The Unintentional Insider Threat (UIT) concept highlights that insider threats might not always stem from malicious intent and can occur across various domains. This research examines how individuals with medical or p...The Unintentional Insider Threat (UIT) concept highlights that insider threats might not always stem from malicious intent and can occur across various domains. This research examines how individuals with medical or psychological issues might unintentionally become insider threats due to their perception of being targeted. Insights from the survey A Survey of Unintentional Medical Insider Threat Category indicate that such perceptions can be linked to underlying health conditions. The study Emotion Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection reveals that anger is a common emotion among these individuals. The findings suggest that UITs are often linked to medical or psychological issues, with anger being prevalent. To mitigate these risks, it is recommended that Insider Threat programs integrate expertise from medicine, psychology, and cybersecurity. Additionally, handwriting analysis is proposed as a potential tool for detecting insider threats, reflecting the evolving nature of threat assessment methodologies.展开更多
In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developi...In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developing detection and treatment methods should continue.The diagnostic path typically begins with learning the medical history of a patient;this is followed by basic blood tests and imaging tests to indicate where cancer may be located to schedule a needle biopsy.Prompt initiation of diagnosis is crucial since delayed cancer detection entails higher costs of treatment and hospitalization.Thus,there is a need for novel cancer detection methods such as liquid biopsy,elastography,synthetic biosensors,fluorescence imaging,and reflectance confocal microscopy.Conventional therapeutic methods,although still common in clinical practice,pose many limitations and are unsatisfactory.Nowadays,there is a dynamic advancement of clinical research and the development of more precise and effective methods such as oncolytic virotherapy,exosome-based therapy,nanotechnology,dendritic cells,chimeric antigen receptors,immune checkpoint inhibitors,natural product-based therapy,tumor-treating fields,and photodynamic therapy.The present paper compares available data on conventional and modern methods of cancer detection and therapy to facilitate an understanding of this rapidly advancing field and its future directions.As evidenced,modern methods are not without drawbacks;there is still a need to develop new detection strategies and therapeutic approaches to improve sensitivity,specificity,safety,and efficacy.Nevertheless,an appropriate route has been taken,as confirmed by the approval of some modern methods by the Food and Drug Administration.展开更多
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ...As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.展开更多
Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-s...Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-satellite SERS aptasensor was constructed by combining aptamer-decorated Fe_(3)O_(4)@Au MNPs(as the recognize probe for histamine)and complementary DNA-modified silver nanoparticles carrying 4-mercaptobenzonitrile(4-MBN)(Ag@4-MBN@Ag-c-DNA)as the SERS signal probe for the indirect detection of histamine.Under an applied magnetic field in the absence of histamine,the assembly gave an intense Raman signal at“Raman biological-silent”region due to 4-MBN.In the presence of histamine,the Ag@4-MBN@Ag-c-DNA SERS-tag was released from the Fe_(3)O_(4)@Au MNPs,thus decreasing the SERS signal.Under optimal conditions,an ultra-low limit of detection of 0.65×10^(-3)ng/mL and a linear range 10^(-2)-10^5 ng/mL on the SERS aptasensor were obtained.The histamine content in four food samples were analyzed using the SERS aptasensor,with the results consistent with those determined by high performance liquid chromatography.The present work highlights the merits of indirect strategies for the ultrasensitive and highly selective SERS detection of small biological molecules in complex matrices.展开更多
BACKGROUND Deep learning provides an efficient automatic image recognition method for small bowel(SB)capsule endoscopy(CE)that can assist physicians in diagnosis.However,the existing deep learning models present some ...BACKGROUND Deep learning provides an efficient automatic image recognition method for small bowel(SB)capsule endoscopy(CE)that can assist physicians in diagnosis.However,the existing deep learning models present some unresolved challenges.AIM To propose a novel and effective classification and detection model to automatically identify various SB lesions and their bleeding risks,and label the lesions accurately so as to enhance the diagnostic efficiency of physicians and the ability to identify high-risk bleeding groups.METHODS The proposed model represents a two-stage method that combined image classification with object detection.First,we utilized the improved ResNet-50 classification model to classify endoscopic images into SB lesion images,normal SB mucosa images,and invalid images.Then,the improved YOLO-V5 detection model was utilized to detect the type of lesion and its risk of bleeding,and the location of the lesion was marked.We constructed training and testing sets and compared model-assisted reading with physician reading.RESULTS The accuracy of the model constructed in this study reached 98.96%,which was higher than the accuracy of other systems using only a single module.The sensitivity,specificity,and accuracy of the model-assisted reading detection of all images were 99.17%,99.92%,and 99.86%,which were significantly higher than those of the endoscopists’diagnoses.The image processing time of the model was 48 ms/image,and the image processing time of the physicians was 0.40±0.24 s/image(P<0.001).CONCLUSION The deep learning model of image classification combined with object detection exhibits a satisfactory diagnostic effect on a variety of SB lesions and their bleeding risks in CE images,which enhances the diagnostic efficiency of physicians and improves the ability of physicians to identify high-risk bleeding groups.展开更多
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP...Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field.展开更多
The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method in...The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos.展开更多
We demonstrate the photon-number resolution(PNR)capability of a 1.25 GHz gated InGaAs single-photon avalanche photodiode(APD)that is equipped with a simple,low-distortion ultra-narrowband interference circuit for the ...We demonstrate the photon-number resolution(PNR)capability of a 1.25 GHz gated InGaAs single-photon avalanche photodiode(APD)that is equipped with a simple,low-distortion ultra-narrowband interference circuit for the rejection of its background capacitive response.Through discriminating the avalanche current amplitude,we are able to resolve up to four detected photons in a single detection gate with a detection efficiency as high as 45%.The PNR capability is limited by the avalanche current saturation,and can be increased to five photons at a lower detection efficiency of 34%.The PNR capability,combined with high efficiency and low noise,will find applications in quantum information processing technique based on photonic qubits.展开更多
The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the targe...The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the target crosses the baseline is constructed.Then,the detection method of the for-ward-scatter signal based on the Rényi entropy of time-fre-quency distribution is proposed and the detection performance with different time-frequency distributions is compared.Simula-tion results show that the method based on the smooth pseudo Wigner-Ville distribution(SPWVD)can achieve the best perfor-mance.Next,combined with the geometry of FSR,the influence on detection performance of the relative distance between the target and the baseline is analyzed.Finally,the proposed method is validated by the anechoic chamber measurements and the results show that the detection ability has a 10 dB improvement compared with the common constant false alarm rate(CFAR)detection.展开更多
We have found through calculations that the differences between the closest supposed prime numbers other than 2 and 3 defined in the articles are: 2;4: and 6. For those whose difference is equal to 6, we showed their ...We have found through calculations that the differences between the closest supposed prime numbers other than 2 and 3 defined in the articles are: 2;4: and 6. For those whose difference is equal to 6, we showed their origin then we classified them into two categories according to their classes, we showed in which context two prime numbers which differ from 6 are called sexy and in what context they are said real sexy prime. For those whose difference is equal to 4, we showed their origin then we showed that two prime numbers which differ from 4, that is to say two cousin prime numbers, are successive. We made an observation on the supposed prime numbers then we established two pairs of equations from this observation and deduced the origin of the Mersenne number and that of the Fermat number.展开更多
The application of the Euclidean division theorem for the positive integers allowed us to establish a set which contains all the prime numbers and this set we called it set of supposedly prime numbers and we noted it ...The application of the Euclidean division theorem for the positive integers allowed us to establish a set which contains all the prime numbers and this set we called it set of supposedly prime numbers and we noted it E<sub>sp</sub>. We subsequently established from the previous set the set of non-prime numbers (the set of numbers belonging to this set and which are not prime) denoted E<sub>np</sub>. We then extracted from the set of supposedly prime numbers the numbers which are not prime and the set of remaining number constitutes the set of prime numbers denoted E<sub>p</sub>. We have deduced from the previous set, the set of prime numbers between two natural numbers. We have explained during our demonstrations the origin of the twin prime numbers and the structure of the chain of prime numbers.展开更多
An elementary formula to know the number of primes in the interval (x, 2x) close to the exact figure for a fixed x is given here. A new elementary equation is derived (a relation between prime numbers and composite nu...An elementary formula to know the number of primes in the interval (x, 2x) close to the exact figure for a fixed x is given here. A new elementary equation is derived (a relation between prime numbers and composite numbers distributed in the interval [1, 2x]). An elementary method to know the number of primes in a given magnitude is suitably placed in the form of a general formula, and we have proved it. The general formula is applied to the terms of the equation, and a tactical simplification of the terms gives rise to an expression whose verification envisages scope for its further studies.展开更多
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology...The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research.展开更多
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent ...The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices.Anomaly detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual activities.Machine learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device behaviour.In addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to botnets.Various ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT systems.To overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)technique.The GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT environment.For data preprocessing,the min-max data normalization approach is primarily used.The GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature subsets.Moreover,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet detection.Finally,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM method.The experimental validation of the GTODL-BADC technique can be tested on a benchmark dataset.The simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.展开更多
BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevent...BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevention.Quantum dot-encoded microspheres have been widely used in immunodetection.The integration of quantum dot-encoded microspheres with flow cytometry is a well-established technique that enables rapid analysis.Thus,establishing a multiplex detection method for influenza A and B virus antigens based on flow cytometry quantum dot microspheres will help in disease diagnosis.AIM To establish a codetection method of influenza A and B virus antigens based on flow cytometry quantum dot-encoded microsphere technology,which forms the foundation for the assays of multiple respiratory virus biomarkers.METHODS Different quantum dot-encoded microspheres were used to couple the monoclonal antibodies against influenza A and B.The known influenza A and B antigens were detected both separately and simultaneously on a flow cytometer,and the detection conditions were optimized to establish the influenza A and B antigen codetection method,which was utilized for their detection in clinical samples.The results were compared with the fluorescence quantitative polymerase chain reaction(PCR)method to validate the clinical performance of this method.RESULTS The limits of detection of this method were 26.1 and 10.7 pg/mL for influenza A and B antigens,respectively,which both ranged from 15.6 to 250000 pg/mL.In the clinical sample evaluation,the proposed method well correlated with the fluorescent quantitative PCR method,with positive,negative,and overall compliance rates of 57.4%,100%,and 71.6%,respectively.CONCLUSION A multiplex assay for quantitative detection of influenza A and B virus antigens has been established,which is characterized by high sensitivity,good specificity,and a wide detection range and is promising for clinical applications.展开更多
Some haplotypes of the sucrose synthase gene TaSus1 are associated with thousand-grain weight(TGW)in wheat(Triticum aestivum L.).However,no mutations have been identified within the gene to test this association.The e...Some haplotypes of the sucrose synthase gene TaSus1 are associated with thousand-grain weight(TGW)in wheat(Triticum aestivum L.).However,no mutations have been identified within the gene to test this association.The effects of TaSus1 on grain number per spike(GNS)also are largely unknown.Our previous genome-wide association study identified TaSus-A1 as a candidate gene controlling fertile spikelet number per spike(FSN).In the present study,we generated two independent mutants for the three TaSus1 homoeologs by CRISPR/Cas9-mediated genome editing.The triple mutants displayed lower FSN,GNS,grain number per spikelet(GNST),and TGW than wild-type plants.In 306 hexaploid wheat accessions,two single-nucleotide polymorphisms in TaSus-A1 contributed differently to GNS.Introgression of the two alleles into a wheat genetic background confirmed their effects.The alleles differed in geographical distribution among the accessions.展开更多
Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type O...Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type OXA-48 (Ambler class D) have been identified in Dakar. The aim of this study was to evaluate the phenotypic detection of OXA-48 CPE using a temocillin disc (30 μg). Methodology: A retrospective study was carried out at Medical Biology Laboratory of Pasteur Institute in Dakar on Ertapenem-Resistant Enterobacterales (ERE) strains isolated from 2015 to 2017. These strains were then tested with a 30 μg temocillin disc. Any strain resistant to temocillin (inhibition diameter Results: Forty-one ERE isolated during the study period were tested, of which 34 (82.9%) were OXA-48 based on phenotypic detection using temocillin disc and confirmed by PCR (100%). OXA-48 CPE strains detected were composed of Klebsiella pneumoniae (n = 14;41.2%), Enterobacter cloacae (n = 8;23.5%), Escherichia coli (n = 7, 20.5%), Citrobacter freundii (n = 3;8.8%), Cronobacter sakazakii (n = 1;3%) and Morganella morganii (n = 1;3%). Conclusion: Temocillin resistance has a good positive predictive value for detecting OXA-48 CPE by phenotypic method, confirmed by PCR. Temocillin is therefore a good marker for detection of OXA-48 CPE except Hafnia alvei.展开更多
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De...The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.展开更多
Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,maki...Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production.展开更多
In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower s...In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection.展开更多
文摘The Unintentional Insider Threat (UIT) concept highlights that insider threats might not always stem from malicious intent and can occur across various domains. This research examines how individuals with medical or psychological issues might unintentionally become insider threats due to their perception of being targeted. Insights from the survey A Survey of Unintentional Medical Insider Threat Category indicate that such perceptions can be linked to underlying health conditions. The study Emotion Analysis Based on Belief of Targeted Individual Supporting Insider Threat Detection reveals that anger is a common emotion among these individuals. The findings suggest that UITs are often linked to medical or psychological issues, with anger being prevalent. To mitigate these risks, it is recommended that Insider Threat programs integrate expertise from medicine, psychology, and cybersecurity. Additionally, handwriting analysis is proposed as a potential tool for detecting insider threats, reflecting the evolving nature of threat assessment methodologies.
文摘In accordance with the World Health Organization data,cancer remains at the forefront of fatal diseases.An upward trend in cancer incidence and mortality has been observed globally,emphasizing that efforts in developing detection and treatment methods should continue.The diagnostic path typically begins with learning the medical history of a patient;this is followed by basic blood tests and imaging tests to indicate where cancer may be located to schedule a needle biopsy.Prompt initiation of diagnosis is crucial since delayed cancer detection entails higher costs of treatment and hospitalization.Thus,there is a need for novel cancer detection methods such as liquid biopsy,elastography,synthetic biosensors,fluorescence imaging,and reflectance confocal microscopy.Conventional therapeutic methods,although still common in clinical practice,pose many limitations and are unsatisfactory.Nowadays,there is a dynamic advancement of clinical research and the development of more precise and effective methods such as oncolytic virotherapy,exosome-based therapy,nanotechnology,dendritic cells,chimeric antigen receptors,immune checkpoint inhibitors,natural product-based therapy,tumor-treating fields,and photodynamic therapy.The present paper compares available data on conventional and modern methods of cancer detection and therapy to facilitate an understanding of this rapidly advancing field and its future directions.As evidenced,modern methods are not without drawbacks;there is still a need to develop new detection strategies and therapeutic approaches to improve sensitivity,specificity,safety,and efficacy.Nevertheless,an appropriate route has been taken,as confirmed by the approval of some modern methods by the Food and Drug Administration.
基金supported by the Meteorological Soft Science Project(Grant No.2023ZZXM29)the Natural Science Fund Project of Tianjin,China(Grant No.21JCYBJC00740)the Key Research and Development-Social Development Program of Jiangsu Province,China(Grant No.BE2021685).
文摘As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.
基金financially supported by the National Natural Science Foundation of China(31972149)funding support from the MacDiarmid Institute for Advanced Materials and Nanotechnologythe Dodd-Walls Centre for Photonic and Quantum Technologies。
文摘Herein,a novel interference-free surface-enhanced Raman spectroscopy(SERS)strategy based on magnetic nanoparticles(MNPs)and aptamer-driven assemblies was proposed for the ultrasensitive detection of histamine.A core-satellite SERS aptasensor was constructed by combining aptamer-decorated Fe_(3)O_(4)@Au MNPs(as the recognize probe for histamine)and complementary DNA-modified silver nanoparticles carrying 4-mercaptobenzonitrile(4-MBN)(Ag@4-MBN@Ag-c-DNA)as the SERS signal probe for the indirect detection of histamine.Under an applied magnetic field in the absence of histamine,the assembly gave an intense Raman signal at“Raman biological-silent”region due to 4-MBN.In the presence of histamine,the Ag@4-MBN@Ag-c-DNA SERS-tag was released from the Fe_(3)O_(4)@Au MNPs,thus decreasing the SERS signal.Under optimal conditions,an ultra-low limit of detection of 0.65×10^(-3)ng/mL and a linear range 10^(-2)-10^5 ng/mL on the SERS aptasensor were obtained.The histamine content in four food samples were analyzed using the SERS aptasensor,with the results consistent with those determined by high performance liquid chromatography.The present work highlights the merits of indirect strategies for the ultrasensitive and highly selective SERS detection of small biological molecules in complex matrices.
基金The Shanxi Provincial Administration of Traditional Chinese Medicine,No.2023ZYYDA2005.
文摘BACKGROUND Deep learning provides an efficient automatic image recognition method for small bowel(SB)capsule endoscopy(CE)that can assist physicians in diagnosis.However,the existing deep learning models present some unresolved challenges.AIM To propose a novel and effective classification and detection model to automatically identify various SB lesions and their bleeding risks,and label the lesions accurately so as to enhance the diagnostic efficiency of physicians and the ability to identify high-risk bleeding groups.METHODS The proposed model represents a two-stage method that combined image classification with object detection.First,we utilized the improved ResNet-50 classification model to classify endoscopic images into SB lesion images,normal SB mucosa images,and invalid images.Then,the improved YOLO-V5 detection model was utilized to detect the type of lesion and its risk of bleeding,and the location of the lesion was marked.We constructed training and testing sets and compared model-assisted reading with physician reading.RESULTS The accuracy of the model constructed in this study reached 98.96%,which was higher than the accuracy of other systems using only a single module.The sensitivity,specificity,and accuracy of the model-assisted reading detection of all images were 99.17%,99.92%,and 99.86%,which were significantly higher than those of the endoscopists’diagnoses.The image processing time of the model was 48 ms/image,and the image processing time of the physicians was 0.40±0.24 s/image(P<0.001).CONCLUSION The deep learning model of image classification combined with object detection exhibits a satisfactory diagnostic effect on a variety of SB lesions and their bleeding risks in CE images,which enhances the diagnostic efficiency of physicians and improves the ability of physicians to identify high-risk bleeding groups.
基金supported by the Scientific and Innovative Action Plan of Shanghai(21N31900800)Shanghai Rising-Star Program(23QB1403500)+4 种基金the Shanghai Sailing Program(20YF1443000)Shanghai Science and Technology Commission,the Belt and Road Project(20310750500)Talent Project of SAAS(2023-2025)Runup Plan of SAAS(ZP22211)the SAAS Program for Excellent Research Team(2022(B-16))。
文摘Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field.
基金Science and Technology Funds from the Liaoning Education Department(Serial Number:LJKZ0104).
文摘The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos.
基金supported by the National Natural Science Foundation of China(62250710162 and 12274406)the National Key Research and Development Program of China(2022YFA1405100).
文摘We demonstrate the photon-number resolution(PNR)capability of a 1.25 GHz gated InGaAs single-photon avalanche photodiode(APD)that is equipped with a simple,low-distortion ultra-narrowband interference circuit for the rejection of its background capacitive response.Through discriminating the avalanche current amplitude,we are able to resolve up to four detected photons in a single detection gate with a detection efficiency as high as 45%.The PNR capability is limited by the avalanche current saturation,and can be increased to five photons at a lower detection efficiency of 34%.The PNR capability,combined with high efficiency and low noise,will find applications in quantum information processing technique based on photonic qubits.
基金This work was supported by the National Natural Science Foundation of China(62071475,61890541,62171447).
文摘The application scope of the forward scatter radar(FSR)based on the Global Navigation Satellite System(GNSS)can be expanded by improving the detection capability.Firstly,the forward-scatter signal model when the target crosses the baseline is constructed.Then,the detection method of the for-ward-scatter signal based on the Rényi entropy of time-fre-quency distribution is proposed and the detection performance with different time-frequency distributions is compared.Simula-tion results show that the method based on the smooth pseudo Wigner-Ville distribution(SPWVD)can achieve the best perfor-mance.Next,combined with the geometry of FSR,the influence on detection performance of the relative distance between the target and the baseline is analyzed.Finally,the proposed method is validated by the anechoic chamber measurements and the results show that the detection ability has a 10 dB improvement compared with the common constant false alarm rate(CFAR)detection.
文摘We have found through calculations that the differences between the closest supposed prime numbers other than 2 and 3 defined in the articles are: 2;4: and 6. For those whose difference is equal to 6, we showed their origin then we classified them into two categories according to their classes, we showed in which context two prime numbers which differ from 6 are called sexy and in what context they are said real sexy prime. For those whose difference is equal to 4, we showed their origin then we showed that two prime numbers which differ from 4, that is to say two cousin prime numbers, are successive. We made an observation on the supposed prime numbers then we established two pairs of equations from this observation and deduced the origin of the Mersenne number and that of the Fermat number.
文摘The application of the Euclidean division theorem for the positive integers allowed us to establish a set which contains all the prime numbers and this set we called it set of supposedly prime numbers and we noted it E<sub>sp</sub>. We subsequently established from the previous set the set of non-prime numbers (the set of numbers belonging to this set and which are not prime) denoted E<sub>np</sub>. We then extracted from the set of supposedly prime numbers the numbers which are not prime and the set of remaining number constitutes the set of prime numbers denoted E<sub>p</sub>. We have deduced from the previous set, the set of prime numbers between two natural numbers. We have explained during our demonstrations the origin of the twin prime numbers and the structure of the chain of prime numbers.
文摘An elementary formula to know the number of primes in the interval (x, 2x) close to the exact figure for a fixed x is given here. A new elementary equation is derived (a relation between prime numbers and composite numbers distributed in the interval [1, 2x]). An elementary method to know the number of primes in a given magnitude is suitably placed in the form of a general formula, and we have proved it. The general formula is applied to the terms of the equation, and a tactical simplification of the terms gives rise to an expression whose verification envisages scope for its further studies.
基金supported by the Stable-Support Scientific Project of the China Research Institute of Radio-wave Propagation(Grant No.A13XXXXWXX)the National Natural Science Foundation of China(Grant Nos.42174210,4207202,and 42188101)the Strategic Pioneer Program on Space Science,Chinese Academy of Sciences(Grant No.XDA15014800)。
文摘The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research.
文摘The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS attacks.The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices.Anomaly detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual activities.Machine learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device behaviour.In addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to botnets.Various ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT systems.To overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)technique.The GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT environment.For data preprocessing,the min-max data normalization approach is primarily used.The GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature subsets.Moreover,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet detection.Finally,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM method.The experimental validation of the GTODL-BADC technique can be tested on a benchmark dataset.The simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
基金Shenzhen Guangming District Soft Science Research Project,No.2021R01097。
文摘BACKGROUND Influenza A and B virus detection is pivotal in epidemiological surveillance and disease management.Rapid and accurate diagnostic techniques are crucial for timely clinical intervention and outbreak prevention.Quantum dot-encoded microspheres have been widely used in immunodetection.The integration of quantum dot-encoded microspheres with flow cytometry is a well-established technique that enables rapid analysis.Thus,establishing a multiplex detection method for influenza A and B virus antigens based on flow cytometry quantum dot microspheres will help in disease diagnosis.AIM To establish a codetection method of influenza A and B virus antigens based on flow cytometry quantum dot-encoded microsphere technology,which forms the foundation for the assays of multiple respiratory virus biomarkers.METHODS Different quantum dot-encoded microspheres were used to couple the monoclonal antibodies against influenza A and B.The known influenza A and B antigens were detected both separately and simultaneously on a flow cytometer,and the detection conditions were optimized to establish the influenza A and B antigen codetection method,which was utilized for their detection in clinical samples.The results were compared with the fluorescence quantitative polymerase chain reaction(PCR)method to validate the clinical performance of this method.RESULTS The limits of detection of this method were 26.1 and 10.7 pg/mL for influenza A and B antigens,respectively,which both ranged from 15.6 to 250000 pg/mL.In the clinical sample evaluation,the proposed method well correlated with the fluorescent quantitative PCR method,with positive,negative,and overall compliance rates of 57.4%,100%,and 71.6%,respectively.CONCLUSION A multiplex assay for quantitative detection of influenza A and B virus antigens has been established,which is characterized by high sensitivity,good specificity,and a wide detection range and is promising for clinical applications.
基金This work was supported by the Strategic Priority Research Program of Chinese Academy of Sciences(XDA24010104-2).
文摘Some haplotypes of the sucrose synthase gene TaSus1 are associated with thousand-grain weight(TGW)in wheat(Triticum aestivum L.).However,no mutations have been identified within the gene to test this association.The effects of TaSus1 on grain number per spike(GNS)also are largely unknown.Our previous genome-wide association study identified TaSus-A1 as a candidate gene controlling fertile spikelet number per spike(FSN).In the present study,we generated two independent mutants for the three TaSus1 homoeologs by CRISPR/Cas9-mediated genome editing.The triple mutants displayed lower FSN,GNS,grain number per spikelet(GNST),and TGW than wild-type plants.In 306 hexaploid wheat accessions,two single-nucleotide polymorphisms in TaSus-A1 contributed differently to GNS.Introgression of the two alleles into a wheat genetic background confirmed their effects.The alleles differed in geographical distribution among the accessions.
文摘Background: Nowadays, emergence of Carbapenemase-Producing Enterobacterales (CPE) throughout the world has become a public health problem, especially in countries with limited resources. In recent years, CPE of type OXA-48 (Ambler class D) have been identified in Dakar. The aim of this study was to evaluate the phenotypic detection of OXA-48 CPE using a temocillin disc (30 μg). Methodology: A retrospective study was carried out at Medical Biology Laboratory of Pasteur Institute in Dakar on Ertapenem-Resistant Enterobacterales (ERE) strains isolated from 2015 to 2017. These strains were then tested with a 30 μg temocillin disc. Any strain resistant to temocillin (inhibition diameter Results: Forty-one ERE isolated during the study period were tested, of which 34 (82.9%) were OXA-48 based on phenotypic detection using temocillin disc and confirmed by PCR (100%). OXA-48 CPE strains detected were composed of Klebsiella pneumoniae (n = 14;41.2%), Enterobacter cloacae (n = 8;23.5%), Escherichia coli (n = 7, 20.5%), Citrobacter freundii (n = 3;8.8%), Cronobacter sakazakii (n = 1;3%) and Morganella morganii (n = 1;3%). Conclusion: Temocillin resistance has a good positive predictive value for detecting OXA-48 CPE by phenotypic method, confirmed by PCR. Temocillin is therefore a good marker for detection of OXA-48 CPE except Hafnia alvei.
基金supported by the National Key Research and Development Plan in China(Grant No.2020YFB1005500)。
文摘The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.
基金National Key Research and Development Program of China(Nos.2022YFB4700600 and 2022YFB4700605)National Natural Science Foundation of China(Nos.61771123 and 62171116)+1 种基金Fundamental Research Funds for the Central UniversitiesGraduate Student Innovation Fund of Donghua University,China(No.CUSF-DH-D-2022044)。
文摘Defect detection is vital in the nonwoven material industry,ensuring surface quality before producing finished products.Recently,deep learning and computer vision advancements have revolutionized defect detection,making it a widely adopted approach in various industrial fields.This paper mainly studied the defect detection method for nonwoven materials based on the improved Nano Det-Plus model.Using the constructed samples of defects in nonwoven materials as the research objects,transfer learning experiments were conducted based on the Nano DetPlus object detection framework.Within this framework,the Backbone,path aggregation feature pyramid network(PAFPN)and Head network models were compared and trained through a process of freezing,with the ultimate aim of bolstering the model's feature extraction abilities and elevating detection accuracy.The half-precision quantization method was used to optimize the model after transfer learning experiments,reducing model weights and computational complexity to improve the detection speed.Performance comparisons were conducted between the improved model and the original Nano Det-Plus model,YOLO,SSD and other common industrial defect detection algorithms,validating that the improved methods based on transfer learning and semi-precision quantization enabled the model to meet the practical requirements of industrial production.
基金the Science and Technology Project of China Southern Power Grid Company,Ltd.(031200KK52200003)the National Natural Science Foundation of China(Nos.62371253,52278119).
文摘In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection.