The development of superconducting joining technology for reacted magnesium diboride(MgB_(2))conductors remains a critical challenge for the advancement of cryogen-free MgB_(2)-based magnets for magnetic resonance ima...The development of superconducting joining technology for reacted magnesium diboride(MgB_(2))conductors remains a critical challenge for the advancement of cryogen-free MgB_(2)-based magnets for magnetic resonance imaging(MRI).Herein,the fabrication of superconducting joints using reacted carbon-doped multifilament MgB_(2)wires for MRI magnets is reported.To achieve successful superconducting joints,the powder-in-mold method was employed,which involved tuning the filament protection mechanism,the powder compaction pressure,and the heat treatment condition.The fabricated joints demonstrated clear superconducting-to-normal transitions in self-field,with effective magnetic field screening up to 0.5 T at 20 K.To evaluate the interface between one of the MgB_(2)filaments and the MgB_(2)bulk within the joint,serial sectioning was conducted for the first time in this type of superconducting joint.The serial sectioning revealed space formation at the interface,potentially caused by the volume shrinkage associated with the MgB_(2)formation or the combined effect of the volume shrinkage and the different thermal expansion coefficients of the MgB_(2)bulk,the filament,the mold,and the sealing material.These findings are expected to be pivotal in developing MgB_(2)superconducting joining technology for MRI magnet applications through interface engineering.展开更多
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu...With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices.展开更多
Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland.Accurate and timely diagnosis of these d...Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland.Accurate and timely diagnosis of these disorders is crucial for effective treatment and patient care.This research introduces a comprehensive approach to improve the accuracy of thyroid disorder diagnosis through the integration of ensemble stacking and advanced feature selection techniques.Sequential forward feature selection,sequential backward feature elimination,and bidirectional feature elimination are investigated in this study.In ensemble learning,random forest,adaptive boosting,and bagging classifiers are employed.The effectiveness of these techniques is evaluated using two different datasets obtained from the University of California Irvine-Machine Learning Repository,both of which undergo preprocessing steps,including outlier removal,addressing missing data,data cleansing,and feature reduction.Extensive experimentation demonstrates the remarkable success of proposed ensemble stacking and bidirectional feature elimination achieving 100%and 99.86%accuracy in identifying hyperthyroidism and hypothyroidism,respectively.Beyond enhancing detection accuracy,the ensemble stacking model also demonstrated a streamlined computational complexity which is pivotal for practical medical applications.It significantly outperformed existing studies with similar objectives underscoring the viability and effectiveness of the proposed scheme.This research offers an innovative perspective and sets the platform for improved thyroid disorder diagnosis with broader implications for healthcare and patient well-being.展开更多
Recently,artificial synapses involving an electrochemical reaction of Li-ion have been attributed to have remarkable synaptic properties.Three-terminal synaptic transistors utilizing Li-ion intercalation exhibits reli...Recently,artificial synapses involving an electrochemical reaction of Li-ion have been attributed to have remarkable synaptic properties.Three-terminal synaptic transistors utilizing Li-ion intercalation exhibits reliable synaptic characteristics by exploiting the advantage of nondistributed weight updates owing to stable ion migrations.However,the three-terminal configurations with large and complex structures impede the crossbar array implementation required for hardware neuromorphic systems.Meanwhile,achieving adequate synaptic performances through effective Li-ion intercalation in vertical two-terminal synaptic devices for array integration remains challenging.Here,two-terminal Au/LixCoO_(2)/Pt artificial synapses are proposed with the potential for practical implementation of hardware neural networks.The Au/LixCoO_(2)/Pt devices demonstrated extraordinary neuromorphic behaviors based on a progressive dearth of Li in LixCoO_(2)films.The intercalation and deintercalation of Li-ion inside the films are precisely controlled over the weight control spike,resulting in improved weight control functionality.Various types of synaptic plasticity were imitated and assessed in terms of key factors such as nonlinearity,symmetricity,and dynamic range.Notably,the LixCoO_(2)-based neuromorphic system outperformed three-terminal synaptic transistors in simulations of convolutional neural networks and multilayer perceptrons due to the high linearity and low programming error.These impressive performances suggest the vertical two-terminal Au/LixCoO_(2)/Pt artificial synapses as promising candidates for hardware neural networks.展开更多
With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to t...With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning(CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL(Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6%true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20%and the training and detection times by 67%when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%.展开更多
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticu...Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security threats.In particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing considerably.Advanced persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated attack.However,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such attacks.In this paper,we propose a method that expands the detection coverage inAPT attack environments.In this model,an open-source threat detector and log collector are used synergistically to improve threat detection performance.Extending the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log collector.The proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods.展开更多
With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks ...With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks have improved industrial productivity and convenience,they are highly dependent on nonstandard protocol stacks and open-source-based,poorly validated software,resulting in several security vulnerabilities.How-ever,conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and com-puting power.This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy.Experimental results using a software vulnerability classification dataset showed that different optimal data sizes did not affect the learning performance of the learning models.Moreover,the minimal data size required to train a model without performance degradation could be determined in advance.For example,the random forest model saved 85.18%of memory and improved latency by 97.82%while maintaining a learning accuracy similar to that achieved when using 100%of data,despite using only 1%.展开更多
As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficu...As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficult to apply high-performance security modules to the IoT owing to the limited battery,memory capacity,and data transmission performance depend-ing on the size of the device.Conventional research has mainly reduced power consumption by lightening encryption algorithms.However,it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security perfor-mance.In this study,we propose wake-up security(WuS),a low-power security architecture that can utilize high-performance security algorithms in an IoT environment.By introducing a small logic that performs anomaly detection on the IoT platform and executes the security module only when necessary according to the anomaly detection result,WuS improves security and power efficiency while using a relatively high-complexity security module in a low-power environment compared to the conventional method of periodically exe-cuting a high-performance security module.In this study,a Python simulator based on the UNSW-NB15 dataset is used to evaluate the power consumption,latency,and security of the proposed method.The evaluation results reveal that the power consumption of the proposed WuS mechanism is approxi-mately 51.8%and 27.2%lower than those of conventional high-performance security and lightweight security modules,respectively.Additionally,the laten-cies are approximately 74.8%and 65.9%lower,respectively.Furthermore,the WuS mechanism achieved a high detection accuracy of approximately 96.5%or greater,proving that the detection efficiency performance improved by approximately 33.5%compared to the conventional model.The performance evaluation results for the proposed model varied depending on the applied anomaly-detection model.Therefore,they can be used in various ways by selecting suitable models based on the performance levels required in each industry.展开更多
The development of new heterostructures with high photoactivity is a breakthrough for the limitation of solar-driven water splitting.Here,we first introduce indium oxide(In_(2)O_(3))nanorods(NRs)as a novel electron tr...The development of new heterostructures with high photoactivity is a breakthrough for the limitation of solar-driven water splitting.Here,we first introduce indium oxide(In_(2)O_(3))nanorods(NRs)as a novel electron transport layer for bismuth vanadate(BiVO_(4))with a short charge diffusion length.In_(2)O_(3)NRs reinforce the electron transport and hole blocking of BiVO_(4),surpassing the state-of-the-art photoelectrochemical performances of BiVO_(4)-based photoanodes.Also,a tannin-nickel-iron complex(TANF)is used as an oxygen evolution catalyst to speed up the reaction kinetics.The final TANF/BiVO_(4)/In_(2)O_(3)NR photoanode generates photocurrent densities of 7.1 mAcm^(−2) in sulfite oxidation and 4.2 mA cm^(−2) in water oxidation at 1.23 V versus the reversible hydrogen electrode.Furthermore,the“artificial leaf,”which is a tandem cell with a perovskite/silicon solar cell,shows a solar-to-hydrogen conversion efficiency of 6.2%for unbiased solar water splitting.We reveal significant advances in the photoactivity of TANF/BiVO_(4)/In_(2)O_(3)NRs from the tailored nanostructure and band structure for charge dynamics.展开更多
Wearable and stretchable strain sensors have potential values in the fields of human motion and health monitoring,flexible electronics,and soft robotic skin.The wearable and stretchable strain sensors can be directly ...Wearable and stretchable strain sensors have potential values in the fields of human motion and health monitoring,flexible electronics,and soft robotic skin.The wearable and stretchable strain sensors can be directly attached to human skin,providing visualized detection for human motions and personal healthcare.Conductive polymer composites(CPC)composed of conductive fillers and flexible polymers have the advantages of high stretchability,good flexibility,superior durability,which can be used to prepare flexible strain sensors with large working strain and outstanding sensitivity.This review has put forward a comprehensive summary on the fabrication methods,advanced mechanisms and strain sensing abilities of CPC strain sensors reported in recent years,especially the sensors with superior performance.Finally,the structural design,bionic function,integration technology and further application of CPC strain sensors are prospected.展开更多
Cancer is one of the leading causes of death worldwide.Commonly used cancer treatments,including chemotherapy and radiation therapy,often have side effects and a complete cure is sometimes impossible.Therefore,prevent...Cancer is one of the leading causes of death worldwide.Commonly used cancer treatments,including chemotherapy and radiation therapy,often have side effects and a complete cure is sometimes impossible.Therefore,prevention,suppression,and/or delaying the onset of the disease are important.The onset of gastroenterological cancers is closely associated with an individual's lifestyle.Thus,changing lifestyle,specifically the consumption of fruits and vegetables,can help to protect against the development of gastroenterological cancers.In particular,naturally occurring bioactive compounds,including curcumin,resveratrol,isothiocyanates,(-)-epigallocatechin gallate and sulforaphane,are regarded as promising chemopreventive agents.Hence,regular consumption of these natural bioactive compounds found in foods can contribute to prevention,suppression,and/or delay of gastroenterological cancer development.In this review,we will summarize natural phytochemicals possessing potential antioxidant and/or anti-inflammatory and anti-carcinogenic activities,which are exerted by regulating or targeting specific molecules against gastroenterological cancers,including esophageal,gastric and colon cancers.展开更多
Study of fuzzy entropy and similarity measure on intuitionistic fuzzy sets (IFSs) was proposed and analyzed. Unlike fuzzy set, IFSs contain uncertainty named hesitance, which is contained in fuzzy membership function ...Study of fuzzy entropy and similarity measure on intuitionistic fuzzy sets (IFSs) was proposed and analyzed. Unlike fuzzy set, IFSs contain uncertainty named hesitance, which is contained in fuzzy membership function itself. Hence, designing fuzzy entropy is not easy because of many entropy definitions. By considering different fuzzy entropy definitions, fuzzy entropy on IFSs is designed and discussed. Similarity measure was also presented and its usefulness was verified to evaluate degree of similarity.展开更多
The production of transgenic farm animals(e.g., cattle) via genome engineering for the gain or loss of gene functions is an important undertaking. In the initial stages of genome engineering, DNA micro-injection into ...The production of transgenic farm animals(e.g., cattle) via genome engineering for the gain or loss of gene functions is an important undertaking. In the initial stages of genome engineering, DNA micro-injection into one-cell stage embryos(zygotes) followed by embryo transfer into a recipient was performed because of the ease of the procedure.However, as this approach resulted in severe mosaicism and has a low efficiency, it is not typically employed in the cattle as priority, unlike in mice. To overcome the above issue with micro-injection in cattle, somatic cell nuclear transfer(SCNT) was introduced and successfully used to produce cloned livestock. The application of SCNT for the production of transgenic livestock represents a significant advancement, but its development speed is relatively slow because of abnormal reprogramming and low gene targeting efficiency. Recent genome editing technologies(e.g.,ZFN, TALEN, and CRISPR-Cas9) have been rapidly adapted for applications in cattle and great results have been achieved in several fields such as disease models and bioreactors. In the future, genome engineering technologies wil accelerate our understanding of genetic traits in bovine and wil be readily adapted for bio-medical applications in cattle.展开更多
Objective: To investigate the effect of Gymnema sylvestre extract(GS) on initial anti-obesity, liver injury, and glucose homeostasis induced by a high-fat diet(HFD). Methods: The dry powder of GS was extracted with me...Objective: To investigate the effect of Gymnema sylvestre extract(GS) on initial anti-obesity, liver injury, and glucose homeostasis induced by a high-fat diet(HFD). Methods: The dry powder of GS was extracted with methanol, and gymnemic acid was identified by high performance liquid chromatography as deacyl gymnemic acid. Male C57BL/6J mice that fed on either a normal diet, normal diet containing 1 g/kg GS(CON+GS) HFD, or HFD containing 1.0 g/kg GS(HFD+GS) for 4 weeks were used to test the initial anti-obesity effect of GS. Body weight gain and food intake, and serum levels about lipid and liver injury markers were measured. Histopathology of adipose tissue and liver stained with hematoxylin and eosin(H&E) and oil-red O were analyzed. After 4 weeks of GS extract feeding, intraperitoneal glucose tolerance test(IPGTT) was performed. Results: The methanol extracts of GS exerted significant anti-obesity effects in HFD+GS group. They decreased body weight gain, a lower food and energy efficiency ratio, and showed lower serum levels of total cholesterol(TC), triglyceride(TG), low-density lipoprotein(LDL)-cholesterol, very-low density lipoprotein(VLDL)-cholesterol and leptin compared with the HFD group. The decreases of abdominal as well as epididymal fat weight and adipocyte hypertrophy, lipid droplets in liver, and serum levels of aspartate aminotransferase(AST) and alanine transaminase(ALT) were also observed. The CON+GS group showed an effect of glucose homeostasis compared to the CON group. Conclusions: This study shows that GS provide the possibility as a key role in an initial anti-obesity effects feeding with a HFD.展开更多
In the Vehicular Ad-hoc NETworks(VANET),the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance.However,traditional VANETs face several security issues.We pr...In the Vehicular Ad-hoc NETworks(VANET),the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance.However,traditional VANETs face several security issues.We propose a new type of blockchain to resolve critical message dissemination issues in the VANET.We create a local blockchain for real-world event message exchange among vehicles within the boundary of a country,which is a new type of blockchain suitable for the VANET.We present a public blockchain that stores the node trustworthiness and message trustworthiness in a distributed ledger that is appropriate for secure message dissemination.展开更多
Two-dimensional(2D)transition metal chalcogenides(TMC)and their heterostructures are appealing as building blocks in a wide range of electronic and optoelectronic devices,particularly futuristic memristive and synapti...Two-dimensional(2D)transition metal chalcogenides(TMC)and their heterostructures are appealing as building blocks in a wide range of electronic and optoelectronic devices,particularly futuristic memristive and synaptic devices for brain-inspired neuromorphic computing systems.The distinct properties such as high durability,electrical and optical tunability,clean surface,flexibility,and LEGO-staking capability enable simple fabrication with high integration density,energy-efficient operation,and high scalability.This review provides a thorough examination of high-performance memristors based on 2D TMCs for neuromorphic computing applications,including the promise of 2D TMC materials and heterostructures,as well as the state-of-the-art demonstration of memristive devices.The challenges and future prospects for the development of these emerging materials and devices are also discussed.The purpose of this review is to provide an outlook on the fabrication and characterization of neuromorphic memristors based on 2D TMCs.展开更多
Flexible supercapacitor electrodes with high mass loading are crucial for obtaining favorable electrochemical performance but still challenging due to sluggish electron and ion transport.Herein,rationally designed CNT...Flexible supercapacitor electrodes with high mass loading are crucial for obtaining favorable electrochemical performance but still challenging due to sluggish electron and ion transport.Herein,rationally designed CNT/MnO2/graphene-grafted carbon cloth electrodes are prepared by a“graft-deposit-coat”strategy.Due to the large surface area and good conductivity,graphene grafted on carbon cloth offers additional surface areas for the uniform deposition of MnO2(9.1 mg cm?2)and facilitates charge transfer.Meanwhile,the nanostructured MnO2 provides abundant electroactive sites and short ion transport distance,and CNT coated on MnO2 acts as interconnected conductive“highways”to accelerate the electron transport,significantly improving redox reaction kinetics.Benefiting from high mass loading of electroactive materials,favorable conductivity,and a porous structure,the electrode achieves large areal capacitances without compromising rate capability.The assembled asymmetric supercapacitor demonstrates a wide working voltage(2.2 V)and high energy density of 10.18 mWh cm?3.展开更多
We investigated the occurrence and distribution of terrestrial-derived hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system and their potential impact on the application of t...We investigated the occurrence and distribution of terrestrial-derived hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system and their potential impact on the application of the ring index of OH-GDGTs(RI-OH) as a sea surface temperature(SST) proxy in the eastern Yellow Sea. Thereby, we analyzed various samples collected along the Han River and from its surrounding areas(South Korea, n = 34). The OHGDGTs were found in all samples investigated. OH-GDGT-0 was the dominant OH-GDGT component in the estuary and marine samples while OH-GDGT-2 was generally dominant in the soils, the lake sediments and the river suspended particulate matter(SPM). Our results thus suggests a possible warm bias of the RI-OH-derived summer SSTs in the coastal zone to which a large amount of terrestrial organic matter is being supplied. Further studies are necessary to better assess the applicability of the RI-OH proxy in the eastern Yellow Sea.展开更多
基金the Japan Society for the Promotion of Science(JSPS)KAKENHI Grant Number JP18F18714Cryogenic Station,Research Network and Facility Services Division,National Institute for Materials Science(NIMS),Japansupported by the ARC Linkage Project(LP200200689)。
文摘The development of superconducting joining technology for reacted magnesium diboride(MgB_(2))conductors remains a critical challenge for the advancement of cryogen-free MgB_(2)-based magnets for magnetic resonance imaging(MRI).Herein,the fabrication of superconducting joints using reacted carbon-doped multifilament MgB_(2)wires for MRI magnets is reported.To achieve successful superconducting joints,the powder-in-mold method was employed,which involved tuning the filament protection mechanism,the powder compaction pressure,and the heat treatment condition.The fabricated joints demonstrated clear superconducting-to-normal transitions in self-field,with effective magnetic field screening up to 0.5 T at 20 K.To evaluate the interface between one of the MgB_(2)filaments and the MgB_(2)bulk within the joint,serial sectioning was conducted for the first time in this type of superconducting joint.The serial sectioning revealed space formation at the interface,potentially caused by the volume shrinkage associated with the MgB_(2)formation or the combined effect of the volume shrinkage and the different thermal expansion coefficients of the MgB_(2)bulk,the filament,the mold,and the sealing material.These findings are expected to be pivotal in developing MgB_(2)superconducting joining technology for MRI magnet applications through interface engineering.
基金supported by the Korea Institute for Advancement of Technology(KIAT)Grant funded by theKorean Government(MOTIE)(P0008703,The Competency Development Program for Industry Specialists)MSIT under the ICAN(ICT Challenge and Advanced Network of HRD)Program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information&Communication Technology Planning and Evaluation(IITP).
文摘With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices.
基金supported by the Institute of Information&communications Technology Planning&Evaluation(IITP)grant Funded by the Korean government(MSIT)(2021-0-00755,Dark Data Analysis Technology for Data Scale and Accuracy Improvement)This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R407)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland.Accurate and timely diagnosis of these disorders is crucial for effective treatment and patient care.This research introduces a comprehensive approach to improve the accuracy of thyroid disorder diagnosis through the integration of ensemble stacking and advanced feature selection techniques.Sequential forward feature selection,sequential backward feature elimination,and bidirectional feature elimination are investigated in this study.In ensemble learning,random forest,adaptive boosting,and bagging classifiers are employed.The effectiveness of these techniques is evaluated using two different datasets obtained from the University of California Irvine-Machine Learning Repository,both of which undergo preprocessing steps,including outlier removal,addressing missing data,data cleansing,and feature reduction.Extensive experimentation demonstrates the remarkable success of proposed ensemble stacking and bidirectional feature elimination achieving 100%and 99.86%accuracy in identifying hyperthyroidism and hypothyroidism,respectively.Beyond enhancing detection accuracy,the ensemble stacking model also demonstrated a streamlined computational complexity which is pivotal for practical medical applications.It significantly outperformed existing studies with similar objectives underscoring the viability and effectiveness of the proposed scheme.This research offers an innovative perspective and sets the platform for improved thyroid disorder diagnosis with broader implications for healthcare and patient well-being.
基金financially supported by National R&D Program(2018M3D1A1058793,2021M3H4A3A02086430)through NRF(National Research Foundation of Korea)funded by the Ministry of Science and ICTsupported by SAIT,Samsung Electronics Co.,Ltd。
文摘Recently,artificial synapses involving an electrochemical reaction of Li-ion have been attributed to have remarkable synaptic properties.Three-terminal synaptic transistors utilizing Li-ion intercalation exhibits reliable synaptic characteristics by exploiting the advantage of nondistributed weight updates owing to stable ion migrations.However,the three-terminal configurations with large and complex structures impede the crossbar array implementation required for hardware neuromorphic systems.Meanwhile,achieving adequate synaptic performances through effective Li-ion intercalation in vertical two-terminal synaptic devices for array integration remains challenging.Here,two-terminal Au/LixCoO_(2)/Pt artificial synapses are proposed with the potential for practical implementation of hardware neural networks.The Au/LixCoO_(2)/Pt devices demonstrated extraordinary neuromorphic behaviors based on a progressive dearth of Li in LixCoO_(2)films.The intercalation and deintercalation of Li-ion inside the films are precisely controlled over the weight control spike,resulting in improved weight control functionality.Various types of synaptic plasticity were imitated and assessed in terms of key factors such as nonlinearity,symmetricity,and dynamic range.Notably,the LixCoO_(2)-based neuromorphic system outperformed three-terminal synaptic transistors in simulations of convolutional neural networks and multilayer perceptrons due to the high linearity and low programming error.These impressive performances suggest the vertical two-terminal Au/LixCoO_(2)/Pt artificial synapses as promising candidates for hardware neural networks.
基金supported by a Korea Institute for Advancement of Technology(KIAT)Grant funded by theKorean Government(MOTIE)(P0008703,The Competency Development Program for Industry Specialists)the MSIT under the ICAN(ICT Challenge and Advanced Network ofHRD)program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information Communication Technology Planning and Evaluation(IITP).
文摘With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning(CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL(Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6%true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20%and the training and detection times by 67%when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%.
基金This study is the result of a commissioned research project supported by the affiliated institute of ETRI(No.2021-026)partially supported by the NationalResearch Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(No.2020R1F1A1061107)+2 种基金the Korea Institute for Advancement of Technology(KIAT)grant funded by the Korean government(MOTIE)(P0008703,The Competency Development Program for Industry Specialist)the MSIT under the ICAN(ICT Challenge and Advanced Network of HRD)program[grant number IITP-2022-RS-2022-00156310]supervised by the Institute of Information&Communication Technology Planning and Evaluation(IITP).
文摘Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security threats.In particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing considerably.Advanced persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated attack.However,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such attacks.In this paper,we propose a method that expands the detection coverage inAPT attack environments.In this model,an open-source threat detector and log collector are used synergistically to improve threat detection performance.Extending the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log collector.The proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods.
基金supported by a National Research Foundation of Korea (NRF)grant funded by the Ministry of Science and ICT (MSIT) (No.2020R1F1A1061107)the Korea Institute for Advancement of Technology (KIAT)grant funded by the Korean Government (MOTIE) (P0008703,The Competency Development Program for Industry Specialists)the MSIT under the ICAN (ICT Challenge and Advanced Network of HRD)program (No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information&Communication Technology Planning and Evaluation (IITP).
文摘With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks have improved industrial productivity and convenience,they are highly dependent on nonstandard protocol stacks and open-source-based,poorly validated software,resulting in several security vulnerabilities.How-ever,conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and com-puting power.This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy.Experimental results using a software vulnerability classification dataset showed that different optimal data sizes did not affect the learning performance of the learning models.Moreover,the minimal data size required to train a model without performance degradation could be determined in advance.For example,the random forest model saved 85.18%of memory and improved latency by 97.82%while maintaining a learning accuracy similar to that achieved when using 100%of data,despite using only 1%.
基金supplemented by a paper presented at the 6th International Symposium on Mobile Internet Security(MobiSec 2022).
文摘As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficult to apply high-performance security modules to the IoT owing to the limited battery,memory capacity,and data transmission performance depend-ing on the size of the device.Conventional research has mainly reduced power consumption by lightening encryption algorithms.However,it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security perfor-mance.In this study,we propose wake-up security(WuS),a low-power security architecture that can utilize high-performance security algorithms in an IoT environment.By introducing a small logic that performs anomaly detection on the IoT platform and executes the security module only when necessary according to the anomaly detection result,WuS improves security and power efficiency while using a relatively high-complexity security module in a low-power environment compared to the conventional method of periodically exe-cuting a high-performance security module.In this study,a Python simulator based on the UNSW-NB15 dataset is used to evaluate the power consumption,latency,and security of the proposed method.The evaluation results reveal that the power consumption of the proposed WuS mechanism is approxi-mately 51.8%and 27.2%lower than those of conventional high-performance security and lightweight security modules,respectively.Additionally,the laten-cies are approximately 74.8%and 65.9%lower,respectively.Furthermore,the WuS mechanism achieved a high detection accuracy of approximately 96.5%or greater,proving that the detection efficiency performance improved by approximately 33.5%compared to the conventional model.The performance evaluation results for the proposed model varied depending on the applied anomaly-detection model.Therefore,they can be used in various ways by selecting suitable models based on the performance levels required in each industry.
基金National Research Foundation of Korea,Grant/Award Numbers:2021M3H4A1A03057403,2021R1A6A3A03039988,2021R1A6A3A13046700,2021R1A2B5B03001851。
文摘The development of new heterostructures with high photoactivity is a breakthrough for the limitation of solar-driven water splitting.Here,we first introduce indium oxide(In_(2)O_(3))nanorods(NRs)as a novel electron transport layer for bismuth vanadate(BiVO_(4))with a short charge diffusion length.In_(2)O_(3)NRs reinforce the electron transport and hole blocking of BiVO_(4),surpassing the state-of-the-art photoelectrochemical performances of BiVO_(4)-based photoanodes.Also,a tannin-nickel-iron complex(TANF)is used as an oxygen evolution catalyst to speed up the reaction kinetics.The final TANF/BiVO_(4)/In_(2)O_(3)NR photoanode generates photocurrent densities of 7.1 mAcm^(−2) in sulfite oxidation and 4.2 mA cm^(−2) in water oxidation at 1.23 V versus the reversible hydrogen electrode.Furthermore,the“artificial leaf,”which is a tandem cell with a perovskite/silicon solar cell,shows a solar-to-hydrogen conversion efficiency of 6.2%for unbiased solar water splitting.We reveal significant advances in the photoactivity of TANF/BiVO_(4)/In_(2)O_(3)NRs from the tailored nanostructure and band structure for charge dynamics.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A2C1008380)Nano Material Technology Development Program[NRF-2015M3A7B6027970]+1 种基金the Chey Institute for Advanced Studies'International Scholar Exchange Fellowship for the academic year of 2021-2022supported by the Korea Institute of Energy Technology Evaluation and Planning(KETEP)grant funded by the Korea government(MOTIE)(20215710100170).
文摘Wearable and stretchable strain sensors have potential values in the fields of human motion and health monitoring,flexible electronics,and soft robotic skin.The wearable and stretchable strain sensors can be directly attached to human skin,providing visualized detection for human motions and personal healthcare.Conductive polymer composites(CPC)composed of conductive fillers and flexible polymers have the advantages of high stretchability,good flexibility,superior durability,which can be used to prepare flexible strain sensors with large working strain and outstanding sensitivity.This review has put forward a comprehensive summary on the fabrication methods,advanced mechanisms and strain sensing abilities of CPC strain sensors reported in recent years,especially the sensors with superior performance.Finally,the structural design,bionic function,integration technology and further application of CPC strain sensors are prospected.
基金Supported by Grants from the Next-Generation BioGreen 21 Program (Plant Molecular Breeding Center,No. PJ008187),Rural Development Administrationthe Leap Research Program(2010-0029233)World Class University Program (GrantR31-2008-00-10056-0) through the National Research Foundation of Korea funded by the Ministry of Education,Science and Technology,South Korea
文摘Cancer is one of the leading causes of death worldwide.Commonly used cancer treatments,including chemotherapy and radiation therapy,often have side effects and a complete cure is sometimes impossible.Therefore,prevention,suppression,and/or delaying the onset of the disease are important.The onset of gastroenterological cancers is closely associated with an individual's lifestyle.Thus,changing lifestyle,specifically the consumption of fruits and vegetables,can help to protect against the development of gastroenterological cancers.In particular,naturally occurring bioactive compounds,including curcumin,resveratrol,isothiocyanates,(-)-epigallocatechin gallate and sulforaphane,are regarded as promising chemopreventive agents.Hence,regular consumption of these natural bioactive compounds found in foods can contribute to prevention,suppression,and/or delay of gastroenterological cancer development.In this review,we will summarize natural phytochemicals possessing potential antioxidant and/or anti-inflammatory and anti-carcinogenic activities,which are exerted by regulating or targeting specific molecules against gastroenterological cancers,including esophageal,gastric and colon cancers.
基金Project(ER120001) supported by Development of Application Technology BioNano Super Composites, Korea
文摘Study of fuzzy entropy and similarity measure on intuitionistic fuzzy sets (IFSs) was proposed and analyzed. Unlike fuzzy set, IFSs contain uncertainty named hesitance, which is contained in fuzzy membership function itself. Hence, designing fuzzy entropy is not easy because of many entropy definitions. By considering different fuzzy entropy definitions, fuzzy entropy on IFSs is designed and discussed. Similarity measure was also presented and its usefulness was verified to evaluate degree of similarity.
基金National Research Foundation of Korea(NRF-2017R1A2B3004972)IPET(No.109023–05-5-CG000)The BK21 PLUS Program for Creative Veterinary Science Research
文摘The production of transgenic farm animals(e.g., cattle) via genome engineering for the gain or loss of gene functions is an important undertaking. In the initial stages of genome engineering, DNA micro-injection into one-cell stage embryos(zygotes) followed by embryo transfer into a recipient was performed because of the ease of the procedure.However, as this approach resulted in severe mosaicism and has a low efficiency, it is not typically employed in the cattle as priority, unlike in mice. To overcome the above issue with micro-injection in cattle, somatic cell nuclear transfer(SCNT) was introduced and successfully used to produce cloned livestock. The application of SCNT for the production of transgenic livestock represents a significant advancement, but its development speed is relatively slow because of abnormal reprogramming and low gene targeting efficiency. Recent genome editing technologies(e.g.,ZFN, TALEN, and CRISPR-Cas9) have been rapidly adapted for applications in cattle and great results have been achieved in several fields such as disease models and bioreactors. In the future, genome engineering technologies wil accelerate our understanding of genetic traits in bovine and wil be readily adapted for bio-medical applications in cattle.
基金supported by the Bio-Synergy Research Project(NRF-2012M3A9C4048819)of the Ministry of Science,ICT and Future Planning through the National Research Foundation
文摘Objective: To investigate the effect of Gymnema sylvestre extract(GS) on initial anti-obesity, liver injury, and glucose homeostasis induced by a high-fat diet(HFD). Methods: The dry powder of GS was extracted with methanol, and gymnemic acid was identified by high performance liquid chromatography as deacyl gymnemic acid. Male C57BL/6J mice that fed on either a normal diet, normal diet containing 1 g/kg GS(CON+GS) HFD, or HFD containing 1.0 g/kg GS(HFD+GS) for 4 weeks were used to test the initial anti-obesity effect of GS. Body weight gain and food intake, and serum levels about lipid and liver injury markers were measured. Histopathology of adipose tissue and liver stained with hematoxylin and eosin(H&E) and oil-red O were analyzed. After 4 weeks of GS extract feeding, intraperitoneal glucose tolerance test(IPGTT) was performed. Results: The methanol extracts of GS exerted significant anti-obesity effects in HFD+GS group. They decreased body weight gain, a lower food and energy efficiency ratio, and showed lower serum levels of total cholesterol(TC), triglyceride(TG), low-density lipoprotein(LDL)-cholesterol, very-low density lipoprotein(VLDL)-cholesterol and leptin compared with the HFD group. The decreases of abdominal as well as epididymal fat weight and adipocyte hypertrophy, lipid droplets in liver, and serum levels of aspartate aminotransferase(AST) and alanine transaminase(ALT) were also observed. The CON+GS group showed an effect of glucose homeostasis compared to the CON group. Conclusions: This study shows that GS provide the possibility as a key role in an initial anti-obesity effects feeding with a HFD.
基金This research was supported in part by Basic Science Research Program through National Research Foundation of Korea(NRF)funded by the Ministry of Education,Science and Technology(2013R1A1A2012006,2015R1D1A1A01058595)This research was supported in part by the MSIP(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2019-2016-0-00313)supervised by the IITP(Institute for Information and Communications Technology Planning&Evaluation)This work was supported in part by the Brain Korea 21 Plus Program(No.22A20130012814)funded by the National Research Foundation of Korea(NRF).
文摘In the Vehicular Ad-hoc NETworks(VANET),the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance.However,traditional VANETs face several security issues.We propose a new type of blockchain to resolve critical message dissemination issues in the VANET.We create a local blockchain for real-world event message exchange among vehicles within the boundary of a country,which is a new type of blockchain suitable for the VANET.We present a public blockchain that stores the node trustworthiness and message trustworthiness in a distributed ledger that is appropriate for secure message dissemination.
基金supported by the Characterization platform for advanced materials funded by the Korea Research Institute of Standards and Science(KRISS-2021-GP2021-0011)supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government MSIT(2021M3D1A20396541).
文摘Two-dimensional(2D)transition metal chalcogenides(TMC)and their heterostructures are appealing as building blocks in a wide range of electronic and optoelectronic devices,particularly futuristic memristive and synaptic devices for brain-inspired neuromorphic computing systems.The distinct properties such as high durability,electrical and optical tunability,clean surface,flexibility,and LEGO-staking capability enable simple fabrication with high integration density,energy-efficient operation,and high scalability.This review provides a thorough examination of high-performance memristors based on 2D TMCs for neuromorphic computing applications,including the promise of 2D TMC materials and heterostructures,as well as the state-of-the-art demonstration of memristive devices.The challenges and future prospects for the development of these emerging materials and devices are also discussed.The purpose of this review is to provide an outlook on the fabrication and characterization of neuromorphic memristors based on 2D TMCs.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF2018R1D1A1B07051249)Nano Material Technology Development Program(NRF-2015M3A7B6027970)of MSIP/NRF and Center for Integrated Smart Sensors funded by the Ministry of Science,ICTFuture Planning,Republic of Korea,as Global Frontier Project(CISS-2012M3A6A6054186).
文摘Flexible supercapacitor electrodes with high mass loading are crucial for obtaining favorable electrochemical performance but still challenging due to sluggish electron and ion transport.Herein,rationally designed CNT/MnO2/graphene-grafted carbon cloth electrodes are prepared by a“graft-deposit-coat”strategy.Due to the large surface area and good conductivity,graphene grafted on carbon cloth offers additional surface areas for the uniform deposition of MnO2(9.1 mg cm?2)and facilitates charge transfer.Meanwhile,the nanostructured MnO2 provides abundant electroactive sites and short ion transport distance,and CNT coated on MnO2 acts as interconnected conductive“highways”to accelerate the electron transport,significantly improving redox reaction kinetics.Benefiting from high mass loading of electroactive materials,favorable conductivity,and a porous structure,the electrode achieves large areal capacitances without compromising rate capability.The assembled asymmetric supercapacitor demonstrates a wide working voltage(2.2 V)and high energy density of 10.18 mWh cm?3.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIP)(No.NRF-2016R1A2B3015388)
文摘We investigated the occurrence and distribution of terrestrial-derived hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system and their potential impact on the application of the ring index of OH-GDGTs(RI-OH) as a sea surface temperature(SST) proxy in the eastern Yellow Sea. Thereby, we analyzed various samples collected along the Han River and from its surrounding areas(South Korea, n = 34). The OHGDGTs were found in all samples investigated. OH-GDGT-0 was the dominant OH-GDGT component in the estuary and marine samples while OH-GDGT-2 was generally dominant in the soils, the lake sediments and the river suspended particulate matter(SPM). Our results thus suggests a possible warm bias of the RI-OH-derived summer SSTs in the coastal zone to which a large amount of terrestrial organic matter is being supplied. Further studies are necessary to better assess the applicability of the RI-OH proxy in the eastern Yellow Sea.