期刊文献+
共找到138,203篇文章
< 1 2 250 >
每页显示 20 50 100
A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques
1
作者 Burak Cem Kara Can Eyüpoglu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1515-1535,共21页
Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off betw... Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area.When existing approaches are investigated,one of the most significant difficulties discovered is the presence of outlier data in the datasets.Outlier data has a negative impact on data utility.Furthermore,k-anonymity algorithms,which are commonly used in the literature,do not provide adequate protection against outlier data.In this study,a new data anonymization algorithm is devised and tested for boosting data utility by incorporating an outlier data detection mechanism into the Mondrian algorithm.The connectivity-based outlier factor(COF)algorithm is used to detect outliers.Mondrian is selected because of its capacity to anonymize multidimensional data while meeting the needs of real-world data.COF,on the other hand,is used to discover outliers in high-dimensional datasets with complicated structures.The proposed algorithm generates more equivalence classes than the Mondrian algorithm and provides greater data utility than previous algorithms based on k-anonymization.In addition,it outperforms other algorithms in the discernibility metric(DM),normalized average equivalence class size(Cavg),global certainty penalty(GCP),query error rate,classification accuracy(CA),and F-measure metrics.Moreover,the increase in the values of theGCPand error ratemetrics demonstrates that the proposed algorithm facilitates obtaining higher data utility by grouping closer data points when compared to other algorithms. 展开更多
关键词 Data anonymization privacy-preserving data publishing K-ANONYMITY GENERALIZATION MONDRIAN
下载PDF
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles
2
作者 Naiyu Wang Wenti Yang +4 位作者 Xiaodong Wang Longfei Wu Zhitao Guan Xiaojiang Du Mohsen Guizani 《Digital Communications and Networks》 SCIE CSCD 2024年第1期126-134,共9页
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be... The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model. 展开更多
关键词 Federated learning Blockchain privacy-preservation Homomorphic encryption Internetof vehicles
下载PDF
PARE:Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things
3
作者 Peicong He Yang Xin Yixian Yang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3067-3084,共18页
The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters... The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters may be concerned about the validity of the collected data.Hence,it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing(SC)data collection tasks with IoT.To this end,this paper proposes a privacy-preserving data reliability evaluation for SC in IoT,named PARE.First,we design a data uploading format using blockchain and Paillier homomorphic cryptosystem,providing unchangeable and traceable data while overcoming privacy concerns.Secondly,based on the uploaded data,we propose a method to determine the approximate correct value region without knowing the exact value.Finally,we offer a data filtering mechanism based on the Paillier cryptosystem using this value region.The evaluation and analysis results show that PARE outperforms the existing solution in terms of performance and privacy protection. 展开更多
关键词 Spatial crowdsourcing privacy-preserving data evaluation IOT blockchain
下载PDF
A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions
4
作者 Shahriar Md Arman Tao Yang +3 位作者 Shahadat Shahed Alanoud AlMazroa Afraa Attiah Linda Mohaisen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2087-2110,共24页
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation techniques.Biometric credentials are increasingly being used for verification due to their advant... The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation techniques.Biometric credentials are increasingly being used for verification due to their advantages over traditional methods,making it crucial to safeguard the privacy of people’s biometric data in various scenarios.This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems.It proposes a noble and thorough taxonomy survey for privacy-preserving techniques,as well as a systematic framework for categorizing the field’s existing literature.We review the state-of-the-art methods and address their advantages and limitations in the context of various biometric modalities,such as face,fingerprint,and eye detection.The survey encompasses various categories of privacy-preserving mechanisms and examines the trade-offs between security,privacy,and recognition performance,as well as the issues and future research directions.It aims to provide researchers,professionals,and decision-makers with a thorough understanding of the existing privacy-preserving solutions in biometric recognition systems and serves as the foundation of the development of more secure and privacy-preserving biometric technologies. 展开更多
关键词 Biometric modalities biometric recognition biometric security privacy-preserving security threats
下载PDF
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
5
作者 Bin Wu Xianyi Chen +5 位作者 Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei 《Computers, Materials & Continua》 SCIE EI 2024年第3期3177-3194,共18页
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on... In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers.Servers on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure state.The issue of privacy data protection has become an important obstacle to data sharing and usage.How to query outsourcing graph data safely and effectively has become the focus of research.Adjacency query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time.This work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a solution.In our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud server.Our proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental analysis.The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology. 展开更多
关键词 privacy-preserving adjacency query multi-keyword fuzzy search encrypted graph
下载PDF
Clinical diagnostic advances in intestinal anastomotic techniques:Hand suturing,stapling,and compression devices
6
作者 Ah Young Lee Joo Young Cho 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第5期1231-1234,共4页
The development of intestinal anastomosis techniques,including hand suturing,stapling,and compression anastomoses,has been a significant advancement in surgical practice.These methods aim to prevent leakage and minimi... The development of intestinal anastomosis techniques,including hand suturing,stapling,and compression anastomoses,has been a significant advancement in surgical practice.These methods aim to prevent leakage and minimize tissue fibrosis,which can lead to stricture formation.The healing process involves various phases:hemostasis and inflammation,proliferation,and remodeling.Mechanical staplers and sutures can cause inflammation and fibrosis due to the release of profibrotic chemokines.Compression anastomosis devices,including those made of nickel-titanium alloy,offer a minimally invasive option for various surgical challenges and have shown safety and efficacy.However,despite advancements,anastomotic techniques are evaluated based on leakage risk,with complications being a primary concern.Newer devices like Magnamosis use magnetic rings for compression anastomosis,demonstrating greater strength and patency compared to stapling.Magnetic technology is also being explored for other medical treatments.While there are promising results,particularly in animal models,the realworld application in humans is limited,and further research is needed to assess their safety and practicality. 展开更多
关键词 ANASTOMOSES Diagnostic advances Anastomotic techniques technique Intestine
下载PDF
Epileptic brain network mechanisms and neuroimaging techniques for the brain network
7
作者 Yi Guo Zhonghua Lin +1 位作者 Zhen Fan Xin Tian 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第12期2637-2648,共12页
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions. 展开更多
关键词 electrophysiological techniques EPILEPSY functional brain network functional magnetic resonance imaging functional near-infrared spectroscopy machine leaning molecular imaging neuroimaging techniques structural brain network virtual epileptic models
下载PDF
Surgical techniques to prevent delayed gastric emptying after pancreaticoduodenectomy
8
作者 Peng Duan Lu Sun +2 位作者 Kai Kou Xin-Rui Li Ping Zhang 《Hepatobiliary & Pancreatic Diseases International》 SCIE CAS CSCD 2024年第5期449-457,共9页
Background: Delayed gastric emptying(DGE) is one of the most common complications after pancreaticoduodenectomy(PD). DGE represents impaired gastric motility without significant mechanical obstruction and is associate... Background: Delayed gastric emptying(DGE) is one of the most common complications after pancreaticoduodenectomy(PD). DGE represents impaired gastric motility without significant mechanical obstruction and is associated with an increased length of hospital stay, increased healthcare costs, and a high readmission rate. We reviewed published studies on various technical modifications to reduce the incidence of DGE. Data sources: Studies were identified by searching Pub Med for relevant articles published up to December 2022. The following search terms were used: “pancreaticoduodenectomy”, “pancreaticojejunostomy”, “pancreaticogastrostomy”, “gastric emptying”, “gastroparesis” and “postoperative complications”. The search was limited to English publications. Additional articles were identified by a manual search of references from key articles. Results: In recent years, various surgical procedures and techniques have been explored to reduce the incidence of DGE. Pyloric resection, Billroth II reconstruction, Braun's enteroenterostomy, and antecolic reconstruction may be associated with a decreased incidence of DGE, but more high-powered studies are needed in the future. Neither laparoscopic nor robotic surgery has demonstrated superiority in preventing DGE, and the use of staplers is controversial regarding whether they can reduce the incidence of DGE. Conclusions: Despite many innovations in surgical techniques, there is no surgical procedure that is superior to others to reduce DGE. Further larger prospective randomized studies are needed. 展开更多
关键词 PANCREATICODUODENECTOMY Delayed gastric emptying Postoperative complications Surgical techniques
下载PDF
Exploring battery material failure mechanisms through synchrotron X-ray characterization techniques
9
作者 Lingzhe Fang Xiaozhao Liu Tao Li 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期128-135,共8页
Rechargeable battery cycling performance and related safety have been persistent concerns.It is crucial to decipher the capacity fading induced by electrode material failure via a range of techniques.Among these,synch... Rechargeable battery cycling performance and related safety have been persistent concerns.It is crucial to decipher the capacity fading induced by electrode material failure via a range of techniques.Among these,synchrotron-based X-ray techniques with high flux and brightness play a key role in understanding degradation mechanisms.In this comprehensive review,we summarize recent advancements in degra-dation modes and mechanisms that were revealed by synchrotron X-ray methodologies.Subsequently,an overview of X-ray absorption spectroscopy and X-ray scattering techniques is introduced for charac-terizing failure phenomena at local coordination atomic environment and long-range order crystal struc-ture scale,respectively.At last,we envision the future of exploring material failure mechanism. 展开更多
关键词 Battery failure Synchrotron-based techniques X-ray scattering X-ray absorption spectroscopy
下载PDF
Recent Advance in Synaptic Plasticity Modulation Techniques for Neuromorphic Applications
10
作者 Yilin Sun Huaipeng Wang Dan Xie 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期403-434,共32页
Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to explo... Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to exploring biomimetic mechanisms of plasticity simulation in the last few years.Recent progress in various plasticity modulation techniques has pushed the research of synaptic electronics from static plasticity simulation to dynamic plasticity modulation,improving the accuracy of neuromorphic computing and providing strategies for implementing neuromorphic sensing functions.Herein,several fascinating strategies for synap-tic plasticity modulation through chemical techniques,device structure design,and physical signal sensing are reviewed.For chemical techniques,the underly-ing mechanisms for the modification of functional materials were clarified and its effect on the expression of synaptic plasticity was also highlighted.Based on device structure design,the reconfigurable operation of neuromorphic devices was well demonstrated to achieve programmable neuromorphic functions.Besides,integrating the sensory units with neuromorphic processing circuits paved a new way to achieve human-like intelligent perception under the modulation of physical signals such as light,strain,and temperature.Finally,considering that the relevant technology is still in the basic exploration stage,some prospects or development suggestions are put forward to promote the development of neuromorphic devices. 展开更多
关键词 Plasticity modulation Dynamic plasticity Chemical techniques Programmable operation Neuromorphic sensing
下载PDF
Pretreatment and analysis techniques development of TKIs in biological samples for pharmacokinetic studies and therapeutic drug monitoring
11
作者 Lan Chen Yuan Zhang +5 位作者 Yi-Xin Zhang Wei-Lai Wang De-Mei Sun Peng-Yun Li Xue-Song Feng Yue Tan 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第4期439-459,共21页
Tyrosine kinase inhibitors(TKIs)have emerged as the first-line small molecule drugs in many cancer therapies,exerting their effects by impeding aberrant cell growth and proliferation through the modulation of tyrosine... Tyrosine kinase inhibitors(TKIs)have emerged as the first-line small molecule drugs in many cancer therapies,exerting their effects by impeding aberrant cell growth and proliferation through the modulation of tyrosine kinase-mediated signaling pathways.However,there exists a substantial inter-individual variability in the concentrations of certain TKIs and their metabolites,which may render patients with compromised immune function susceptible to diverse infections despite receiving theoretically efficacious anticancer treatments,alongside other potential side effects or adverse reactions.Therefore,an urgent need exists for an up-to-date review concerning the biological matrices relevant to bioanalysis and the sampling methods,clinical pharmacokinetics,and therapeutic drug monitoring of different TKIs.This paper provides a comprehensive overview of the advancements in pretreatment methods,such as protein precipitation(PPT),liquid-liquid extraction(LLE),solid-phase extraction(SPE),micro-SPE(μ-SPE),magnetic SPE(MSPE),and vortex-assisted dispersive SPE(VA-DSPE)achieved since 2017.It also highlights the latest analysis techniques such as newly developed high performance liquid chromatography(HPLC)and high-resolution mass spectrometry(HRMS)methods,capillary electrophoresis(CE),gas chromatography(GC),supercritical fluid chromatography(SFC)procedures,surface plasmon resonance(SPR)assays as well as novel nanoprobes-based biosensing techniques.In addition,a comparison is made between the advantages and disadvantages of different approaches while presenting critical challenges and prospects in pharmacokinetic studies and therapeutic drug monitoring. 展开更多
关键词 TKIs Microextraction technique HRMS methods Pharmacokinetic studies Therapeutic drug monitoring
下载PDF
An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces
12
作者 Sheetal Sharma Kamali Gupta +2 位作者 DeepaliGupta Shalli Rani Gaurav Dhiman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2029-2059,共31页
The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness... The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things. 展开更多
关键词 ERROR fault detection techniques sensor faults OUTLIERS Internet of Things
下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
13
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
下载PDF
Advances in the application of auxiliary imaging techniques in parathyroid diseases
14
作者 Lei Lu Hong-Qing Shang 《World Journal of Clinical Cases》 SCIE 2024年第17期2946-2950,共5页
Hypoparathyroidism is one of the main complications after total thyroidectomy,severely affecting patients’quality of life.How to effectively protect parathyroid function after surgery and reduce the incidence of hypo... Hypoparathyroidism is one of the main complications after total thyroidectomy,severely affecting patients’quality of life.How to effectively protect parathyroid function after surgery and reduce the incidence of hypoparathyroidism has always been a key research area in thyroid surgery.Therefore,precise localization of parathyroid glands during surgery,effective imaging,and accurate surgical resection have become hot topics of concern for thyroid surgeons.In response to this clinical phenomenon,this study compared several different imaging methods for parathyroid surgery,including nanocarbon,indocyanine green,near-infrared imaging techniques,and technetium-99m methoxyisobutylisonitrile combined with gamma probe imaging technology.The advantages and disadvantages of each method were analyzed,providing scientific recommendations for future parathyroid imaging.In recent years,some related basic and clinical research has also been conducted in thyroid surgery.This article reviewed relevant literature and provided an overview of the practical application progress of various imaging techniques in parathyroid surgery. 展开更多
关键词 Imaging technique Parathyroid gland Thyroid surgery HYPOPARATHYROIDISM COMPLICATION
下载PDF
Software Defect Prediction Using Hybrid Machine Learning Techniques: A Comparative Study
15
作者 Hemant Kumar Vipin Saxena 《Journal of Software Engineering and Applications》 2024年第4期155-171,共17页
When a customer uses the software, then it is possible to occur defects that can be removed in the updated versions of the software. Hence, in the present work, a robust examination of cross-project software defect pr... When a customer uses the software, then it is possible to occur defects that can be removed in the updated versions of the software. Hence, in the present work, a robust examination of cross-project software defect prediction is elaborated through an innovative hybrid machine learning framework. The proposed technique combines an advanced deep neural network architecture with ensemble models such as Support Vector Machine (SVM), Random Forest (RF), and XGBoost. The study evaluates the performance by considering multiple software projects like CM1, JM1, KC1, and PC1 using datasets from the PROMISE Software Engineering Repository. The three hybrid models that are compared are Hybrid Model-1 (SVM, RandomForest, XGBoost, Neural Network), Hybrid Model-2 (GradientBoosting, DecisionTree, LogisticRegression, Neural Network), and Hybrid Model-3 (KNeighbors, GaussianNB, Support Vector Classification (SVC), Neural Network), and the Hybrid Model 3 surpasses the others in terms of recall, F1-score, accuracy, ROC AUC, and precision. The presented work offers valuable insights into the effectiveness of hybrid techniques for cross-project defect prediction, providing a comparative perspective on early defect identification and mitigation strategies. . 展开更多
关键词 Defect Prediction Hybrid techniques Ensemble Models Machine Learning Neural Network
下载PDF
Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning
16
作者 Fang Hu Siyi Qiu +3 位作者 Xiaolian Yang ChaoleiWu Miguel Baptista Nunes Hui Chen 《Computers, Materials & Continua》 SCIE EI 2024年第8期2897-2915,共19页
As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in dat... As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models. 展开更多
关键词 Blockchain technique federated learning healthcare and medical data collaboration service privacy preservation
下载PDF
Research Progress on Detection Techniques of Fungicide Residues in Chinese Chives
17
作者 Xiuying CHEN Zhe MENG +5 位作者 Chen DING Huihui LIU Yancheng ZHOU Jinlu LI Yanhua YAN Lei WANG 《Agricultural Biotechnology》 2024年第1期43-48,共6页
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized... Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives. 展开更多
关键词 Chinese chive Pesticide residues FUNGICIDE Detection technique
下载PDF
Economic Power Dispatching from Distributed Generations: Review of Optimization Techniques
18
作者 Paramjeet Kaur Krishna Teerth Chaturvedi Mohan Lal Kolhe 《Energy Engineering》 EI 2024年第3期557-579,共23页
In the increasingly decentralized energy environment,economical power dispatching from distributed generations(DGs)is crucial to minimizing operating costs,optimizing resource utilization,and guaranteeing a consistent... In the increasingly decentralized energy environment,economical power dispatching from distributed generations(DGs)is crucial to minimizing operating costs,optimizing resource utilization,and guaranteeing a consistent and sustainable supply of electricity.A comprehensive review of optimization techniques for economic power dispatching from distributed generations is imperative to identify the most effective strategies for minimizing operational costs while maintaining grid stability and sustainability.The choice of optimization technique for economic power dispatching from DGs depends on a number of factors,such as the size and complexity of the power system,the availability of computational resources,and the specific requirements of the application.Optimization techniques for economic power dispatching from distributed generations(DGs)can be classified into two main categories:(i)Classical optimization techniques,(ii)Heuristic optimization techniques.In classical optimization techniques,the linear programming(LP)model is one of the most popular optimization methods.Utilizing the LP model,power demand and network constraints are met while minimizing the overall cost of generating electricity from DGs.This approach is efficient in determining the best DGs dispatch and is capable of handling challenging optimization issues in the large-scale system including renewables.The quadratic programming(QP)model,a classical optimization technique,is a further popular optimization method,to consider non-linearity.The QP model can take into account the quadratic cost of energy production,with consideration constraints like network capacity,voltage,and frequency.The metaheuristic optimization techniques are also used for economic power dispatching from DGs,which include genetic algorithms(GA),particle swarm optimization(PSO),and ant colony optimization(ACO).Also,Some researchers are developing hybrid optimization techniques that combine elements of classical and heuristic optimization techniques with the incorporation of droop control,predictive control,and fuzzy-based methods.These methods can deal with large-scale systems with many objectives and non-linear,non-convex optimization issues.The most popular approaches are the LP and QP models,while more difficult problems are handled using metaheuristic optimization techniques.In summary,in order to increase efficiency,reduce costs,and ensure a consistent supply of electricity,optimization techniques are essential tools used in economic power dispatching from DGs. 展开更多
关键词 Economic power dispatching distributed generations decentralized energy cost minimization optimization techniques
下载PDF
A Systematic Review of Computer Vision Techniques for Quality Control in End-of-Line Visual Inspection of Antenna Parts
19
作者 Zia Ullah Lin Qi +2 位作者 E.J.Solteiro Pires Arsénio Reis Ricardo Rodrigues Nunes 《Computers, Materials & Continua》 SCIE EI 2024年第8期2387-2421,共35页
The rapid evolution of wireless communication technologies has underscored the critical role of antennas in ensuring seamless connectivity.Antenna defects,ranging from manufacturing imperfections to environmental wear... The rapid evolution of wireless communication technologies has underscored the critical role of antennas in ensuring seamless connectivity.Antenna defects,ranging from manufacturing imperfections to environmental wear,pose significant challenges to the reliability and performance of communication systems.This review paper navigates the landscape of antenna defect detection,emphasizing the need for a nuanced understanding of various defect types and the associated challenges in visual detection.This review paper serves as a valuable resource for researchers,engineers,and practitioners engaged in the design and maintenance of communication systems.The insights presented here pave the way for enhanced reliability in antenna systems through targeted defect detection measures.In this study,a comprehensive literature analysis on computer vision algorithms that are employed in end-of-line visual inspection of antenna parts is presented.The PRISMA principles will be followed throughout the review,and its goals are to provide a summary of recent research,identify relevant computer vision techniques,and evaluate how effective these techniques are in discovering defects during inspections.It contains articles from scholarly journals as well as papers presented at conferences up until June 2023.This research utilized search phrases that were relevant,and papers were chosen based on whether or not they met certain inclusion and exclusion criteria.In this study,several different computer vision approaches,such as feature extraction and defect classification,are broken down and analyzed.Additionally,their applicability and performance are discussed.The review highlights the significance of utilizing a wide variety of datasets and measurement criteria.The findings of this study add to the existing body of knowledge and point researchers in the direction of promising new areas of investigation,such as real-time inspection systems and multispectral imaging.This review,on its whole,offers a complete study of computer vision approaches for quality control in antenna parts.It does so by providing helpful insights and drawing attention to areas that require additional exploration. 展开更多
关键词 Computer vision end-of-line visual inspection of antenna parts machine learning algorithms image processing techniques deep learning models
下载PDF
Urethroplasty among Elderly Men, Surgical Techniques and Outcomes
20
作者 Kwaku Addai Arhin Appiah George Amoah +7 位作者 Patrick Opoku Manu Maison Roland Azorliade Kwaku Otu-Boateng Douglas Arthur Dominic Annor Mintah Joseph Yorke George Asafu Adjaye Frimpong Christian Kofi Gyasi-Sarpong 《Open Journal of Urology》 2024年第3期179-187,共9页
Introduction: Urethroplasty remains the gold standard for the management of urethral stricture. However, the treatment of stricture disease in the elderly tends to be less invasive due to the presumption that they mig... Introduction: Urethroplasty remains the gold standard for the management of urethral stricture. However, the treatment of stricture disease in the elderly tends to be less invasive due to the presumption that they might not be able to stand long hours of surgery and might have higher rates of recurrence due to poor wound healing from microangiopathy. We present our experience with the outcomes of urethroplasty among elderly men seen at the Komfo Anokye Teaching Hospital from January 2012 to December 2021. Methods: This was a retrospective review of data captured in the urology database on all patients 65 years and above who underwent urethroplasty at the hospital over the study period. Data was obtained on patients’ demographics, stricture characteristics, urethroplasty technique, and outcome. A successful outcome was defined as peak flow rate > 15 mls/s, a patent urethra on retrograde urethrogram, patient satisfaction with urine stream, or restoration of the normal stream of urine with only one attempt at urethral calibration or internal urethrotomy postoperatively. Data was analyzed using PASW Statistics for Windows, Version 18.0. Results: Overall, 43 urethroplasties were done over the study period in elderly men. The age range was 65 to 87 years. The commonest aetiology was catheterization (62.79%) followed by urethritis (32.56%). Stricture length ranged from 0.5 cm to 16 cm with a mean of 3.93 cm. Most patients (60.46%) had bulbar urethral strictures. The repair methods employed were anastomotic urethroplasty (62.80%), fasciocutaneous flap (FCF) ventral onlay (13.95%), buccal mucosa graft (BMG) ventral onlay urethroplasty (4.65%), and staged urethroplasty (4.65%). Three of the patients (6.98%) had a combination of anastomotic and tissue transfer urethroplasty. The overall success rate was 88.37%. Complications included three surgical site infections, two urethral diverticula and one glans dehiscence. Conclusion: Elderly men tolerate urethroplasty well and the procedure should not be denied solely based on age. 展开更多
关键词 Urethral Stricture Elderly Men URETHROPLASTY Surgical techniques
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部