The composite exciter and the CaO to Na_(2)SO_(4) dosing ratios are known to have a strong impact on the mechanical strength offly-ash concrete.In the present study a hybrid approach relying on experiments and a machi...The composite exciter and the CaO to Na_(2)SO_(4) dosing ratios are known to have a strong impact on the mechanical strength offly-ash concrete.In the present study a hybrid approach relying on experiments and a machine-learn-ing technique has been used to tackle this problem.The tests have shown that the optimal admixture of CaO and Na_(2)SO_(4) alone is 8%.The best 3D mechanical strength offly-ash concrete is achieved at 8%of the compound activator;If the 28-day mechanical strength is considered,then,the best performances are obtained at 4%of the compound activator.Moreover,the 3D mechanical strength offly-ash concrete is better when the dosing ratio of CaO to Na_(2)SO_(4) in the compound activator is 1:1;the maximum strength offly-ash concrete at 28-day can be achieved for a 1:1 ratio of CaO to Na_(2)SO_(4) by considering a 4%compound activator.In this case,the compressive andflexural strengths are 260 MPa and 53.6 MPa,respectively;the mechanical strength offly-ash concrete at 28-day can be improved by a 4:1 ratio of CaO to Na_(2)SO_(4) by considering 8%and 12%compound excitants.It is shown that the predictions based on the aforementioned machine-learning approach are accurate and reliable.展开更多
Reliable sales forecasts are important to the garment industry. In recent years, the global climate is warming, the weather changes frequently, and clothing sales are affected by weather fluctuations. The purpose of t...Reliable sales forecasts are important to the garment industry. In recent years, the global climate is warming, the weather changes frequently, and clothing sales are affected by weather fluctuations. The purpose of this study is to investigate whether weather data can improve the accuracy of product sales and to establish a corresponding clothing sales forecasting model. This model uses the basic attributes of clothing product data, historical sales data, and weather data. It is based on a random forest, XGB, and GBDT adopting a stacking strategy. We found that weather information is not useful for basic clothing sales forecasts, but it did improve the accuracy of seasonal clothing sales forecasts. The MSE of the dresses, down jackets, and shirts are reduced by 86.03%, 80.14%, and 41.49% on average. In addition, we found that the stacking strategy model outperformed the voting strategy model, with an average MSE reduction of 49.28%. Clothing managers can use this model to forecast their sales when they make sales plans based on weather information.展开更多
Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to succes...Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases.展开更多
Objective: Postoperative complications adversely affected the prognosis in patients with gastric cancer. This study intends to investigate the feasibility of using machine-learning model to predict surgical outcomes i...Objective: Postoperative complications adversely affected the prognosis in patients with gastric cancer. This study intends to investigate the feasibility of using machine-learning model to predict surgical outcomes in patients undergoing gastrectomy.Methods: In this study, cancer patients who underwent gastrectomy at Shanghai Rui Jin Hospital in 2017 were randomly assigned to a development or validation cohort in a 9:1 ratio. A support vector classification(SVC) model to predict surgical outcomes in patients undergoing gastrectomy was developed and further validated.Results: A total of 321 patients with 32 features were collected. The positive and negative outcomes of postoperative complication after gastrectomy appeared in 100(31.2%) and 221(68.8%) patients, respectively. The SVC model was constructed to predict surgical outcomes in patients undergoing gastrectomy. The accuracy of 10-fold cross validation and external verification was 78.17% and 78.12%, respectively. Further, an online web server has been developed to share the SVC model for machine-learning-assisted prediction of surgical outcomes in patients undergoing gastrectomy in the future procedures, which is accessible at the web address:http://47.100.47.97:5005/r_model_prediction.Conclusions: The SVC model was a useful predictor for measuring the risk of postoperative complications after gastrectomy, which may help stratify patients with different overall status for choice of surgical procedure or other treatments. It can be expected that machine-learning models in cancer informatics research are possibly shareable and accessible via web address all over the world.展开更多
Drug addiction can cause abnormal brain activation changes,which are the root cause of drug craving and brain function errors.This study enrolled drug abusers to determine the effects of different drugs on brain activ...Drug addiction can cause abnormal brain activation changes,which are the root cause of drug craving and brain function errors.This study enrolled drug abusers to determine the effects of different drugs on brain activation.A functional near-infrared spectroscopy(fNIRS)device was used for the research.This study was designed with an experimental paradigm that included the induction of resting and drug addiction cravings.We collected the fNIRS data of 30 drug users,including 10 who used heroin,10 who used Methamphetamine,and 10 who used mixed drugs.First,using Statistical Analysis,the study analyzed the activations of eight functional areas of the left and right hemispheres of the prefrontal cortex of drug addicts who respectively used heroin,Methamphetamine,and mixed drugs,including Left/Right-Dorsolateral prefrontal cortex(L/R-DLPFC),Left/Right-Ventrolateral prefrontal cortex(L/R-VLPFC),Left/Right-Fronto-polar prefrontal cortex(L/R-FPC),and Left/Right Orbitofrontal Cortex(L/R-OFC).Second,referencing the degrees of activation of oxyhaemoglobin concentration(HbO2),the study made an analysis and got the specific activation patterns of each group of the addicts.Finally,after taking out data which are related to the addicts who recorded high degrees of activation among the three groups of addicts,and which had the same channel numbers,the paper classified the different drug abusers using the data as the input data for Convolutional Neural Networks(CNNs).The average three-class accuracy is 67.13%.It is of great significance for the analysis of brain function errors and personalized rehabilitation.展开更多
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi...Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.展开更多
Landslide susceptibility maps are vital tools used by decision-makers to adopt mitigation strategies for future calamities.In this context,research on landslide susceptibility modelling has become a topic of relevance...Landslide susceptibility maps are vital tools used by decision-makers to adopt mitigation strategies for future calamities.In this context,research on landslide susceptibility modelling has become a topic of relevance and is in constant evolution.Though various machine-learning techniques(MLTs)have been identified for landslide susceptibility modelling,the uncertainty inherent in the models is rarely considered.The present study attempts to quantify the uncertainty associated with landslide prediction models by developing a new methodological framework based on the ensembles of the eight MLTs.This methodology has been tested at the highlands of the southern Western Ghats region(Kerala,India),where landslides have frequently been occurring.Fourteen landslide conditioning factors have been identified as part of this study,and their association was correlated with 671 historic landslides in the study area.The study used four ensemble models such as the mean of probabilities,the median of probabilities,the weighted mean of probabilities,and the committee average.The weighted mean of probability was proved to be the best model based on the average of 800 standalone MLTs,viz.,receiver operating characteristics,true skill statistics,and area under curve with corresponding validation scores.Thereafter,an uncertainty analysis was carried out on the coefficient of variation.A confident map was generated to represent the distinct zonation of landslide susceptibility areas with definite uncertainty scales.Nearly 74%of the past landslides fall in the higher susceptibility-low uncertainty category.It is also inferred that such micro-level zonation based on MLTs may improve the efficiency of landslide susceptibility maps and may help in accurately identifying landslide-prone areas in the future.The confident maps thus generated can be used as a ready reference to the planners for the formulation of landslide adaptation strategies at micro-scales.展开更多
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND...Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication.展开更多
This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the s...This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.展开更多
With the development of satellite communication,in order to solve the problems of shortage of on-board resources and refinement of delay requirements to improve the communication performance of satellite optical netwo...With the development of satellite communication,in order to solve the problems of shortage of on-board resources and refinement of delay requirements to improve the communication performance of satellite optical networks,this paper proposes a bee colony optimization algorithm for routing and wavelength assignment based on directional guidance(DBCO-RWA)in satellite optical networks.In D-BCORWA,directional guidance based on relative position and link load is defined,and then the link cost function in the path search stage is established based on the directional guidance factor.Finally,feasible solutions are expanded in the global optimization stage.The wavelength utilization,communication success probability,blocking rate,communication hops and convergence characteristic are simulated.The results show that the performance of the proposed algorithm is improved compared with existing algorithms.展开更多
BACKGROUND John Henryism(JH)is a strategy for dealing with chronic psychological stress characterized by high levels of physical effort and work.Cynicism is a belief that people are motivated primarily by self-interes...BACKGROUND John Henryism(JH)is a strategy for dealing with chronic psychological stress characterized by high levels of physical effort and work.Cynicism is a belief that people are motivated primarily by self-interest.High scores on the JH scale and cynicism measures correlate with an increased risk of cardiovascular disease.High cynicism is also a hallmark of burnout syndrome,another known risk factor for heart disease.AIM To evaluate possible interactions between JH and cynicism hoping to clarify risk factors of burnout.METHODS We analyzed genetic and psychological data available from the Database of Genotypes and Phenotypes for genome-wide associations with these traits.We split the total available samples and used plink to perform the association studies on the discovery set(n=1852,80%)and tested for replication using the validation set(n=465).We used scikit-learn to perform supervised machine learning for developing genetic risk algorithms.RESULTS We identified 2,727,and 204 genetic associations for scores on the JH,cynicism and cynical distrust(CD)scales,respectively.We also found 173 associations with high cynicism,109 with high CD,but no associations with high JH.We also produced polygenic classifiers for high cynicism using machine learning with areas under the receiver operator characteristics curve greater than 0.7.CONCLUSION We found significant genetic components to these traits but no evidence of an interaction.Therefore,while there may be a genetic risk,JH is not likely a burnout risk factor.展开更多
The 3x + 1 problem, is a math problem that has baffled mathematicians for over 50 years. It’s easy to explain: take any positive number, if it’s even, divide it by 2;if it’s odd, multiply it by 3 and add 1. Repeat ...The 3x + 1 problem, is a math problem that has baffled mathematicians for over 50 years. It’s easy to explain: take any positive number, if it’s even, divide it by 2;if it’s odd, multiply it by 3 and add 1. Repeat this process with the resulting number, and the conjecture says that you will eventually reach 1. Despite testing all starting values up to an enormous number, no one has proved the conjecture is true for all possible starting values. The problem’s importance lies in its simplicity and difficulty, inspiring new ideas in mathematics and advancing fields like number theory, dynamical systems, and computer science. Proving or disproving the conjecture would revolutionize our understanding of math. The presence of infinite sequences is a matter of question. To investigate and solve this conjecture, we are utilizing a novel approach involving the fields of number theory and computer science.展开更多
This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An...This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true.展开更多
AIM: To investigate and compare the efficacy of two machine-learning technologies with deep-learning(DL) and support vector machine(SVM) for the detection of branch retinal vein occlusion(BRVO) using ultrawide-field f...AIM: To investigate and compare the efficacy of two machine-learning technologies with deep-learning(DL) and support vector machine(SVM) for the detection of branch retinal vein occlusion(BRVO) using ultrawide-field fundus images. METHODS: This study included 237 images from 236 patients with BRVO with a mean±standard deviation of age 66.3±10.6 y and 229 images from 176 non-BRVO healthy subjects with a mean age of 64.9±9.4 y. Training was conducted using a deep convolutional neural network using ultrawide-field fundus images to construct the DL model. The sensitivity, specificity, positive predictive value(PPV), negative predictive value(NPV) and area under the curve(AUC) were calculated to compare the diagnostic abilities of the DL and SVM models. RESULTS: For the DL model, the sensitivity, specificity, PPV, NPV and AUC for diagnosing BRVO was 94.0%(95%CI: 93.8%-98.8%), 97.0%(95%CI: 89.7%-96.4%), 96.5%(95%CI: 94.3%-98.7%), 93.2%(95%CI: 90.5%-96.0%) and 0.976(95%CI: 0.960-0.993), respectively. In contrast, for the SVM model, these values were 80.5%(95%CI: 77.8%-87.9%), 84.3%(95%CI: 75.8%-86.1%), 83.5%(95%CI: 78.4%-88.6%), 75.2%(95%CI: 72.1%-78.3%) and 0.857(95%CI: 0.811-0.903), respectively. The DL model outperformed the SVM model in all the aforementioned parameters(P<0.001). CONCLUSION: These results indicate that the combination of the DL model and ultrawide-field fundus ophthalmoscopy may distinguish between healthy and BRVO eyes with a high level of accuracy. The proposed combination may be used for automatically diagnosing BRVO in patients residing in remote areas lacking access to an ophthalmic medical center.展开更多
Machine-learning and big data are among the latest approaches in corrosion research.The biggest challenge in corrosion research is to accurately predict how materials will degrade in a given environment.Corrosion big ...Machine-learning and big data are among the latest approaches in corrosion research.The biggest challenge in corrosion research is to accurately predict how materials will degrade in a given environment.Corrosion big data is the application of mathematical methods to huge amounts of data to find correlations and infer probabilities.It is possible to use corrosion big data method to distinguish the influence of the minimal changes of alloying elements and small differences in microstructure on corrosion resistance of low alloy steels.In this research,corrosion big data evaluation methods and machine learning were used to study the effect of Sb and Sn,as well as environmental factors on the corrosion behavior of low alloy steels.Results depict corrosion big data method can accurately identify the influence of various factors on corrosion resistance of low alloy and is an effective and promising way in corrosion research.展开更多
Natural hazards are often studied in isolation.However,there is a great need to examine hazards holistically to better manage the complex of threats found in any region.Many regions of the world have complex hazard la...Natural hazards are often studied in isolation.However,there is a great need to examine hazards holistically to better manage the complex of threats found in any region.Many regions of the world have complex hazard landscapes wherein risk from individual and/or multiple extreme events is omnipresent.Extensive parts of Iran experience a complex array of natural hazards-floods,earthquakes,landslides,forest fires,subsidence,and drought.The effectiveness of risk mitigation is in part a function of whether the complex of hazards can be collectively considered,visualized,and evaluated.This study develops and tests individual and collective multihazard risk maps for floods,landslides,and forest fires to visualize the spatial distribution of risk in Fars Province,southern Iran.To do this,two well-known machine-learning algorithms-SVM and MARS-are used to predict the distribution of these events.Past floods,landslides,and forest fires were surveyed and mapped.The locations of occurrence of these events(individually and collectively) were randomly separated into training(70%) and testing(30%) data sets.The conditioning factors(for floods,landslides,and forest fires) employed to model the risk distributions are aspect,elevation,drainage density,distance from faults,geology,LULC,profile curvature,annual mean rainfall,plan curvature,distance from man-made residential structures,distance from nearest river,distance from nearest road,slope gradient,soil types,mean annual temperature,and TWI.The outputs of the two models were assessed using receiver-operating-characteristic(ROC) curves,true-skill statistics(TSS),and the correlation and deviance values from each models for each hazard.The areas-under-the-curves(AUC) for the MARS model prediction were 76.0%,91.2%,and 90.1% for floods,landslides,and forest fires,respectively.Similarly,the AUCs for the SVM model were 75.5%,89.0%,and 91.5%.The TSS reveals that the MARS model was better able to predict landslide risk,but was less able to predict flood-risk patterns and forest-fire risk.Finally,the combination of flood,forest fire,and landslide risk maps yielded a multi-hazard susceptibility map for the province.The better predictive model indicated that 52.3% of the province was at-risk for at least one of these hazards.This multi-hazard map may yield valuable insight for land-use planning,sustainable development of infrastructure,and also integrated watershed management in Fars Province.展开更多
The size and shape of the foveal avascular zone(FAZ)have a strong positive correlation with several vision-threatening ret inovascular diseases.The identification,segmentation and analysis of FAZ are of great signific...The size and shape of the foveal avascular zone(FAZ)have a strong positive correlation with several vision-threatening ret inovascular diseases.The identification,segmentation and analysis of FAZ are of great significance to clinical diagnosis and treatment.We presented an adaptive watershed algorithm to automatically extract F AZ from retinal optical coherence tomography angiography(OCTA)images.For the traditional watershed algorithm,"over-segmentation"is the most common problem.FAZ is often incorrectly divided into multiple regions by redundant"dams".This paper analyzed the relationship between the"dams"length and the maximum inscribed circle radius of FAZ,and proposed an adaptive watershed algorithm to solve the problem of"over-segmentation".Here,132 healthy retinal images and 50 diabetic retinopathy(DR)images were used to verify the accuracy and stability of the algorithm.Three ophthal-mologists were invited to make quan titative and qualitative evaluations on the segmentation results of this algorithm.The quantitative evaluation results show that the correlation coffi-cients between the automatic and manual segmentation results are 0.945(in healthy subjects)and 0.927(in DR patients),respectively.For qualitative evaluation,the percentages of"perfect segmentation"(score of 3)and"good segmentation"(score of 2)are 99.4%(in healthy subjects)and 98.7%(in DR patients),respectively.This work promotes the application of watershed algorithm in FAZ segmentation,making it a useful tool for analyzing and diagnosing eye diseases.展开更多
Since the 5-steps rule was proposed in 2011, it has been widely used in many areas of molecular biology, both theoretical and experimental. It can be even used to deal with the commercial problems and bank systems, as...Since the 5-steps rule was proposed in 2011, it has been widely used in many areas of molecular biology, both theoretical and experimental. It can be even used to deal with the commercial problems and bank systems, as well as material science systems. Just like the machine-learning algorithms, it is the jade for nearly all the statistical systems.展开更多
Solid-state batteries have received increasing attention in scientific and industrial communities,which benefits from the intrinsically safe solid electrolytes(SEs).Although much effort has been devoted to designing S...Solid-state batteries have received increasing attention in scientific and industrial communities,which benefits from the intrinsically safe solid electrolytes(SEs).Although much effort has been devoted to designing SEs with high ionic conductivities,it is extremely difficult to fully understand the ionic diffusion mechanisms in SEs through conventional experimental and theoretical methods.Herein,the temperature-dependent concerted diffusion mechanism of ions in SEs is explored through machinelearning molecular dynamics,taking Li_(10)GeP_(2)S_(12) as a prototype.Weaker diffusion anisotropy,more disordered Li distributions,and shorter residence time are observed at a higher temperature.Arrhenius-type temperature dependence is maintained within a wide temperature range,which is attributed to the linear temperature dependence of jump frequencies of various concerted diffusion modes.These results provide a theoretical framework to understand the ionic diffusion mechanisms in SEs and deepen the understanding of the chemical origin of temperature-dependent concerted diffusions in SEs.展开更多
基金supported by the Scientific Research Fund Project of Yunnan Education Department(Grant Numbers 2023J1974 and 2023J1976)the Yunnan University Professional Degree Graduate Student Practical Innovation Fund Project(Grant Number ZC-22222374)also supported by the Yunnan Provincial Education Department Fund(Grant No.2022Y286).
文摘The composite exciter and the CaO to Na_(2)SO_(4) dosing ratios are known to have a strong impact on the mechanical strength offly-ash concrete.In the present study a hybrid approach relying on experiments and a machine-learn-ing technique has been used to tackle this problem.The tests have shown that the optimal admixture of CaO and Na_(2)SO_(4) alone is 8%.The best 3D mechanical strength offly-ash concrete is achieved at 8%of the compound activator;If the 28-day mechanical strength is considered,then,the best performances are obtained at 4%of the compound activator.Moreover,the 3D mechanical strength offly-ash concrete is better when the dosing ratio of CaO to Na_(2)SO_(4) in the compound activator is 1:1;the maximum strength offly-ash concrete at 28-day can be achieved for a 1:1 ratio of CaO to Na_(2)SO_(4) by considering a 4%compound activator.In this case,the compressive andflexural strengths are 260 MPa and 53.6 MPa,respectively;the mechanical strength offly-ash concrete at 28-day can be improved by a 4:1 ratio of CaO to Na_(2)SO_(4) by considering 8%and 12%compound excitants.It is shown that the predictions based on the aforementioned machine-learning approach are accurate and reliable.
文摘Reliable sales forecasts are important to the garment industry. In recent years, the global climate is warming, the weather changes frequently, and clothing sales are affected by weather fluctuations. The purpose of this study is to investigate whether weather data can improve the accuracy of product sales and to establish a corresponding clothing sales forecasting model. This model uses the basic attributes of clothing product data, historical sales data, and weather data. It is based on a random forest, XGB, and GBDT adopting a stacking strategy. We found that weather information is not useful for basic clothing sales forecasts, but it did improve the accuracy of seasonal clothing sales forecasts. The MSE of the dresses, down jackets, and shirts are reduced by 86.03%, 80.14%, and 41.49% on average. In addition, we found that the stacking strategy model outperformed the voting strategy model, with an average MSE reduction of 49.28%. Clothing managers can use this model to forecast their sales when they make sales plans based on weather information.
基金This work is supported by the Scientific Research Project of Educational Department of Liaoning Province(Grant No.LJKZ0082)the Program of Hainan Association for Science and Technology Plans to Youth R&D Innovation(Grant No.QCXM201910)+2 种基金the National Natural Science Foundation of China(Grant Nos.61802092 and 92067110)the Hainan Provincial Natural Science Foundation of China(Grant No.620RC562)2020 Industrial Internet Innovation and Development Project-Industrial Internet Identification Data Interaction Middleware and Resource Pool Service Platform Project,Ministry of Industry and Information Technology of the People’s Republic of China.
文摘Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases.
文摘Objective: Postoperative complications adversely affected the prognosis in patients with gastric cancer. This study intends to investigate the feasibility of using machine-learning model to predict surgical outcomes in patients undergoing gastrectomy.Methods: In this study, cancer patients who underwent gastrectomy at Shanghai Rui Jin Hospital in 2017 were randomly assigned to a development or validation cohort in a 9:1 ratio. A support vector classification(SVC) model to predict surgical outcomes in patients undergoing gastrectomy was developed and further validated.Results: A total of 321 patients with 32 features were collected. The positive and negative outcomes of postoperative complication after gastrectomy appeared in 100(31.2%) and 221(68.8%) patients, respectively. The SVC model was constructed to predict surgical outcomes in patients undergoing gastrectomy. The accuracy of 10-fold cross validation and external verification was 78.17% and 78.12%, respectively. Further, an online web server has been developed to share the SVC model for machine-learning-assisted prediction of surgical outcomes in patients undergoing gastrectomy in the future procedures, which is accessible at the web address:http://47.100.47.97:5005/r_model_prediction.Conclusions: The SVC model was a useful predictor for measuring the risk of postoperative complications after gastrectomy, which may help stratify patients with different overall status for choice of surgical procedure or other treatments. It can be expected that machine-learning models in cancer informatics research are possibly shareable and accessible via web address all over the world.
基金This work was supported by the National Natural Science Foundation of China(No.61976133)Shanghai Industrial Collaborative Technology Innovation Project(No.2021-cyxt1-kj14)+2 种基金Major Scienti¯c and Technological Innovation Projects of Shan Dong Province(No.2019JZZY021010)Science and Technology Innovation Base Project of Shanghai Science and Technology Commission(19DZ2255200)Defense Industrial Technology Development Program(JCKY2019413D002).
文摘Drug addiction can cause abnormal brain activation changes,which are the root cause of drug craving and brain function errors.This study enrolled drug abusers to determine the effects of different drugs on brain activation.A functional near-infrared spectroscopy(fNIRS)device was used for the research.This study was designed with an experimental paradigm that included the induction of resting and drug addiction cravings.We collected the fNIRS data of 30 drug users,including 10 who used heroin,10 who used Methamphetamine,and 10 who used mixed drugs.First,using Statistical Analysis,the study analyzed the activations of eight functional areas of the left and right hemispheres of the prefrontal cortex of drug addicts who respectively used heroin,Methamphetamine,and mixed drugs,including Left/Right-Dorsolateral prefrontal cortex(L/R-DLPFC),Left/Right-Ventrolateral prefrontal cortex(L/R-VLPFC),Left/Right-Fronto-polar prefrontal cortex(L/R-FPC),and Left/Right Orbitofrontal Cortex(L/R-OFC).Second,referencing the degrees of activation of oxyhaemoglobin concentration(HbO2),the study made an analysis and got the specific activation patterns of each group of the addicts.Finally,after taking out data which are related to the addicts who recorded high degrees of activation among the three groups of addicts,and which had the same channel numbers,the paper classified the different drug abusers using the data as the input data for Convolutional Neural Networks(CNNs).The average three-class accuracy is 67.13%.It is of great significance for the analysis of brain function errors and personalized rehabilitation.
基金The authors would like to thank Princess Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2023R319)this research was funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.
基金The authors would like to thank Kerala University of Fisheries and Ocean Studies(KUFOS)for providing high computing facilities(HP-Z6)granting permission to conduct the study。
文摘Landslide susceptibility maps are vital tools used by decision-makers to adopt mitigation strategies for future calamities.In this context,research on landslide susceptibility modelling has become a topic of relevance and is in constant evolution.Though various machine-learning techniques(MLTs)have been identified for landslide susceptibility modelling,the uncertainty inherent in the models is rarely considered.The present study attempts to quantify the uncertainty associated with landslide prediction models by developing a new methodological framework based on the ensembles of the eight MLTs.This methodology has been tested at the highlands of the southern Western Ghats region(Kerala,India),where landslides have frequently been occurring.Fourteen landslide conditioning factors have been identified as part of this study,and their association was correlated with 671 historic landslides in the study area.The study used four ensemble models such as the mean of probabilities,the median of probabilities,the weighted mean of probabilities,and the committee average.The weighted mean of probability was proved to be the best model based on the average of 800 standalone MLTs,viz.,receiver operating characteristics,true skill statistics,and area under curve with corresponding validation scores.Thereafter,an uncertainty analysis was carried out on the coefficient of variation.A confident map was generated to represent the distinct zonation of landslide susceptibility areas with definite uncertainty scales.Nearly 74%of the past landslides fall in the higher susceptibility-low uncertainty category.It is also inferred that such micro-level zonation based on MLTs may improve the efficiency of landslide susceptibility maps and may help in accurately identifying landslide-prone areas in the future.The confident maps thus generated can be used as a ready reference to the planners for the formulation of landslide adaptation strategies at micro-scales.
基金Supporting Project Number(RSPD2023R553),King Saud University,Riyadh,Saudi Arabia.
文摘Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication.
基金This work was supported in part by the National Natural Science Foundation of China(NSFC)under grant numbers 61671047,61775015 and U2006217.
文摘This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.
基金supported in part by the National Key Research and Development Program of China under Grant 2021YFB2900604in part by the National Natural Science Foundation of China(NSFC)under Grant U22B2033,61975234,61875230。
文摘With the development of satellite communication,in order to solve the problems of shortage of on-board resources and refinement of delay requirements to improve the communication performance of satellite optical networks,this paper proposes a bee colony optimization algorithm for routing and wavelength assignment based on directional guidance(DBCO-RWA)in satellite optical networks.In D-BCORWA,directional guidance based on relative position and link load is defined,and then the link cost function in the path search stage is established based on the directional guidance factor.Finally,feasible solutions are expanded in the global optimization stage.The wavelength utilization,communication success probability,blocking rate,communication hops and convergence characteristic are simulated.The results show that the performance of the proposed algorithm is improved compared with existing algorithms.
文摘BACKGROUND John Henryism(JH)is a strategy for dealing with chronic psychological stress characterized by high levels of physical effort and work.Cynicism is a belief that people are motivated primarily by self-interest.High scores on the JH scale and cynicism measures correlate with an increased risk of cardiovascular disease.High cynicism is also a hallmark of burnout syndrome,another known risk factor for heart disease.AIM To evaluate possible interactions between JH and cynicism hoping to clarify risk factors of burnout.METHODS We analyzed genetic and psychological data available from the Database of Genotypes and Phenotypes for genome-wide associations with these traits.We split the total available samples and used plink to perform the association studies on the discovery set(n=1852,80%)and tested for replication using the validation set(n=465).We used scikit-learn to perform supervised machine learning for developing genetic risk algorithms.RESULTS We identified 2,727,and 204 genetic associations for scores on the JH,cynicism and cynical distrust(CD)scales,respectively.We also found 173 associations with high cynicism,109 with high CD,but no associations with high JH.We also produced polygenic classifiers for high cynicism using machine learning with areas under the receiver operator characteristics curve greater than 0.7.CONCLUSION We found significant genetic components to these traits but no evidence of an interaction.Therefore,while there may be a genetic risk,JH is not likely a burnout risk factor.
文摘The 3x + 1 problem, is a math problem that has baffled mathematicians for over 50 years. It’s easy to explain: take any positive number, if it’s even, divide it by 2;if it’s odd, multiply it by 3 and add 1. Repeat this process with the resulting number, and the conjecture says that you will eventually reach 1. Despite testing all starting values up to an enormous number, no one has proved the conjecture is true for all possible starting values. The problem’s importance lies in its simplicity and difficulty, inspiring new ideas in mathematics and advancing fields like number theory, dynamical systems, and computer science. Proving or disproving the conjecture would revolutionize our understanding of math. The presence of infinite sequences is a matter of question. To investigate and solve this conjecture, we are utilizing a novel approach involving the fields of number theory and computer science.
文摘This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true.
文摘AIM: To investigate and compare the efficacy of two machine-learning technologies with deep-learning(DL) and support vector machine(SVM) for the detection of branch retinal vein occlusion(BRVO) using ultrawide-field fundus images. METHODS: This study included 237 images from 236 patients with BRVO with a mean±standard deviation of age 66.3±10.6 y and 229 images from 176 non-BRVO healthy subjects with a mean age of 64.9±9.4 y. Training was conducted using a deep convolutional neural network using ultrawide-field fundus images to construct the DL model. The sensitivity, specificity, positive predictive value(PPV), negative predictive value(NPV) and area under the curve(AUC) were calculated to compare the diagnostic abilities of the DL and SVM models. RESULTS: For the DL model, the sensitivity, specificity, PPV, NPV and AUC for diagnosing BRVO was 94.0%(95%CI: 93.8%-98.8%), 97.0%(95%CI: 89.7%-96.4%), 96.5%(95%CI: 94.3%-98.7%), 93.2%(95%CI: 90.5%-96.0%) and 0.976(95%CI: 0.960-0.993), respectively. In contrast, for the SVM model, these values were 80.5%(95%CI: 77.8%-87.9%), 84.3%(95%CI: 75.8%-86.1%), 83.5%(95%CI: 78.4%-88.6%), 75.2%(95%CI: 72.1%-78.3%) and 0.857(95%CI: 0.811-0.903), respectively. The DL model outperformed the SVM model in all the aforementioned parameters(P<0.001). CONCLUSION: These results indicate that the combination of the DL model and ultrawide-field fundus ophthalmoscopy may distinguish between healthy and BRVO eyes with a high level of accuracy. The proposed combination may be used for automatically diagnosing BRVO in patients residing in remote areas lacking access to an ophthalmic medical center.
基金financially supported by the Postdoctor Research Foundation of Shunde Graduate School of University of Science and Technology Beijing(No.2022 B H003)。
文摘Machine-learning and big data are among the latest approaches in corrosion research.The biggest challenge in corrosion research is to accurately predict how materials will degrade in a given environment.Corrosion big data is the application of mathematical methods to huge amounts of data to find correlations and infer probabilities.It is possible to use corrosion big data method to distinguish the influence of the minimal changes of alloying elements and small differences in microstructure on corrosion resistance of low alloy steels.In this research,corrosion big data evaluation methods and machine learning were used to study the effect of Sb and Sn,as well as environmental factors on the corrosion behavior of low alloy steels.Results depict corrosion big data method can accurately identify the influence of various factors on corrosion resistance of low alloy and is an effective and promising way in corrosion research.
基金The study was supported by College of Agriculture,Shiraz University(Grant No.96GRD1M271143).
文摘Natural hazards are often studied in isolation.However,there is a great need to examine hazards holistically to better manage the complex of threats found in any region.Many regions of the world have complex hazard landscapes wherein risk from individual and/or multiple extreme events is omnipresent.Extensive parts of Iran experience a complex array of natural hazards-floods,earthquakes,landslides,forest fires,subsidence,and drought.The effectiveness of risk mitigation is in part a function of whether the complex of hazards can be collectively considered,visualized,and evaluated.This study develops and tests individual and collective multihazard risk maps for floods,landslides,and forest fires to visualize the spatial distribution of risk in Fars Province,southern Iran.To do this,two well-known machine-learning algorithms-SVM and MARS-are used to predict the distribution of these events.Past floods,landslides,and forest fires were surveyed and mapped.The locations of occurrence of these events(individually and collectively) were randomly separated into training(70%) and testing(30%) data sets.The conditioning factors(for floods,landslides,and forest fires) employed to model the risk distributions are aspect,elevation,drainage density,distance from faults,geology,LULC,profile curvature,annual mean rainfall,plan curvature,distance from man-made residential structures,distance from nearest river,distance from nearest road,slope gradient,soil types,mean annual temperature,and TWI.The outputs of the two models were assessed using receiver-operating-characteristic(ROC) curves,true-skill statistics(TSS),and the correlation and deviance values from each models for each hazard.The areas-under-the-curves(AUC) for the MARS model prediction were 76.0%,91.2%,and 90.1% for floods,landslides,and forest fires,respectively.Similarly,the AUCs for the SVM model were 75.5%,89.0%,and 91.5%.The TSS reveals that the MARS model was better able to predict landslide risk,but was less able to predict flood-risk patterns and forest-fire risk.Finally,the combination of flood,forest fire,and landslide risk maps yielded a multi-hazard susceptibility map for the province.The better predictive model indicated that 52.3% of the province was at-risk for at least one of these hazards.This multi-hazard map may yield valuable insight for land-use planning,sustainable development of infrastructure,and also integrated watershed management in Fars Province.
基金the National Natural Science Foundation of China(61771119,61901100 and 62075037)the Natural Science Foundation of Hebei Province(H2019501010,F2019501132,E2020501029 and F2020501040).
文摘The size and shape of the foveal avascular zone(FAZ)have a strong positive correlation with several vision-threatening ret inovascular diseases.The identification,segmentation and analysis of FAZ are of great significance to clinical diagnosis and treatment.We presented an adaptive watershed algorithm to automatically extract F AZ from retinal optical coherence tomography angiography(OCTA)images.For the traditional watershed algorithm,"over-segmentation"is the most common problem.FAZ is often incorrectly divided into multiple regions by redundant"dams".This paper analyzed the relationship between the"dams"length and the maximum inscribed circle radius of FAZ,and proposed an adaptive watershed algorithm to solve the problem of"over-segmentation".Here,132 healthy retinal images and 50 diabetic retinopathy(DR)images were used to verify the accuracy and stability of the algorithm.Three ophthal-mologists were invited to make quan titative and qualitative evaluations on the segmentation results of this algorithm.The quantitative evaluation results show that the correlation coffi-cients between the automatic and manual segmentation results are 0.945(in healthy subjects)and 0.927(in DR patients),respectively.For qualitative evaluation,the percentages of"perfect segmentation"(score of 3)and"good segmentation"(score of 2)are 99.4%(in healthy subjects)and 98.7%(in DR patients),respectively.This work promotes the application of watershed algorithm in FAZ segmentation,making it a useful tool for analyzing and diagnosing eye diseases.
文摘Since the 5-steps rule was proposed in 2011, it has been widely used in many areas of molecular biology, both theoretical and experimental. It can be even used to deal with the commercial problems and bank systems, as well as material science systems. Just like the machine-learning algorithms, it is the jade for nearly all the statistical systems.
基金supported by the National Key Research and Development Program(2021YFB2500210)the Beijing Municipal Natural Science Foundation(Z20J00043)+4 种基金the National Natural Science Foundation of China(22109086 and 21825501)the China Postdoctoral Science Foundation(2021TQ0161 and 2021 M691709)the Guoqiang Institute at Tsinghua University(2020GQG1006)the support from the Shuimu Tsinghua Scholar Program of Tsinghua Universitythe support from the Tsinghua National Laboratory for Information Science and Technology for theoretical simulations。
文摘Solid-state batteries have received increasing attention in scientific and industrial communities,which benefits from the intrinsically safe solid electrolytes(SEs).Although much effort has been devoted to designing SEs with high ionic conductivities,it is extremely difficult to fully understand the ionic diffusion mechanisms in SEs through conventional experimental and theoretical methods.Herein,the temperature-dependent concerted diffusion mechanism of ions in SEs is explored through machinelearning molecular dynamics,taking Li_(10)GeP_(2)S_(12) as a prototype.Weaker diffusion anisotropy,more disordered Li distributions,and shorter residence time are observed at a higher temperature.Arrhenius-type temperature dependence is maintained within a wide temperature range,which is attributed to the linear temperature dependence of jump frequencies of various concerted diffusion modes.These results provide a theoretical framework to understand the ionic diffusion mechanisms in SEs and deepen the understanding of the chemical origin of temperature-dependent concerted diffusions in SEs.