With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to mult...With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.展开更多
Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A light...Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.展开更多
Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in l...Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in low prevalence settings, where HIV rates are <0.1% of the population, false positive results are more likely. This results in apprehension in the dialysis unit as breaches in infectious disease protocols could be presumed. This is illustrated in the case report below. Case Summary: A 62-year-old male Saudi end-stage kidney disease patient secondary to DM nephropathy began dialysis a year before presentation in a hemodialysis center in Saudi Arabia. Routine screening tests done at the start of dialysis revealed negative Hepatitis C, HIV 1 and 2 screening but a positive Hepatitis B surface antigen screen. The patient went for holiday dialysis at another facility and had a routine fourth-generation HIV test done which was positive. A confirmatory HIV PCR test was negative. Conclusion: This case highlights the need for caution in interpreting highly sensitive and specific HIV screening tests in a low-prevalence setting. Routine screening beyond the national recommendation may not be necessary in low-prevalence areas.展开更多
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func...This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness.展开更多
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas...This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.展开更多
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ...With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.展开更多
This study examines whether a group of captive false killer whales(P seudorca crassidens) showed variations in the vocal rate around feeding times. The high level of motivation to express appetitive behaviors in capti...This study examines whether a group of captive false killer whales(P seudorca crassidens) showed variations in the vocal rate around feeding times. The high level of motivation to express appetitive behaviors in captive animals may lead them to respond with changes of the behavioral activities during the time prior to food deliveries which are referred to as food anticipatory activity. False killer whales at Qingdao Polar Ocean World(Qingdao, China) showed signifi cant variations of the rates of both the total sounds and sound classes(whistles, clicks, and burst pulses) around feedings. Precisely, from the Transition interval that recorded the lowest vocalization rate(3.40 s/m/d), the whales increased their acoustic emissions upon trainers' arrival(13.08 s/m/d). The high rate was maintained or intensifi ed throughout the food delivery(25.12 s/m/d), and then reduced immediately after the animals were fed(9.91 s/m/d). These changes in the false killer whales sound production rates around feeding times supports the hypothesis of the presence of a food anticipatory vocal activity. Although sound rates may not give detailed information regarding referential aspects of the animal communication it might still shed light about the arousal levels of the individuals during different social or environmental conditions. Further experiments should be performed to assess if variations of the time of feeding routines may affect the vocal activity of cetaceans in captivity as well as their welfare.展开更多
Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice f...Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.展开更多
At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,late...At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,latex agglutination test(LA),lateral flow assay(LFA)and Enzyme-linked Immunosorbent Assay,have certain limitations.Although these techniques do not often lead to false-positive results,once this result occurs in a particular group of patients(such as human immunodeficiency virus patients),it might lead to severe consequences.展开更多
Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working co...Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.展开更多
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation...The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.展开更多
Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to dete...Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.展开更多
Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients ...Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.展开更多
To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection...To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.展开更多
A recombinant inbred line (RILs) population with 157 lines derived from an inter-subspecies cross of Daguandao (japonica)/IR28 (indica) by the single seed de-scent method was used to detect quantitative trait lo...A recombinant inbred line (RILs) population with 157 lines derived from an inter-subspecies cross of Daguandao (japonica)/IR28 (indica) by the single seed de-scent method was used to detect quantitative trait loci (QTLs) conferring resistance to rice false smut caused by Ustilaginoidea virens(Cooke) Takahashi in Nanjing and Yangzhou. The disease rate index of the two parents and 157 RILs caused by rice false smut were scored and the QTLs for rice false smut resistance were detected accordingly by QTL Cartographer software. Eight QTLs control ing false smut resis-tance were detected on chromosomes 1, 2, 4, 8, 10, 11 and 12, respectively, with the phenotypic variance of 8.6%-22.5%. There were five QTLs detected in Nanjing and Yangzhou, respectively, and only two QTLs were found in both two years, the phenotypic variation was explained by individual QTL ranged from 18.0% to 18.9% for these two QTLs, and the additive effects of these two QTLs contributed to the 8.0%-14.6% decrease of disease index and therefore the disease resistance increased. The direction of the additive effects at six loci qFsr1, qFsr2, qFsr8, qFsr10a, qFsr11 and qFsr12 coincided with that predicted by phenotypes of the parents, and the IR28 al eles at these loci had positive effect against rice false smut while the negative effects were found in Daguandao al eles at qFsr4 and qFsr10b. Both qFsr10a and qFsr11 should be useful in rice breeding for resistance to rice false smut in marker-assisted selection (MAS) program.展开更多
The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilizatio...The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilization of carbon nutrients and enzyme regulation in the presence of complex nutritionalconditions. Although significant progress has been made in understanding carbon catabolite repression infungi such as Aspergillus nidulans and Magnaporthe oryzae, its role in U. virens remains unclear. Toaddress this knowledge gap, we identified UvCreA, a pivotal component of carbon catabolite repression,in U. virens. Our investigation revealed that UvCreA localized to the nucleus. Deletion of UvCreA resultedin decreased growth and pathogenicity in U. virens. Through RNA-seq analysis, it was found that theknockout of UvCreA led to the up-regulation of 514 genes and down-regulation of 640 genes. Moreover,UvCreA was found to be involved in the transcriptional regulation of pathogenic genes and genesassociated with carbon metabolism in U. virens. In summary, our findings indicated that UvCreA isimportant in fungal development, virulence, and the utilization of carbon sources through transcriptionalregulation, thus making it a critical element of carbon catabolite repression.展开更多
Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature ...Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature review of research since the discovery of rice false smut.We provide a comprehensive and,at times,critical overview of the main results and findings from related research,and propose future research directions.Firstly,we delve into the interaction between U.virens and rice,including the regulation of transcription factors,the process of U.virens infecting rice panicles,and the plant immune response caused by rice infection.Following that,we discuss the identification and characterization of mycotoxins produced by the pathogenic fungus,as well as strategies for disease management.We emphasize the importance of comprehensive agricultural prevention and control methods for the sustainable management of U.virens.This knowledge will update our understanding of the interaction between U.virens and rice plants,offering a valuable perspective for those interested in U.virens.展开更多
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnos...The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes.展开更多
False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work u...False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams.Data-driven features,however,cannot effectively capture the differences between noisy data and attack samples.As a result,slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks.To address this problem,this paper designs a deep collaborative self-attention network to achieve robust FDIA detection,in which the spatio-temporal features of cascaded FDIA attacks are fully integrated.Firstly,a high-order Chebyshev polynomials-based graph convolution module is designed to effectively aggregate the spatio information between grid nodes,and the spatial self-attention mechanism is involved to dynamically assign attention weights to each node,which guides the network to pay more attention to the node information that is conducive to FDIA detection.Furthermore,the bi-directional Long Short-Term Memory(LSTM)network is introduced to conduct time series modeling and long-term dependence analysis for power grid data and utilizes the temporal selfattention mechanism to describe the time correlation of data and assign different weights to different time steps.Our designed deep collaborative network can effectively mine subtle perturbations from spatiotemporal feature information,efficiently distinguish power grid noise from FDIA attacks,and adapt to diverse attack intensities.Extensive experiments demonstrate that our method can obtain an efficient detection performance over actual load data from New York Independent System Operator(NYISO)in IEEE 14,IEEE 39,and IEEE 118 bus systems,and outperforms state-of-the-art FDIA detection schemes in terms of detection accuracy and robustness.展开更多
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure...The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure the security of the network.Conventional intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system model.In this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot IoT.In this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant features.The proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO algorithm.This results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness estimation.As a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.展开更多
文摘With the explosive growth of false information on social media platforms, the automatic detection of multimodalfalse information has received increasing attention. Recent research has significantly contributed to multimodalinformation exchange and fusion, with many methods attempting to integrate unimodal features to generatemultimodal news representations. However, they still need to fully explore the hierarchical and complex semanticcorrelations between different modal contents, severely limiting their performance detecting multimodal falseinformation. This work proposes a two-stage detection framework for multimodal false information detection,called ASMFD, which is based on image aesthetic similarity to segment and explores the consistency andinconsistency features of images and texts. Specifically, we first use the Contrastive Language-Image Pre-training(CLIP) model to learn the relationship between text and images through label awareness and train an imageaesthetic attribute scorer using an aesthetic attribute dataset. Then, we calculate the aesthetic similarity betweenthe image and related images and use this similarity as a threshold to divide the multimodal correlation matrixinto consistency and inconsistencymatrices. Finally, the fusionmodule is designed to identify essential features fordetectingmultimodal false information. In extensive experiments on four datasets, the performance of the ASMFDis superior to state-of-the-art baseline methods.
基金This work was supported by the Natural Science Foundation of Heilongjiang Province(LH2022F049).
文摘Overlooking the issue of false alarm suppression in heterogeneous change detection leads to inferior detection per-formance.This paper proposes a method to handle false alarms in heterogeneous change detection.A lightweight network of two channels is bulit based on the combination of convolutional neural network(CNN)and graph convolutional network(GCN).CNNs learn feature difference maps of multitemporal images,and attention modules adaptively fuse CNN-based and graph-based features for different scales.GCNs with a new kernel filter adaptively distinguish between nodes with the same and those with different labels,generating change maps.Experimental evaluation on two datasets validates the efficacy of the pro-posed method in addressing false alarms.
文摘Introduction: HIV screening tests are routinely conducted on dialysis patients as the constant exposure of their blood during the dialysis process makes them a reasonable risk for blood-borne infections. However, in low prevalence settings, where HIV rates are <0.1% of the population, false positive results are more likely. This results in apprehension in the dialysis unit as breaches in infectious disease protocols could be presumed. This is illustrated in the case report below. Case Summary: A 62-year-old male Saudi end-stage kidney disease patient secondary to DM nephropathy began dialysis a year before presentation in a hemodialysis center in Saudi Arabia. Routine screening tests done at the start of dialysis revealed negative Hepatitis C, HIV 1 and 2 screening but a positive Hepatitis B surface antigen screen. The patient went for holiday dialysis at another facility and had a routine fourth-generation HIV test done which was positive. A confirmatory HIV PCR test was negative. Conclusion: This case highlights the need for caution in interpreting highly sensitive and specific HIV screening tests in a low-prevalence setting. Routine screening beyond the national recommendation may not be necessary in low-prevalence areas.
基金the National Natural Science Foundation of China(61873057)the Education Department of Jilin Province(JJKH20200118KJ).
文摘This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness.
基金supported by the National Natural Science Foundation of China(61925303,62173034,62088101,U20B2073,62173002)the National Key Research and Development Program of China(2021YFB1714800)Beijing Natural Science Foundation(4222045)。
文摘This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis.
基金This work was supported in part by the National Natural Science Foundation of China(62206109)the Fundamental Research Funds for the Central Universities(21620346)。
文摘With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations.
基金Supported by grants from the Institute of Hydrobiology,Chinese Academy of Sciences
文摘This study examines whether a group of captive false killer whales(P seudorca crassidens) showed variations in the vocal rate around feeding times. The high level of motivation to express appetitive behaviors in captive animals may lead them to respond with changes of the behavioral activities during the time prior to food deliveries which are referred to as food anticipatory activity. False killer whales at Qingdao Polar Ocean World(Qingdao, China) showed signifi cant variations of the rates of both the total sounds and sound classes(whistles, clicks, and burst pulses) around feedings. Precisely, from the Transition interval that recorded the lowest vocalization rate(3.40 s/m/d), the whales increased their acoustic emissions upon trainers' arrival(13.08 s/m/d). The high rate was maintained or intensifi ed throughout the food delivery(25.12 s/m/d), and then reduced immediately after the animals were fed(9.91 s/m/d). These changes in the false killer whales sound production rates around feeding times supports the hypothesis of the presence of a food anticipatory vocal activity. Although sound rates may not give detailed information regarding referential aspects of the animal communication it might still shed light about the arousal levels of the individuals during different social or environmental conditions. Further experiments should be performed to assess if variations of the time of feeding routines may affect the vocal activity of cetaceans in captivity as well as their welfare.
基金funded by the Education Department of Zhejiang Province Foundation of China(Grant No.Y202249221)。
文摘Ustiloxins are vital cyclopeptide mycotoxins originally isolated from rice false smut balls that form in rice spikelets infected by the fungal pathogen Ustilaginoidea virens.The toxicity of the water extract of rice false smut balls(RBWE) remains to be investigated.Studies have shown that RBWE may be toxic to animals,but toxicological evidence is still lacking.In this study,we found that the IC50 values of RBWE to BNL CL.2 cells at 24 and 48 h were 40.02 and 30.11 μg/m L,respectively,with positive correlations with dose toxicity and time toxicity.After treatment with RBWE,the number of BNL CL.2 cells decreased significantly,and the morphology of BNL CL.2 cells showed atrophy and wall detachment.RBWE induced DNA presynthesis phase arrest of BNL CL.2 cells,increased the proportion of apoptotic cells and inhibited cell proliferation.RBWE up-regulated reactive oxygen species(ROS) levels and lowered mitochondrial membrane potentials.Additionally,Western blot and q RT-PCR results suggested that RBWE exerted the above effects by promoting the Nrf2/HO-1 and caspase-induced apoptosis pathways in vitro and in vivo.The contents of alanine aminotransferase,aspartate aminotransferase,alkaline phosphatase,and total bile acids in the serum of mice from Institute of Cancer were significantly up-regulated by RBWE.At the same time,RBWE can lead to increases in ROS and malondialdehyde contents,decreases in contents of oxidized glutathione,glutathione and reduced glutathione,as well as decrease in catalase and superoxide dismutase activities in mouse liver tissues,demonstrating that oxidative stress occurred in mice.Moreover,liver damage was further detected by haematoxylin-eosin staining and electron microscopy to verify the damage to the mice caused by RBWE.In general,RBWE may cause hepatotoxicity in vivo and in vitro via the apoptosis pathway,which provides a reference for hepatotoxicity and its mechanism of action.
基金Supported by the Key Discipline of Jiaxing Respiratory Medicine Construction Project,No.2019-zc-04.
文摘At present,with the development of technology,the detection of cryptococcal antigen(CRAG)plays an increasingly important role in the diagnosis of cryptococcosis.However,the three major CRAG detection technologies,latex agglutination test(LA),lateral flow assay(LFA)and Enzyme-linked Immunosorbent Assay,have certain limitations.Although these techniques do not often lead to false-positive results,once this result occurs in a particular group of patients(such as human immunodeficiency virus patients),it might lead to severe consequences.
基金supported financially by the Ministerio de Ciencia e Innovación(Spain)and the European Regional Development Fund under the Research Grant WindSound Project(Ref.:PID2021-125278OB-I00).
文摘Maintenance operations have a critical influence on power gen-eration by wind turbines(WT).Advanced algorithms must analyze large volume of data from condition monitoring systems(CMS)to determine the actual working conditions and avoid false alarms.This paper proposes different support vector machine(SVM)algorithms for the prediction and detection of false alarms.K-Fold cross-validation(CV)is applied to evaluate the classification reliability of these algorithms.Supervisory Control and Data Acquisition(SCADA)data from an operating WT are applied to test the proposed approach.The results from the quadratic SVM showed an accuracy rate of 98.6%.Misclassifications from the confusion matrix,alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm.The classifier reduces the number of false alarms called misclassifications by 25%.These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.
基金This research was supported by the Universiti Sains Malaysia(USM)and the ministry of Higher Education Malaysia through Fundamental Research GrantScheme(FRGS-Grant No:FRGS/1/2020/TK0/USM/02/1).
文摘The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
基金Supported by the Science and Technology Precision Poverty Alleviation Project of Planting Industry(ZY18C08)Special Project to Guide the Development of Central and Local Science and Technology。
文摘Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established.
文摘Purpose: We aimed to investigate the effects of installing false windows next to hospital beds without windows on the amount of light received by patients and their sleep quality. Methods: The study included patients admitted to the Department of Neurology at our hospital between September 2020 and August 2021. An Actigraph device was fitted to patients’ wrist and their beds to measure the amount of light received and sleep quality. Patients were divided into three groups: bed with a window, aisle bed with a false window, and aisle bed without a window. Mean sleep efficiency (%), mean steps (per day), and the amount of light (lux) received by the patients and beds were measured. Results: Valid data were obtained for 48 participants (median age, 66.5 years). There were 23 patients in beds with a window, 13 patients in aisle beds without a false window, and 12 in aisle beds with a false window. No statistically significant differences were found in terms of mean sleep efficiency, number of steps taken, and the amount of light received by the patients (P > 0.05);however, difference in the mean amount of light received by the beds at the location of the bed was statistically significant (P Conclusion: The amount of light that the patient receives is not necessarily affected by the location of the bed or the presence of a false window.
基金supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418)。
文摘To solve the problem of poor detection and limited application range of current intrusion detection methods,this paper attempts to use deep learning neural network technology to study a new type of intrusion detection method.Hence,we proposed an intrusion detection algorithm based on convolutional neural network(CNN)and AdaBoost algorithm.This algorithm uses CNN to extract the characteristics of network traffic data,which is particularly suitable for the analysis of continuous and classified attack data.The AdaBoost algorithm is used to classify network attack data that improved the detection effect of unbalanced data classification.We adopt the UNSW-NB15 dataset to test of this algorithm in the PyCharm environment.The results show that the detection rate of algorithm is99.27%and the false positive rate is lower than 0.98%.Comparative analysis shows that this algorithm has advantages over existing methods in terms of detection rate and false positive rate for small proportion of attack data.
基金Supported by the National Natural Science Foundation of China(31071397)the Fund for Independent Innovation of Agricultural Sciences in Jiangsu Province(CX(12)1003)~~
文摘A recombinant inbred line (RILs) population with 157 lines derived from an inter-subspecies cross of Daguandao (japonica)/IR28 (indica) by the single seed de-scent method was used to detect quantitative trait loci (QTLs) conferring resistance to rice false smut caused by Ustilaginoidea virens(Cooke) Takahashi in Nanjing and Yangzhou. The disease rate index of the two parents and 157 RILs caused by rice false smut were scored and the QTLs for rice false smut resistance were detected accordingly by QTL Cartographer software. Eight QTLs control ing false smut resis-tance were detected on chromosomes 1, 2, 4, 8, 10, 11 and 12, respectively, with the phenotypic variance of 8.6%-22.5%. There were five QTLs detected in Nanjing and Yangzhou, respectively, and only two QTLs were found in both two years, the phenotypic variation was explained by individual QTL ranged from 18.0% to 18.9% for these two QTLs, and the additive effects of these two QTLs contributed to the 8.0%-14.6% decrease of disease index and therefore the disease resistance increased. The direction of the additive effects at six loci qFsr1, qFsr2, qFsr8, qFsr10a, qFsr11 and qFsr12 coincided with that predicted by phenotypes of the parents, and the IR28 al eles at these loci had positive effect against rice false smut while the negative effects were found in Daguandao al eles at qFsr4 and qFsr10b. Both qFsr10a and qFsr11 should be useful in rice breeding for resistance to rice false smut in marker-assisted selection (MAS) program.
基金the Key Projects of Zhejiang Provincial Natural Science Foundation,China(Grant No.LZ23C130002)the National Natural Science Foundation of China(Grant No.32100161)+3 种基金the Zhejiang Science and Technology Major Program on Rice New Variety Breeding,China(Grant No.2021C02063)the Key R&D Project of China National Rice Research Institute(Grant No.CNRRI-2020-04)the Chinese Academy of Agricultural Sciences under the Agricultural Sciences and Technologies Innovation Program,the Youth innovation Program of Chinese Academy of Agricultural Sciences(Grant No.Y2023QC22)the Joint Open Competitive Project of the Yazhou Bay Seed Laboratory and China National Seed Company Limited(Grant Nos.B23YQ1514 and B23CQ15EP).
文摘The rice false smut disease, caused by Ustilaginoidea virens, has emerged as a significantglobal threat to rice production. The mechanism of carbon catabolite repression plays a crucial role in theefficient utilization of carbon nutrients and enzyme regulation in the presence of complex nutritionalconditions. Although significant progress has been made in understanding carbon catabolite repression infungi such as Aspergillus nidulans and Magnaporthe oryzae, its role in U. virens remains unclear. Toaddress this knowledge gap, we identified UvCreA, a pivotal component of carbon catabolite repression,in U. virens. Our investigation revealed that UvCreA localized to the nucleus. Deletion of UvCreA resultedin decreased growth and pathogenicity in U. virens. Through RNA-seq analysis, it was found that theknockout of UvCreA led to the up-regulation of 514 genes and down-regulation of 640 genes. Moreover,UvCreA was found to be involved in the transcriptional regulation of pathogenic genes and genesassociated with carbon metabolism in U. virens. In summary, our findings indicated that UvCreA isimportant in fungal development, virulence, and the utilization of carbon sources through transcriptionalregulation, thus making it a critical element of carbon catabolite repression.
基金supported by‘Pioneer’and‘Leading Goose’R&D Program of Zhejiang Province,China(Grant No.2023C02014)Zhejiang Provincial Natural Science Foundation of China(Grant No.LY24C030002)+2 种基金Central Public-Interest Scientific Institution Basal Research Fund for China National Rice Research Institute(Grant No.CPSIBRF-CNRRI-202303)the China Agriculture Research System(Grant No.CARS-01)the Agricultural Science and Technology Innovation Program,China(Grant No.ASTIP)。
文摘Ustilaginoidea virens is a common rice pathogen that can easily lead to a decline in rice quality and the production of toxins pose potential risks to human health.In this review,we present a comprehensive literature review of research since the discovery of rice false smut.We provide a comprehensive and,at times,critical overview of the main results and findings from related research,and propose future research directions.Firstly,we delve into the interaction between U.virens and rice,including the regulation of transcription factors,the process of U.virens infecting rice panicles,and the plant immune response caused by rice infection.Following that,we discuss the identification and characterization of mycotoxins produced by the pathogenic fungus,as well as strategies for disease management.We emphasize the importance of comprehensive agricultural prevention and control methods for the sustainable management of U.virens.This knowledge will update our understanding of the interaction between U.virens and rice plants,offering a valuable perspective for those interested in U.virens.
文摘The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes.
基金supported in part by the Research Fund of Guangxi Key Lab of Multi-Source Information Mining&Security(MIMS21-M-02).
文摘False data injection attack(FDIA)can affect the state estimation of the power grid by tampering with the measured value of the power grid data,and then destroying the stable operation of the smart grid.Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams.Data-driven features,however,cannot effectively capture the differences between noisy data and attack samples.As a result,slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks.To address this problem,this paper designs a deep collaborative self-attention network to achieve robust FDIA detection,in which the spatio-temporal features of cascaded FDIA attacks are fully integrated.Firstly,a high-order Chebyshev polynomials-based graph convolution module is designed to effectively aggregate the spatio information between grid nodes,and the spatial self-attention mechanism is involved to dynamically assign attention weights to each node,which guides the network to pay more attention to the node information that is conducive to FDIA detection.Furthermore,the bi-directional Long Short-Term Memory(LSTM)network is introduced to conduct time series modeling and long-term dependence analysis for power grid data and utilizes the temporal selfattention mechanism to describe the time correlation of data and assign different weights to different time steps.Our designed deep collaborative network can effectively mine subtle perturbations from spatiotemporal feature information,efficiently distinguish power grid noise from FDIA attacks,and adapt to diverse attack intensities.Extensive experiments demonstrate that our method can obtain an efficient detection performance over actual load data from New York Independent System Operator(NYISO)in IEEE 14,IEEE 39,and IEEE 118 bus systems,and outperforms state-of-the-art FDIA detection schemes in terms of detection accuracy and robustness.
基金Authors extend their appreciation to King Saud University for funding the publication of this research through the Researchers Supporting Project number(RSPD2024R809),King Saud University,Riyadh,Saudi Arabia.
文摘The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure the security of the network.Conventional intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system model.In this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot IoT.In this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant features.The proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO algorithm.This results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness estimation.As a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.