期刊文献+
共找到234,760篇文章
< 1 2 250 >
每页显示 20 50 100
A core-satellite self-assembled SERS aptasensor containing a“biological-silent region”Raman tag for the accurate and ultrasensitive detection of histamine 被引量:1
1
作者 Chen Chen Yingfang Zhang +3 位作者 Ximo Wang Xuguang Qiao Geoffrey I.N.Waterhouse Zhixiang Xu 《Food Science and Human Wellness》 SCIE CSCD 2024年第2期1029-1039,共11页
Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-s... Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-satellite SERS aptasensor was constructed by combining aptamer-decorated Fe_(3)O_(4)@Au MNPs(as the recognize probe for histamine)and complementary DNA-modified silver nanoparticles carrying 4-mercaptobenzonitrile(4-MBN)(Ag@4-MBN@Ag-c-DNA)as the SERS signal probe for the indirect detection of histamine.Under an applied magnetic field in the absence of histamine,the assembly gave an intense Raman signal at“Raman biological-silent”region due to 4-MBN.In the presence of histamine,the Ag@4-MBN@Ag-c-DNA SERS-tag was released from the Fe_(3)O_(4)@Au MNPs,thus decreasing the SERS signal.Under optimal conditions,an ultra-low limit of detection of 0.65×10^(-3)ng/mL and a linear range 10^(-2)-10^5 ng/mL on the SERS aptasensor were obtained.The histamine content in four food samples were analyzed using the SERS aptasensor,with the results consistent with those determined by high performance liquid chromatography.The present work highlights the merits of indirect strategies for the ultrasensitive and highly selective SERS detection of small biological molecules in complex matrices. 展开更多
关键词 Surface-enhanced Raman spectroscopy Raman biological-silent region APTAMER Histamine detection Universal SERS-tag
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:2
2
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
3
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
An Implementation of Multiscale Line Detection and Mathematical Morphology for Efficient and Precise Blood Vessel Segmentation in Fundus Images
4
作者 Syed Ayaz Ali Shah Aamir Shahzad +4 位作者 Musaed Alhussein Chuan Meng Goh Khursheed Aurangzeb Tong Boon Tang Muhammad Awais 《Computers, Materials & Continua》 SCIE EI 2024年第5期2565-2583,共19页
Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when deal... Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field. 展开更多
关键词 Line detector vessel detection LOCALIZATION mathematical morphology image processing
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
5
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique
6
作者 Husam Ahmad Al Hamad Mohammad Shehab 《Computers, Materials & Continua》 SCIE EI 2024年第5期2015-2034,共20页
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr... Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset. 展开更多
关键词 Arabic handwritten SEGMENTATION image processing ligature detection technique intelligent recognition
下载PDF
An Attention-Based Approach to Enhance the Detection and Classification of Android Malware
7
作者 Abdallah Ghourabi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2743-2760,共18页
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in malware.These malicious applications have become a serious conc... The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in malware.These malicious applications have become a serious concern to the security of Android systems.To address this problem,researchers have proposed several machine-learning models to detect and classify Android malware based on analyzing features extracted from Android samples.However,most existing studies have focused on the classification task and overlooked the feature selection process,which is crucial to reduce the training time and maintain or improve the classification results.The current paper proposes a new Android malware detection and classification approach that identifies the most important features to improve classification performance and reduce training time.The proposed approach consists of two main steps.First,a feature selection method based on the Attention mechanism is used to select the most important features.Then,an optimized Light Gradient Boosting Machine(LightGBM)classifier is applied to classify the Android samples and identify the malware.The feature selection method proposed in this paper is to integrate an Attention layer into a multilayer perceptron neural network.The role of the Attention layer is to compute the weighted values of each feature based on its importance for the classification process.Experimental evaluation of the approach has shown that combining the Attention-based technique with an optimized classification algorithm for Android malware detection has improved the accuracy from 98.64%to 98.71%while reducing the training time from 80 to 28 s. 展开更多
关键词 Android malware malware detection feature selection attention mechanism LightGBM mobile security
下载PDF
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
8
作者 Xiaozhong Yu Jinhua Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期197-225,共29页
In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s... In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests. 展开更多
关键词 Deep learning rice diseases and pests image recognition object detection
下载PDF
A Glassy Carbon Electrode Modified with Cellulose Nanofibrils from Ammophila arenaria for the Sensitive Detection of L-Trytophan
9
作者 Sondes Bourigua Feriel Boussema +4 位作者 Zayneb Jebali Houcine Barhoumi Hatem Majdoub Abderrazak Maaref Nicole Jaffrezic-Renault 《Journal of Sensor Technology》 2024年第3期35-50,共16页
L-tryptophan is an essential amino acid for human health. Nanofibrillated cellulose (NFC) from marram grass (Ammophila arenaria) extracted from plants harvested in the center of Tunisia was used for the first time for... L-tryptophan is an essential amino acid for human health. Nanofibrillated cellulose (NFC) from marram grass (Ammophila arenaria) extracted from plants harvested in the center of Tunisia was used for the first time for the modification of a glassy carbon electrode (GCE), for the sensitive detection of L-tryptophan (Trp). After spectroscopic and morphological characterization of the extracted NFC, the GC electrode modification was monitored through cyclic voltammetry. The NFC-modified electrode exhibited good analytical performance in detecting Trp with a wide linear range between 7.5 × 10−4 mM and 10−2 mM, a detection limit of 0.2 µM, and a high sensitivity of 140.0 µA∙mM−1. Additionally, the NFC/GCE showed a good reproducibility, good selectivity versus other amino acids, uric acid, ascorbic acid, and good applicability to the detection of Trp in urine samples. 展开更多
关键词 Nanofibrillated Cellulose CHITOSAN Chemically Modified Glassy Carbon Electrode Electrochemical detection L-TRYPTOPHAN
下载PDF
Design and prototyping of the readout electronics for the transition radiation detector in the high energy cosmic radiation detection facility
10
作者 Jie-Yu Zhu Yang-Zhou Su +12 位作者 Hai-Bo Yang Fen-Hua Lu Yan Yang Xi-Wen Liu Ping Wei Shu-Cai Wan Hao-Qing Xie Xian-Qin Li Cong Dai Hui-Jun Hu Hong-Bang Liu Shu-Wen Tang Cheng-Xin Zhao 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期189-199,共11页
The high energy cosmic-radiation detection(HERD)facility is planned to launch in 2027 and scheduled to be installed on the China Space Station.It serves as a dark matter particle detector,a cosmic ray instrument,and a... The high energy cosmic-radiation detection(HERD)facility is planned to launch in 2027 and scheduled to be installed on the China Space Station.It serves as a dark matter particle detector,a cosmic ray instrument,and an observatory for high-energy gamma rays.A transition radiation detector placed on one of its lateral sides serves dual purpose,(ⅰ)calibrating HERD's electromagnetic calorimeter in the TeV energy range,and(ⅱ)serving as an independent detector for high-energy gamma rays.In this paper,the prototype readout electronics design of the transition radiation detector is demonstrated,which aims to accurately measure the charge of the anodes using the SAMPA application specific integrated circuit chip.The electronic performance of the prototype system is evaluated in terms of noise,linearity,and resolution.Through the presented design,each electronic channel can achieve a dynamic range of 0–100 fC,the RMS noise level not exceeding 0.15 fC,and the integral nonlinearity was<0.2%.To further verify the readout electronic performance,a joint test with the detector was carried out,and the results show that the prototype system can satisfy the requirements of the detector's scientific goals. 展开更多
关键词 HERD Dark matter particle detection TRD Readout electronics SAMPA Data acquisition Performance test
下载PDF
The Diagnostic Value of Oligoclonal Band Detection in Viral Encephalitis
11
作者 Anqi Huang Xianyue Meng Xueli Li# 《Journal of Behavioral and Brain Science》 2024年第1期23-31,共9页
Objective: This study aims to explore the differences in cerebrospinal fluid oligoclonal band (CSF-OCB) expression among different age groups in viral encephalitis and its reference value for diagnosis. Methods: Forty... Objective: This study aims to explore the differences in cerebrospinal fluid oligoclonal band (CSF-OCB) expression among different age groups in viral encephalitis and its reference value for diagnosis. Methods: Forty-two patients with viral encephalitis were divided into two groups: 25 adults and 17 children. The presence of oligoclonal bands in the cerebrospinal fluid (CSF) was detected using polyacrylamide gel electrophoresis, and CSF routine analysis was conducted for comparative analysis. Results: The CSF-OCB positivity rate was higher in the adult group (48%) compared with the pediatric group (11.76%), with a statistically significant difference (P Conclusion: 1) The expression of CSF-OCB positivity in patients with viral encephalitis is age-related, with higher positivity rates observed in adults compared to children. 2) Although CSF oligoclonal band detection is not a specific diagnostic marker for viral encephalitis in adults, it still holds certain reference value. 展开更多
关键词 Oligoclonal Band detection Viral Encephalitis Routine Analysis of Cerebrospinal Fluid Age
下载PDF
Production of Artificial Fog in the PAVIN Fog and Rain Platform: In Search of Big Droplets Fog
12
作者 Pierre Duthon Mickaël Ferreira Fernandes Sébastien Liandrat 《Atmospheric and Climate Sciences》 2024年第1期42-61,共20页
In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema P... In fog, visibility is reduced. This reduction in visibility is measured by the meteorological optical range (MOR), which is important for studying human perception and various sensors in foggy conditions. The Cerema PAVIN Fog & Rain platform is capable of producing calibrated fog in order to better analyses it and understand its consequences. The problem is that the droplets produced by the platform are not large enough to resemble real fog. This can have a major impact on measurements since the interaction between electromagnetic waves and fog depends on the wavelength and diameter of the droplets. To remedy this, Cerema is building a new platform with new equipment capable of generating fog. This study analyses different nozzles and associated usage parameters such as the type of water used and the pressure used. The aim is to select the best nozzle with the associated parameters for producing large-diameter droplets and therefore more realistic fog. 展开更多
关键词 FOG Physical Simulation droplets Size Distribution Meteorological Optical Range
下载PDF
Advancements in Barrett's esophagus detection:The role of artificial intelligence and its implications
13
作者 Sara Massironi 《World Journal of Gastroenterology》 SCIE CAS 2024年第11期1494-1496,共3页
Artificial intelligence(AI)is making significant strides in revolutionizing the detection of Barrett's esophagus(BE),a precursor to esophageal adenocarcinoma.In the research article by Tsai et al,researchers utili... Artificial intelligence(AI)is making significant strides in revolutionizing the detection of Barrett's esophagus(BE),a precursor to esophageal adenocarcinoma.In the research article by Tsai et al,researchers utilized endoscopic images to train an AI model,challenging the traditional distinction between endoscopic and histological BE.This approach yielded remarkable results,with the AI system achieving an accuracy of 94.37%,sensitivity of 94.29%,and specificity of 94.44%.The study's extensive dataset enhances the AI model's practicality,offering valuable support to endoscopists by minimizing unnecessary biopsies.However,questions about the applicability to different endoscopic systems remain.The study underscores the potential of AI in BE detection while highlighting the need for further research to assess its adaptability to diverse clinical settings. 展开更多
关键词 Barrett's esophagus Artificial intelligence Endoscopic images Artificial intelligence model Early cancer detection ENDOSCOPY
下载PDF
Similarity evaluation model for the internal defect detection of strip steel
14
作者 ZHANG Yalin WANG Yaojie WANG Xuemin 《Baosteel Technical Research》 CAS 2024年第1期8-13,共6页
An internal defect meter is an instrument to detect the internal inclusion defects of cold-rolled strip steel.The detection accuracy of the equipment can be evaluated based on the similarity of the multiple detection ... An internal defect meter is an instrument to detect the internal inclusion defects of cold-rolled strip steel.The detection accuracy of the equipment can be evaluated based on the similarity of the multiple detection data obtained for the same steel coil.Based on the cosine similarity model and eigenvalue matrix model,a comprehensive evaluation method to calculate the weighted average of similarity is proposed.Results show that the new method is consistent with and can even replace artificial evaluation to realize the automatic evaluation of strip defect detection results. 展开更多
关键词 internal defect INCLUSION similarity evaluation model REPEATABILITY detection equipment strip steel
下载PDF
Discussion on the application prospect of the transient electromagnetic method based on the dual launcher and mine advanced detection
15
作者 Zhen Yang Huizhou Liu +5 位作者 Shengqing Wang Yu Cao Ya Dong Chenghu Niu Weiwen Song Guoxin Xie 《World Journal of Condensed Matter Physics》 CAS 2024年第1期21-33,共13页
The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is... The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is rarely reported in the detection of pipelines in urban geophysical exploration and the application of coal mines. Based on this, this paper realizes the equivalent anti-magnetic flux transient electromagnetic method based on the dual launcher. The suppression effect of this method on the blind area is analyzed by physical simulation. And the detection experiment of underground pipelines is carried out outdoors. The results show that the dual launcher can significantly reduce the turn-off time, thereby effectively reducing the impact of the blind area on the detection results, and the pipeline detection results verify the device’s effectiveness. Finally, based on the ground experimental results, the application prospect of mine advanced detection is discussed. Compared with other detection fields, the formation of blind areas is mainly caused by the equipment. If the dual launcher can be used to reduce the blind area, the accuracy of advanced detection can be improved more effectively. The above research results are of great significance for improving the detection accuracy of the underground transient electromagnetic method. 展开更多
关键词 A Dual Launcher Physical Simulation Transient Electromagnetic Method Mine Geophysical Prospecting detection Blind Area Application Prospect
下载PDF
Exploring the Role of Serum Cystatin C in Early Detection of Acute Kidney Injury among On-Pump Cardiac Surgery Patients: A Single-Center Investigation in Bangladesh
16
作者 Md. Ahaduzzaman Md. Abir Tazim Chowdhury +8 位作者 Munama Magdum Md. Saiful Islam Khan Satyajit Sharma Monoj Tiwari Md. Abul Bashar Maruf Md. Alauddin Omar Sadeque Khan Md. Mostafizur Rahman Mirza Md. Nazmus Saquib 《World Journal of Cardiovascular Diseases》 CAS 2024年第6期363-373,共11页
Background: Acute Kidney Injury (AKI) stands as a prominent postoperative complication in on-pump cardiac surgery, with repercussions on morbidity, mortality, and hospitalization duration. Current diagnostic criteria ... Background: Acute Kidney Injury (AKI) stands as a prominent postoperative complication in on-pump cardiac surgery, with repercussions on morbidity, mortality, and hospitalization duration. Current diagnostic criteria relying on serum creatinine levels exhibit a delayed identification of AKI, prompting an exploration of alternative biomarkers. Aims and Objectives: This study is designed to overcome diagnostic constraints and explore the viability of serum Cystatin C as an early predictor of Acute Kidney Injury (AKI) in individuals undergoing on-pump cardiac surgery. The investigation aims to establish the relationship between serum Cystatin C levels and the onset of AKI in patients subjected to on-pump cardiac surgery. Primary objectives involve the assessment of the diagnostic effectiveness of serum Cystatin C, its comparison with serum creatinine, and the exploration of its potential for the early identification and treatment of AKI. Methodology: Conducted as a single-center study at the cardiac surgery department of BSMMU in Bangladesh from September 2020 to August 2022, a comparative cross-sectional analysis involved 31 participants categorized into No AKI and AKI groups based on Kidney Disease: Improving Global Outcomes (KDIGO) criteria. Data collection encompassed preoperative, post-CBP (cardiopulmonary bypass) conclusion at 2 hours, postoperative day 1, and postoperative day 2 intervals. Statistical analyses included Chi-squared tests, independent Student’s t-tests, and one-sample t-tests. Significance was set at P Results: The study revealed no significant differences in baseline characteristics between the No AKI and AKI groups, except for CPB time and cross-clamp time. Serum Cystatin C levels in the AKI group exhibited statistical significance at various time points, highlighting its potential as an early detector. Conversely, Serum Creatinine levels in the AKI group showed no statistical significance. The Receiver Operating Characteristic (ROC) curve analysis further supported the efficacy of serum Cystatin C, with an Area under the ROC Curve of 0.864 and a cut-off value of 0.55 (p Conclusion: This study supports the superior utility of serum Cystatin C as an early detector of AKI in on-pump cardiac surgery patients compared to serum creatinine. Its ability to identify AKI several hours earlier may contribute to reduced morbidity, mortality, and healthcare costs. The findings underscore the significance of exploring novel biomarkers for improved post-cardiac surgery renal function assessment. 展开更多
关键词 Acute Kidney Injury (AKI) On-Pump Cardiac Surgery Serum Cystatin C Serum Creatinine Diagnostic Biomarkers Early detection Cardiopulmonary Bypass Single-Center Study BANGLADESH
下载PDF
Colorectal cancer screening:The value of early detection and modern challenges
17
作者 Jian Li Zhi-Peng Li +1 位作者 Wen-Jie Ruan Wei Wang 《World Journal of Gastroenterology》 SCIE CAS 2024年第20期2726-2730,共5页
The screening of colorectal cancer(CRC)is pivotal for both the prevention and treatment of this disease,significantly improving early-stage tumor detection rates.This advancement not only boosts survival rates and qua... The screening of colorectal cancer(CRC)is pivotal for both the prevention and treatment of this disease,significantly improving early-stage tumor detection rates.This advancement not only boosts survival rates and quality of life for patients but also reduces the costs associated with treatment.However,the adoption of CRC screening methods faces numerous challenges,including the technical limitations of both noninvasive and invasive methods in terms of sensitivity and specificity.Moreover,socioeconomic factors such as regional disparities,economic conditions,and varying levels of awareness affect screening uptake.The coronavirus disease 2019 pandemic further intensified these challenges,leading to reduced screening participation and increased waiting periods.Additionally,the growing prevalence of early-onset CRC necessitates innovative screening approaches.In response,research into new methodologies,including artificial intelligence-based systems,aims to improve the precision and accessibility of screening.Proactive measures by governments and health organizations to enhance CRC screening efforts are underway,including increased advocacy,improved service delivery,and international cooperation.The role of technological innovation and global health collaboration in advancing CRC screening is undeniable.Technologies such as artificial intelligence and gene sequencing are set to revolutionize CRC screening,making a significant impact on the fight against this disease.Given the rise in early-onset CRC,it is crucial for screening strategies to continually evolve,ensuring their effectiveness and applicability. 展开更多
关键词 Colorectal cancer Early detection Economic implications Noninvasive tests Quality of life Survival rates therapeutic modalities Technical challenges
下载PDF
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
18
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon 《Communications and Network》 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System Distributed Denial of Service (DDoS) Attack Intrusion detection and Prevention Systems detection Mitigation and Stealthwatch
下载PDF
The Effects of Competence and Auditor Training on Fraud Detection Within Multinational Companies in Sub-Saharan Africa
19
作者 Ivan Djossa Tchokoté Joëlle Tsobze Tiomeguim 《Journal of Modern Accounting and Auditing》 2024年第1期1-13,共13页
The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach ... The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa. 展开更多
关键词 FRAUD legal audit fraud detection MULTINATIONALS Sub-Saharan Africa
下载PDF
Intelligent Detection and Identification of Attacks in IoT Networks Based on the Combination of DNN and LSTM Methods with a Set of Classifiers
20
作者 Brou Médard Kouassi Vincent Monsan Kablan Jérôme Adou 《Open Journal of Applied Sciences》 2024年第8期2296-2319,共24页
Internet of Things (IoT) networks present unique cybersecurity challenges due to their distributed and heterogeneous nature. Our study explores the effectiveness of two types of deep learning models, long-term memory ... Internet of Things (IoT) networks present unique cybersecurity challenges due to their distributed and heterogeneous nature. Our study explores the effectiveness of two types of deep learning models, long-term memory neural networks (LSTMs) and deep neural networks (DNNs), for detecting attacks in IoT networks. We evaluated the performance of six hybrid models combining LSTM or DNN feature extractors with classifiers such as Random Forest, k-Nearest Neighbors and XGBoost. The LSTM-RF and LSTM-XGBoost models showed lower accuracy variability in the face of different types of attack, indicating greater robustness. The LSTM-RF and LSTM-XGBoost models show variability in results, with accuracies between 58% and 99% for attack types, while LSTM-KNN has higher but more variable accuracies, between 72% and 99%. The DNN-RF and DNN-XGBoost models show lower variability in their results, with accuracies between 59% and 99%, while DNN-KNN has higher but more variable accuracies, between 71% and 99%. LSTM-based models are proving to be more effective for detecting attacks in IoT networks, particularly for sophisticated attacks. However, the final choice of model depends on the constraints of the application, taking into account a trade-off between accuracy and complexity. 展开更多
关键词 Internet of Things Machine Learning Attack detection Jamming Deep Learning
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部