMD is proved to preserve strict orthogonality and completeness theoretically, and the orthogonal basis function of OEMD is generated, then an algorithm to implement OEMD fast, IMF binary searching algorithm is built based on the point that the analytical band-pass filtering preserves perfect band-pass feature in the frequency domain. The application into harmonic detection shows that OEMD successfully conquers mode aliasing, avoids the occurrence of false mode, and is featured by fast computing speed. Furthermore, it can achieve harmonic detection accurately combined with the least square method.展开更多
With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed ...With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.展开更多
Background: Acute Kidney Injury (AKI) stands as a prominent postoperative complication in on-pump cardiac surgery, with repercussions on morbidity, mortality, and hospitalization duration. Current diagnostic criteria ...Background: Acute Kidney Injury (AKI) stands as a prominent postoperative complication in on-pump cardiac surgery, with repercussions on morbidity, mortality, and hospitalization duration. Current diagnostic criteria relying on serum creatinine levels exhibit a delayed identification of AKI, prompting an exploration of alternative biomarkers. Aims and Objectives: This study is designed to overcome diagnostic constraints and explore the viability of serum Cystatin C as an early predictor of Acute Kidney Injury (AKI) in individuals undergoing on-pump cardiac surgery. The investigation aims to establish the relationship between serum Cystatin C levels and the onset of AKI in patients subjected to on-pump cardiac surgery. Primary objectives involve the assessment of the diagnostic effectiveness of serum Cystatin C, its comparison with serum creatinine, and the exploration of its potential for the early identification and treatment of AKI. Methodology: Conducted as a single-center study at the cardiac surgery department of BSMMU in Bangladesh from September 2020 to August 2022, a comparative cross-sectional analysis involved 31 participants categorized into No AKI and AKI groups based on Kidney Disease: Improving Global Outcomes (KDIGO) criteria. Data collection encompassed preoperative, post-CBP (cardiopulmonary bypass) conclusion at 2 hours, postoperative day 1, and postoperative day 2 intervals. Statistical analyses included Chi-squared tests, independent Student’s t-tests, and one-sample t-tests. Significance was set at P Results: The study revealed no significant differences in baseline characteristics between the No AKI and AKI groups, except for CPB time and cross-clamp time. Serum Cystatin C levels in the AKI group exhibited statistical significance at various time points, highlighting its potential as an early detector. Conversely, Serum Creatinine levels in the AKI group showed no statistical significance. The Receiver Operating Characteristic (ROC) curve analysis further supported the efficacy of serum Cystatin C, with an Area under the ROC Curve of 0.864 and a cut-off value of 0.55 (p Conclusion: This study supports the superior utility of serum Cystatin C as an early detector of AKI in on-pump cardiac surgery patients compared to serum creatinine. Its ability to identify AKI several hours earlier may contribute to reduced morbidity, mortality, and healthcare costs. The findings underscore the significance of exploring novel biomarkers for improved post-cardiac surgery renal function assessment.展开更多
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar...Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.展开更多
To determine the prevalence of metabolic syndrome (MetS) in Malaysian type 2 diabetic patients using WHO, NCEP ATP III, IDF and the new Harmonized definitions, and the concordance between these definitions. This study...To determine the prevalence of metabolic syndrome (MetS) in Malaysian type 2 diabetic patients using WHO, NCEP ATP III, IDF and the new Harmonized definitions, and the concordance between these definitions. This study involved 313 patients diagnosed with type 2 diabetes mellitus (T2DM) at two Malaysian tertiary hospitals. Socio-demographic data were assessed using a pre-tested interviewer-administered structured questionnaire. Anthropometric measurements were carried out according to standard protocols. Clinical and laboratory characteristics were examined. Kappa (k) statistics were used for the agreement between the four MetS definitions. The overall prevalence rates of MetS (95% CI) were 95.8% (93.6-98.1), 96.1% (94.0-98.3), 84.8% (80.8-88.9) and 97.7% (96.1-99.4) according to the WHO, NCEP ATP III, IDF and the Harmonized definitions, respectively. The Kappa statistics demonstrated a slight to substantial agreement between the definitions (k = 0.179-0.875, p k = 0.875, p hest specificity (100%) in identifying MetS. In conclusion, the new Harmonized criteria established the highest prevalence of MetS among the four definitions applied. There was a very good concordance between the WHO and NCEP ATP III criteria. The extremely high prevalence of MetS observed in type 2 diabetic patients indicates an impending pandemic of CVD risk in Malaysia. Aggressive treatment of MetS components is required to reduce cardiovascular risk in T2DM.展开更多
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a diff...SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSOBP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better.展开更多
Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural N...Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural Network(BNN)for road feature extraction,utilizing quantization and compression through a pruning strategy.The modifications resulted in a 28-fold decrease in memory usage and a 25%enhancement in inference speed while only experiencing a 2.5%decrease in accuracy.It showcases its superiority over conventional detection algorithms in different road image scenarios.Although constrained by computer resources and training datasets,our results indicate opportunities for future research,demonstrating that quantization and focused optimization can significantly improve machine learning models’accuracy and operational efficiency.ARM Cortex-M0 gives practical feasibility and substantial benefits while deploying our optimized BNN model on this low-power device:Advanced machine learning in edge computing.The analysis work delves into the educational significance of TinyML and its essential function in analyzing road networks using remote sensing,suggesting ways to improve smart city frameworks in road network assessment,traffic management,and autonomous vehicle navigation systems by emphasizing the importance of new technologies for maintaining and safeguarding road networks.展开更多
The screening of colorectal cancer(CRC)is pivotal for both the prevention and treatment of this disease,significantly improving early-stage tumor detection rates.This advancement not only boosts survival rates and qua...The screening of colorectal cancer(CRC)is pivotal for both the prevention and treatment of this disease,significantly improving early-stage tumor detection rates.This advancement not only boosts survival rates and quality of life for patients but also reduces the costs associated with treatment.However,the adoption of CRC screening methods faces numerous challenges,including the technical limitations of both noninvasive and invasive methods in terms of sensitivity and specificity.Moreover,socioeconomic factors such as regional disparities,economic conditions,and varying levels of awareness affect screening uptake.The coronavirus disease 2019 pandemic further intensified these challenges,leading to reduced screening participation and increased waiting periods.Additionally,the growing prevalence of early-onset CRC necessitates innovative screening approaches.In response,research into new methodologies,including artificial intelligence-based systems,aims to improve the precision and accessibility of screening.Proactive measures by governments and health organizations to enhance CRC screening efforts are underway,including increased advocacy,improved service delivery,and international cooperation.The role of technological innovation and global health collaboration in advancing CRC screening is undeniable.Technologies such as artificial intelligence and gene sequencing are set to revolutionize CRC screening,making a significant impact on the fight against this disease.Given the rise in early-onset CRC,it is crucial for screening strategies to continually evolve,ensuring their effectiveness and applicability.展开更多
文摘The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金This research was partly supported by the National Science and Technology Council,Taiwan with Grant Numbers 112-2221-E-992-045,112-2221-E-992-057-MY3 and 112-2622-8-992-009-TD1.
文摘Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.
基金the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2024-9/1).
文摘The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools.In this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19,pneumonia,and normal conditions in chest X-ray images(CXIs)is proposed coupled with Explainable Artificial Intelligence(XAI).Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3,VGG16,and VGG19 that excel in the task of feature extraction.The methodology is further enhanced by the inclusion of the t-SNE(t-Distributed Stochastic Neighbor Embedding)technique for visualizing the extracted image features and Contrast Limited Adaptive Histogram Equalization(CLAHE)to improve images before extraction of features.Additionally,an AttentionMechanism is utilized,which helps clarify how the modelmakes decisions,which builds trust in artificial intelligence(AI)systems.To evaluate the effectiveness of the proposed approach,both benchmark datasets and a private dataset obtained with permissions from Jinnah PostgraduateMedical Center(JPMC)in Karachi,Pakistan,are utilized.In 12 experiments,VGG19 showcased remarkable performance in the hybrid dataset approach,achieving 100%accuracy in COVID-19 vs.pneumonia classification and 97%in distinguishing normal cases.Overall,across all classes,the approach achieved 98%accuracy,demonstrating its efficiency in detecting COVID-19 and differentiating it fromother chest disorders(Pneumonia and healthy)while also providing insights into the decision-making process of the models.
文摘The magnhc network model of a hybrid step motor is established by the air gap rate permeance method,and the expression of harmonic back EMF is deduced, and from the analysis above, a vovel use of harmonic backEMF sed to extract rotor peition is proposed and a new position sensor integral with the motoris designed .Experi-ments verified the correctness of the theorecal analysis. Ths type of rotor position sensor lays a foundation for closed-loop conrol of step motor.
文摘Escalating cyber security threats and the increased use of Internet of Things(IoT)devices require utilisation of the latest technologies available to supply adequate protection.The aim of Intrusion Detection Systems(IDS)is to prevent malicious attacks that corrupt operations and interrupt data flow,which might have significant impact on critical industries and infrastructure.This research examines existing IDS,based on Artificial Intelligence(AI)for IoT devices,methods,and techniques.The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy,precision,recall and F1-score;this research also considers training time.Results demonstrate that Graph Neural Networks(GNN)have several benefits over other traditional AI frameworks through their ability to achieve in excess of 99%accuracy in a relatively short training time,while also capable of learning from network traffic the inherent characteristics of different cyber-attacks.These findings identify the GNN(a Deep Learning AI method)as the most efficient IDS system.The novelty of this research lies also in the linking between high yielding AI-based IDS algorithms and the AI-based learning approach for data privacy protection.This research recommends Federated Learning(FL)as the AI training model,which increases data privacy protection and reduces network data flow,resulting in a more secure and efficient IDS solution.
文摘One of the most basic and difficult areas of computer vision and image understanding applications is still object detection. Deep neural network models and enhanced object representation have led to significant progress in object detection. This research investigates in greater detail how object detection has changed in the recent years in the deep learning age. We provide an overview of the literature on a range of cutting-edge object identification algorithms and the theoretical underpinnings of these techniques. Deep learning technologies are contributing to substantial innovations in the field of object detection. While Convolutional Neural Networks (CNN) have laid a solid foundation, new models such as You Only Look Once (YOLO) and Vision Transformers (ViTs) have expanded the possibilities even further by providing high accuracy and fast detection in a variety of settings. Even with these developments, integrating CNN, YOLO and ViTs, into a coherent framework still poses challenges with juggling computing demand, speed, and accuracy especially in dynamic contexts. Real-time processing in applications like surveillance and autonomous driving necessitates improvements that take use of each model type’s advantages. The goal of this work is to provide an object detection system that maximizes detection speed and accuracy while decreasing processing requirements by integrating YOLO, CNN, and ViTs. Improving real-time detection performance in changing weather and light exposure circumstances, as well as detecting small or partially obscured objects in crowded cities, are among the goals. We provide a hybrid architecture which leverages CNN for robust feature extraction, YOLO for rapid detection, and ViTs for remarkable global context capture via self-attention techniques. Using an innovative training regimen that prioritizes flexible learning rates and data augmentation procedures, the model is trained on an extensive dataset of urban settings. Compared to solo YOLO, CNN, or ViTs models, the suggested model exhibits an increase in detection accuracy. This improvement is especially noticeable in difficult situations such settings with high occlusion and low light. In addition, it attains a decrease in inference time in comparison to baseline models, allowing real-time object detection without performance loss. This work introduces a novel method of object identification that integrates CNN, YOLO and ViTs, in a synergistic way. The resultant framework extends the use of integrated deep learning models in practical applications while also setting a new standard for detection performance under a variety of conditions. Our research advances computer vision by providing a scalable and effective approach to object identification problems. Its possible uses include autonomous navigation, security, and other areas.
文摘In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developing detection and treatment methods should continue.The diagnostic path typically begins with learning the medical history of a patient;this is followed by basic blood tests and imaging tests to indicate where cancer may be located to schedule a needle biopsy.Prompt initiation of diagnosis is crucial since delayed cancer detection entails higher costs of treatment and hospitalization.Thus,there is a need for novel cancer detection methods such as liquid biopsy,elastography,synthetic biosensors,fluorescence imaging,and reflectance confocal microscopy.Conventional therapeutic methods,although still common in clinical practice,pose many limitations and are unsatisfactory.Nowadays,there is a dynamic advancement of clinical research and the development of more precise and effective methods such as oncolytic virotherapy,exosome-based therapy,nanotechnology,dendritic cells,chimeric antigen receptors,immune checkpoint inhibitors,natural product-based therapy,tumor-treating fields,and photodynamic therapy.The present paper compares available data on conventional and modern methods of cancer detection and therapy to facilitate an understanding of this rapidly advancing field and its future directions.As evidenced,modern methods are not without drawbacks;there is still a need to develop new detection strategies and therapeutic approaches to improve sensitivity,specificity,safety,and efficacy.Nevertheless,an appropriate route has been taken,as confirmed by the approval of some modern methods by the Food and Drug Administration.
基金the National Natural ScienceFoundation of China (Grant No. 12074146)the NaturalScience Foundation of Jilin Province, China (GrantNo. 20220101010JC).
文摘By numerically solving the semiconductor Bloch equation(SBEs),we theoretically study the high-harmonic generation of ZnO crystals driven by one-color and two-color intense laser pulses.The results show the enhancement of harmonics and the cut-off remains the same in the two-color field,which can be explained by the recollision trajectories and electron excitation from multi-channels.Based on the quantum path analysis,we investigate contribution of different ranges of the crystal momentum k of ZnO to the harmonic yield,and find that in two-color laser fields,the intensity of the harmonic yield of different ranges from the crystal momentum makes a big difference and the harmonic intensity is depressed from all k channels,which is related to the interferences between harmonics from symmetric k channels.
文摘We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.
文摘Power Quality measures the reliable operation between the system and to the connected loads of same system. A poor power quality causes physical damage to the equipment and also results in lower productivity with increase in energy costs. Power disturbances range from micro seconds to hours and the prolonged disturbances in hours would damage the equipments. The power quality decreases due to growth of nonlinear loads in domestic appliances, such as home Uninterrupted Power Supplies (UPS), Induction stove, Television etc. Nowadays Domestic loads are controlled or powered with power electronic devices. The power electronic devices with Direct Current (DC) components generate high frequency signal for DC-Alternating Current (AC) conversion. The conversion introduces multiple frequencies in the AC power supply. The multiple frequencies in AC power supply are called as harmonics. The harmonics in AC supply affects the lifetime of home appliances, consumes more electric current, affects the power factor, transformer efficiency, and other electricity supply systems. Till now, to avoid harmonics, the filters are erected only in industrial loads or in the substations. In this paper a novel method to detect and control harmonics in domestic appliances is proposed. Harmonic control with various filters in the filter bank, based on detection of harmonic voltage let out from the domestic appliances for power saving. To select the appropriate filter to improve power quality, we apply a novel Genetic Algorithm based Linear Regression Method (GLRM) algorithm for optimum Filter Selection. From the results we were able to reduce the total harmonic distortion level to 3.68%.The current consumption of each household appliance is reduced considerably and finally the electricity bill is reduced to 15% and overall system efficiency improves to 85%.
文摘The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED approach.The most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
基金National Natural Science Foundation of China(No.50575233)
文摘Since the empirical mode decomposition (EMD) lacks strict orthogonality, the method of orthogonal empirical mode decomposition (OEMD) is innovationally proposed. The primary thought of this method is to obtain the intrinsic mode function (IMF) and the residual function by auto-adaptive band-pass filtering. OEMD is proved to preserve strict orthogonality and completeness theoretically, and the orthogonal basis function of OEMD is generated, then an algorithm to implement OEMD fast, IMF binary searching algorithm is built based on the point that the analytical band-pass filtering preserves perfect band-pass feature in the frequency domain. The application into harmonic detection shows that OEMD successfully conquers mode aliasing, avoids the occurrence of false mode, and is featured by fast computing speed. Furthermore, it can achieve harmonic detection accurately combined with the least square method.
文摘With the high level of proliferation of connected mobile devices,the risk of intrusion becomes higher.Artificial Intelligence(AI)and Machine Learning(ML)algorithms started to feature in protection software and showed effective results.These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’malware,especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly.In this article,we present a framework for mobile malware detection based on a new dataset containing new categories of mobile malware.We focus on categories of malware that were not tested before by Machine Learning algorithms proven effective in malware detection.We carefully select an optimal number of features,do necessary preprocessing,and then apply Machine Learning algorithms to discover malicious code effectively.From our experiments,we have found that the Random Forest algorithm is the best-performing algorithm with such mobile malware with detection rates of around 99%.We compared our results from this work and found that they are aligned well with our previous work.We also compared our work with State-of-the-Art works of others and found that the results are very close and competitive.
文摘Background: Acute Kidney Injury (AKI) stands as a prominent postoperative complication in on-pump cardiac surgery, with repercussions on morbidity, mortality, and hospitalization duration. Current diagnostic criteria relying on serum creatinine levels exhibit a delayed identification of AKI, prompting an exploration of alternative biomarkers. Aims and Objectives: This study is designed to overcome diagnostic constraints and explore the viability of serum Cystatin C as an early predictor of Acute Kidney Injury (AKI) in individuals undergoing on-pump cardiac surgery. The investigation aims to establish the relationship between serum Cystatin C levels and the onset of AKI in patients subjected to on-pump cardiac surgery. Primary objectives involve the assessment of the diagnostic effectiveness of serum Cystatin C, its comparison with serum creatinine, and the exploration of its potential for the early identification and treatment of AKI. Methodology: Conducted as a single-center study at the cardiac surgery department of BSMMU in Bangladesh from September 2020 to August 2022, a comparative cross-sectional analysis involved 31 participants categorized into No AKI and AKI groups based on Kidney Disease: Improving Global Outcomes (KDIGO) criteria. Data collection encompassed preoperative, post-CBP (cardiopulmonary bypass) conclusion at 2 hours, postoperative day 1, and postoperative day 2 intervals. Statistical analyses included Chi-squared tests, independent Student’s t-tests, and one-sample t-tests. Significance was set at P Results: The study revealed no significant differences in baseline characteristics between the No AKI and AKI groups, except for CPB time and cross-clamp time. Serum Cystatin C levels in the AKI group exhibited statistical significance at various time points, highlighting its potential as an early detector. Conversely, Serum Creatinine levels in the AKI group showed no statistical significance. The Receiver Operating Characteristic (ROC) curve analysis further supported the efficacy of serum Cystatin C, with an Area under the ROC Curve of 0.864 and a cut-off value of 0.55 (p Conclusion: This study supports the superior utility of serum Cystatin C as an early detector of AKI in on-pump cardiac surgery patients compared to serum creatinine. Its ability to identify AKI several hours earlier may contribute to reduced morbidity, mortality, and healthcare costs. The findings underscore the significance of exploring novel biomarkers for improved post-cardiac surgery renal function assessment.
基金This researchwork is supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R411),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.
文摘To determine the prevalence of metabolic syndrome (MetS) in Malaysian type 2 diabetic patients using WHO, NCEP ATP III, IDF and the new Harmonized definitions, and the concordance between these definitions. This study involved 313 patients diagnosed with type 2 diabetes mellitus (T2DM) at two Malaysian tertiary hospitals. Socio-demographic data were assessed using a pre-tested interviewer-administered structured questionnaire. Anthropometric measurements were carried out according to standard protocols. Clinical and laboratory characteristics were examined. Kappa (k) statistics were used for the agreement between the four MetS definitions. The overall prevalence rates of MetS (95% CI) were 95.8% (93.6-98.1), 96.1% (94.0-98.3), 84.8% (80.8-88.9) and 97.7% (96.1-99.4) according to the WHO, NCEP ATP III, IDF and the Harmonized definitions, respectively. The Kappa statistics demonstrated a slight to substantial agreement between the definitions (k = 0.179-0.875, p k = 0.875, p hest specificity (100%) in identifying MetS. In conclusion, the new Harmonized criteria established the highest prevalence of MetS among the four definitions applied. There was a very good concordance between the WHO and NCEP ATP III criteria. The extremely high prevalence of MetS observed in type 2 diabetic patients indicates an impending pandemic of CVD risk in Malaysia. Aggressive treatment of MetS components is required to reduce cardiovascular risk in T2DM.
基金supported by the Hebei Province Innovation Capacity Improvement Program of China under Grant No.179676278Dthe Ministry of Education Fund Project of China under Grant No.2017A20004
文摘SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a difficult point and focus of SDN security research. Based on the characteristics of SDN, a DDoS attack detection method combining generalized entropy and PSOBP neural network is proposed. The traffic is pre-detected by the generalized entropy method deployed on the switch, and the detection result is divided into normal and abnormal. Locate the switch that issued the abnormal alarm. The controller uses the PSO-BP neural network to detect whether a DDoS attack occurs by further extracting the flow features of the abnormal switch. Experiments show that compared with other methods, the detection accurate rate is guaranteed while the CPU load of the controller is reduced, and the detection capability is better.
基金supported by the National Natural Science Foundation of China(61170147)Scientific Research Project of Zhejiang Provincial Department of Education in China(Y202146796)+2 种基金Natural Science Foundation of Zhejiang Province in China(LTY22F020003)Wenzhou Major Scientific and Technological Innovation Project of China(ZG2021029)Scientific and Technological Projects of Henan Province in China(202102210172).
文摘Integrating Tiny Machine Learning(TinyML)with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level.Constrained devices efficiently implement a Binary Neural Network(BNN)for road feature extraction,utilizing quantization and compression through a pruning strategy.The modifications resulted in a 28-fold decrease in memory usage and a 25%enhancement in inference speed while only experiencing a 2.5%decrease in accuracy.It showcases its superiority over conventional detection algorithms in different road image scenarios.Although constrained by computer resources and training datasets,our results indicate opportunities for future research,demonstrating that quantization and focused optimization can significantly improve machine learning models’accuracy and operational efficiency.ARM Cortex-M0 gives practical feasibility and substantial benefits while deploying our optimized BNN model on this low-power device:Advanced machine learning in edge computing.The analysis work delves into the educational significance of TinyML and its essential function in analyzing road networks using remote sensing,suggesting ways to improve smart city frameworks in road network assessment,traffic management,and autonomous vehicle navigation systems by emphasizing the importance of new technologies for maintaining and safeguarding road networks.
文摘The screening of colorectal cancer(CRC)is pivotal for both the prevention and treatment of this disease,significantly improving early-stage tumor detection rates.This advancement not only boosts survival rates and quality of life for patients but also reduces the costs associated with treatment.However,the adoption of CRC screening methods faces numerous challenges,including the technical limitations of both noninvasive and invasive methods in terms of sensitivity and specificity.Moreover,socioeconomic factors such as regional disparities,economic conditions,and varying levels of awareness affect screening uptake.The coronavirus disease 2019 pandemic further intensified these challenges,leading to reduced screening participation and increased waiting periods.Additionally,the growing prevalence of early-onset CRC necessitates innovative screening approaches.In response,research into new methodologies,including artificial intelligence-based systems,aims to improve the precision and accessibility of screening.Proactive measures by governments and health organizations to enhance CRC screening efforts are underway,including increased advocacy,improved service delivery,and international cooperation.The role of technological innovation and global health collaboration in advancing CRC screening is undeniable.Technologies such as artificial intelligence and gene sequencing are set to revolutionize CRC screening,making a significant impact on the fight against this disease.Given the rise in early-onset CRC,it is crucial for screening strategies to continually evolve,ensuring their effectiveness and applicability.