Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi...Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues.展开更多
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosenso...In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy efficiency.When the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting power.However,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the system.Therefore,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is considered.This approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing failures.Finally,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail.展开更多
The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tum...The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning techniques.Computer-Aided Diagnostic(CAD)system aids in the diagnosis and shortens the time necessary to detect the tumor detected.The application of Deep Neural Networks(DNN)has also been exhibited as an excellent and effective method in classification and segmentation tasks.This research aims to separate lung cancers from images of Magnetic Resonance Imaging(MRI)with threshold segmentation.The Honey hook process categorizes lung cancer based on characteristics retrieved using several classifiers.Considering this principle,the work presents a solution for image compression utilizing a Deep Wave Auto-Encoder(DWAE).The combination of the two approaches significantly reduces the overall size of the feature set required for any future classification process performed using DNN.The proposed DWAE-DNN image classifier is applied to a lung imaging dataset with Radial Basis Function(RBF)classifier.The study reported promising results with an accuracy of 97.34%,whereas using the Decision Tree(DT)classifier has an accuracy of 94.24%.The proposed approach(DWAE-DNN)is found to classify the images with an accuracy of 98.67%,either as malignant or normal patients.In contrast to the accuracy requirements,the work also uses the benchmark standards like specificity,sensitivity,and precision to evaluate the efficiency of the network.It is found from an investigation that the DT classifier provides the maximum performance in the DWAE-DNN depending on the network’s performance on image testing,as shown by the data acquired by the categorizers themselves.展开更多
AIM To identify demographic, clinical, metabolomic, and lifestyle related predictors of relapse in adult ulcerative colitis(UC) patients.METHODS In this prospective pilot study, UC patients in clinical remission were ...AIM To identify demographic, clinical, metabolomic, and lifestyle related predictors of relapse in adult ulcerative colitis(UC) patients.METHODS In this prospective pilot study, UC patients in clinical remission were recruited and followed-up at 12 mo to assess a clinical relapse, or not. At baseline information on demographic and clinical parameters was collected. Serum and urine samples were collected for analysis of metabolomic assays using a combined direct infusion/liquid chromatography tandem mass spectrometry and nuclear magnetic resolution spectroscopy. Stool samples were also collected to measure fecal calprotectin(FCP). Dietary assessment was performed using a validated self-administered food frequency questionnaire. RESULTS Twenty patients were included(mean age: 42.7 ± 14.8 years, females: 55%). Seven patients(35%) experienced a clinical relapse during the follow-up period. While 6 patients(66.7%) with normal body weight developed a clinical relapse, 1 UC patient(9.1%) who was overweight/obese relapsed during the follow-up(P = 0.02). At baseline, poultry intake was significantly higher in patients who were still in remission during follow-up(0.9 oz vs 0.2 oz, P = 0.002). Five patients(71.4%) with FCP > 150 μg/g and 2 patients(15.4%) with normal FCP(≤ 150 μg/g) at baseline relapsed during the follow-up(P = 0.02). Interestingly, baseline urinary and serum metabolomic profiling of UC patients with or without clinical relapse within 12 mo showed a significant difference. The most important metabolites that were responsible for this discrimination were trans-aconitate, cystine and acetamide in urine, and 3-hydroxybutyrate, acetoacetate and acetone in serum. CONCLUSION A combination of baseline dietary intake, fecal calprotectin, and metabolomic factors are associated with risk of UC clinical relapse within 12 mo.展开更多
Genetic improvement for drought stress tolerance in rice involves the quantitative nature of the trait, which reflects the additive effects of several genetic loci throughout the genome. Yield components and related t...Genetic improvement for drought stress tolerance in rice involves the quantitative nature of the trait, which reflects the additive effects of several genetic loci throughout the genome. Yield components and related traits under stressed and well-water conditions were assayed in mapping populations derived from crosses of Azucena×IR64 and Azucena×Bala. To find the candidate rice genes underlying Quantitative Trait Loci (QTL) in these populations, we conducted in silico analysis of a candidate region flanked by the genetic markers RM212 and RM319 on chromosome 1, proximal to the semi-dwarf (sd1) locus. A total of 175 annotated genes were identified from this region. These included 48 genes annotated by functional homology to known genes, 23 pseudogenes, 24 ab initio predicted genes supported by an alignment match to an EST (Expressed sequence tag) of unknown function, and 80 hypothetical genes predicted solely by ab initio means. Among these, 16 candidate genes could potentially be involved in drought stress response.展开更多
Interconnection networks are hardware fabrics supporting communications between individual processors in multi-computers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracted si...Interconnection networks are hardware fabrics supporting communications between individual processors in multi-computers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracted significant research efforts to construct high-performance interconnection networks in contemporary multi-computers. The arrival process and destination dis- tribution of messages have great effects on network performance. With the aim of capturing the characteristics of the realistic traffic pattern and obtaining a deep understanding of the performance behaviour of interconnection networks, this paper presents an analytical model to investigate the message latency in adaptive-routed wormhole-switched torus networks where there exists hot-spot nodes and the message arrivals follow a batch arrival process. Each generated message has a given probability to be directed to the hot-spot node. The average degree of virtual channel multiplexing is computed by the GE/G/1/V queueing system with finite buffer capacity. We compare analytical results of message latency with those obtained through the simulation experiments in order to validate the accuracy of the derived model.展开更多
It is claimed that the formula used for calculating the tensile strength of a disk-shaped rock specimen in the Brazilian test is not accurate, because the formula is based on the 2-dimensional elastic theory and only ...It is claimed that the formula used for calculating the tensile strength of a disk-shaped rock specimen in the Brazilian test is not accurate, because the formula is based on the 2-dimensional elastic theory and only suitable for very long or very short cylin- ders. The Matlab software was used to obtain the 2-dimensional distribution of stress in the rock specimen for Brazilian test. Then the 2-dimensional stress distribution in Brazilian disk was analyzed by the Marc FEM software. It can be found that the results obtained by the two software packages can verify each other. Finally, the 3-dimensional elastic stress in the specimen was calculated. The re- sults demonstrate that the distribution of stress on the cross section of the specimen is similar to that in 2-dimension. However, the value of the stress on the cross section varies along the thickness of the specimen and the stress is bigger when getting closer to the end of the specimen. For the specimen with a height-to-diameter ratio of 1 and a Poisson’s ratio of 0.25, the tensile strength calculat- ed with the classical 2-D formula is 23.3% smaller than the real strength. Therefore, the classical 2-D formula is too conservative.展开更多
Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services w...Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.展开更多
When all the involved data in indefinite quadratic programs change simultaneously,we show the locally Lipschtiz continuity of the KKT set of the quadratic programming problem firstly, then we establish the locally Lip...When all the involved data in indefinite quadratic programs change simultaneously,we show the locally Lipschtiz continuity of the KKT set of the quadratic programming problem firstly, then we establish the locally Lipschtiz continuity of the KKT solution set. Finally, the similar conclusion for the corresponding optimal value function is obtained.展开更多
In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a c...In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality where this set changes over time. We introduce a traffic locality oriented route discovery algorithm with delay, TLRDA-D. It utilises traffic locality by establishing a neighbourhood that includes the most likely destinations for a particular source node. The source node broadcasts the route request according to the original routing used. However, each intermediate node broadcasts the route request with a delay beyond this boundary to give priority for route requests that are travelling within their own source node’s neighbourhood region. This ap-proach improves the end-to-end delay and packet loss, as it generates less contention throughout the network. TLRDA-D is analysed using simulation to study the effect of adding a delay to route request propagation and to decide on the amount of the added delay.展开更多
Introducing carbon trading into electricity market can convert carbon dioxide into schedulable resources with economic value.However,the randomness of wind power generation puts forward higher requirements for electri...Introducing carbon trading into electricity market can convert carbon dioxide into schedulable resources with economic value.However,the randomness of wind power generation puts forward higher requirements for electricity market transactions.Therefore,the carbon trading market is introduced into the wind power market,and a new form of low-carbon economic dispatch model is developed.First,the economic dispatch goal of wind power is be considered.It is projected to save money and reduce the cost of power generation for the system.The model includes risk operating costs to account for the impact of wind power output variability on the system,as well as wind farm negative efficiency operating costs to account for the loss caused by wind abandonment.The model also employs carbon trading market metrics to achieve the goal of lowering system carbon emissions,and analyze the impact of different carbon trading prices on the system.A low-carbon economic dispatch model for the wind power market is implemented based on the following two goals.Finally,the solution is optimised using the Ant-lion optimisation method,which combines Levi's flight mechanism and golden sine.The proposed model and algorithm's rationality is proven through the use of cases.展开更多
Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they ...Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they propagate through deeper layers of the network,leading to misclassifications.Moreover,image denoising compromises the classification accuracy of original examples.To address these challenges in AE defense through image denoising,this paper proposes a novel AE detection technique.The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network(CNN)network structures.The used detector model integrates the classification results of different models as the input to the detector and calculates the final output of the detector based on a machine-learning voting algorithm.By analyzing the discrepancy between predictions made by the model on original examples and denoised examples,AEs are detected effectively.This technique reduces computational overhead without modifying the model structure or parameters,effectively avoiding the error amplification caused by denoising.The proposed approach demonstrates excellent detection performance against mainstream AE attacks.Experimental results show outstanding detection performance in well-known AE attacks,including Fast Gradient Sign Method(FGSM),Basic Iteration Method(BIM),DeepFool,and Carlini&Wagner(C&W),achieving a 94%success rate in FGSM detection,while only reducing the accuracy of clean examples by 4%.展开更多
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%.展开更多
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t...The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio.展开更多
Sensors produce a large amount of multivariate time series data to record the states of Internet of Things(IoT)systems.Multivariate time series timestamp anomaly detection(TSAD)can identify timestamps of attacks and m...Sensors produce a large amount of multivariate time series data to record the states of Internet of Things(IoT)systems.Multivariate time series timestamp anomaly detection(TSAD)can identify timestamps of attacks and malfunctions.However,it is necessary to determine which sensor or indicator is abnormal to facilitate a more detailed diagnosis,a process referred to as fine-grained anomaly detection(FGAD).Although further FGAD can be extended based on TSAD methods,existing works do not provide a quantitative evaluation,and the performance is unknown.Therefore,to tackle the FGAD problem,this paper first verifies that the TSAD methods achieve low performance when applied to the FGAD task directly because of the excessive fusion of features and the ignoring of the relationship’s dynamic changes between indicators.Accordingly,this paper proposes a mul-tivariate time series fine-grained anomaly detection(MFGAD)framework.To avoid excessive fusion of features,MFGAD constructs two sub-models to independently identify the abnormal timestamp and abnormal indicator instead of a single model and then combines the two kinds of abnormal results to detect the fine-grained anomaly.Based on this framework,an algorithm based on Graph Attention Neural Network(GAT)and Attention Convolutional Long-Short Term Memory(A-ConvLSTM)is proposed,in which GAT learns temporal features of multiple indicators to detect abnormal timestamps and A-ConvLSTM captures the dynamic relationship between indicators to identify abnormal indicators.Extensive simulations on a real-world dataset demonstrate that the proposed algorithm can achieve a higher F1 score and hit rate than the extension of existing TSAD methods with the benefit of two independent sub-models for timestamp and indicator detection.展开更多
基金This research has been supported by the National Science Foundation(under grant#1723596)the National Security Agency(under grant#H98230-17-1-0355).
文摘Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues.
基金supported by the National Natural Science Foundation of China(NSFC)(GrantNo.62172058)the Hunan ProvincialNatural Science Foundation of China(Grant Nos.2022JJ10052,2022JJ30624).
文摘In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy efficiency.When the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting power.However,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the system.Therefore,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is considered.This approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing failures.Finally,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail.
基金the Researchers Supporting Project Number(RSP2023R 509)King Saud University,Riyadh,Saudi ArabiaThis work was supported in part by the Higher Education Sprout Project from the Ministry of Education(MOE)and National Science and Technology Council,Taiwan,(109-2628-E-224-001-MY3)in part by Isuzu Optics Corporation.Dr.Shih-Yu Chen is the corresponding author.
文摘The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning techniques.Computer-Aided Diagnostic(CAD)system aids in the diagnosis and shortens the time necessary to detect the tumor detected.The application of Deep Neural Networks(DNN)has also been exhibited as an excellent and effective method in classification and segmentation tasks.This research aims to separate lung cancers from images of Magnetic Resonance Imaging(MRI)with threshold segmentation.The Honey hook process categorizes lung cancer based on characteristics retrieved using several classifiers.Considering this principle,the work presents a solution for image compression utilizing a Deep Wave Auto-Encoder(DWAE).The combination of the two approaches significantly reduces the overall size of the feature set required for any future classification process performed using DNN.The proposed DWAE-DNN image classifier is applied to a lung imaging dataset with Radial Basis Function(RBF)classifier.The study reported promising results with an accuracy of 97.34%,whereas using the Decision Tree(DT)classifier has an accuracy of 94.24%.The proposed approach(DWAE-DNN)is found to classify the images with an accuracy of 98.67%,either as malignant or normal patients.In contrast to the accuracy requirements,the work also uses the benchmark standards like specificity,sensitivity,and precision to evaluate the efficiency of the network.It is found from an investigation that the DT classifier provides the maximum performance in the DWAE-DNN depending on the network’s performance on image testing,as shown by the data acquired by the categorizers themselves.
基金Supported by Alberta Innovates-Bio Solutionsa graduate studentship from Alberta Innovates-Health Solutions(to Keshteli AH)
文摘AIM To identify demographic, clinical, metabolomic, and lifestyle related predictors of relapse in adult ulcerative colitis(UC) patients.METHODS In this prospective pilot study, UC patients in clinical remission were recruited and followed-up at 12 mo to assess a clinical relapse, or not. At baseline information on demographic and clinical parameters was collected. Serum and urine samples were collected for analysis of metabolomic assays using a combined direct infusion/liquid chromatography tandem mass spectrometry and nuclear magnetic resolution spectroscopy. Stool samples were also collected to measure fecal calprotectin(FCP). Dietary assessment was performed using a validated self-administered food frequency questionnaire. RESULTS Twenty patients were included(mean age: 42.7 ± 14.8 years, females: 55%). Seven patients(35%) experienced a clinical relapse during the follow-up period. While 6 patients(66.7%) with normal body weight developed a clinical relapse, 1 UC patient(9.1%) who was overweight/obese relapsed during the follow-up(P = 0.02). At baseline, poultry intake was significantly higher in patients who were still in remission during follow-up(0.9 oz vs 0.2 oz, P = 0.002). Five patients(71.4%) with FCP > 150 μg/g and 2 patients(15.4%) with normal FCP(≤ 150 μg/g) at baseline relapsed during the follow-up(P = 0.02). Interestingly, baseline urinary and serum metabolomic profiling of UC patients with or without clinical relapse within 12 mo showed a significant difference. The most important metabolites that were responsible for this discrimination were trans-aconitate, cystine and acetamide in urine, and 3-hydroxybutyrate, acetoacetate and acetone in serum. CONCLUSION A combination of baseline dietary intake, fecal calprotectin, and metabolomic factors are associated with risk of UC clinical relapse within 12 mo.
基金Project supported partly by the Rockefeller Foundation thesis dis-sertation training grant and the National Hi-Tech Research and De-velopment Program (863) of China
文摘Genetic improvement for drought stress tolerance in rice involves the quantitative nature of the trait, which reflects the additive effects of several genetic loci throughout the genome. Yield components and related traits under stressed and well-water conditions were assayed in mapping populations derived from crosses of Azucena×IR64 and Azucena×Bala. To find the candidate rice genes underlying Quantitative Trait Loci (QTL) in these populations, we conducted in silico analysis of a candidate region flanked by the genetic markers RM212 and RM319 on chromosome 1, proximal to the semi-dwarf (sd1) locus. A total of 175 annotated genes were identified from this region. These included 48 genes annotated by functional homology to known genes, 23 pseudogenes, 24 ab initio predicted genes supported by an alignment match to an EST (Expressed sequence tag) of unknown function, and 80 hypothetical genes predicted solely by ab initio means. Among these, 16 candidate genes could potentially be involved in drought stress response.
基金supported by the UK EPSRC research grant(No. EP/C525027/1) Nuffield Foundation (No. NAL/00682/G).
文摘Interconnection networks are hardware fabrics supporting communications between individual processors in multi-computers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracted significant research efforts to construct high-performance interconnection networks in contemporary multi-computers. The arrival process and destination dis- tribution of messages have great effects on network performance. With the aim of capturing the characteristics of the realistic traffic pattern and obtaining a deep understanding of the performance behaviour of interconnection networks, this paper presents an analytical model to investigate the message latency in adaptive-routed wormhole-switched torus networks where there exists hot-spot nodes and the message arrivals follow a batch arrival process. Each generated message has a given probability to be directed to the hot-spot node. The average degree of virtual channel multiplexing is computed by the GE/G/1/V queueing system with finite buffer capacity. We compare analytical results of message latency with those obtained through the simulation experiments in order to validate the accuracy of the derived model.
基金[This work was financially supported by the Fundamental Science Research Fund of Southwest Jiaotong University (No.2004B13).
文摘It is claimed that the formula used for calculating the tensile strength of a disk-shaped rock specimen in the Brazilian test is not accurate, because the formula is based on the 2-dimensional elastic theory and only suitable for very long or very short cylin- ders. The Matlab software was used to obtain the 2-dimensional distribution of stress in the rock specimen for Brazilian test. Then the 2-dimensional stress distribution in Brazilian disk was analyzed by the Marc FEM software. It can be found that the results obtained by the two software packages can verify each other. Finally, the 3-dimensional elastic stress in the specimen was calculated. The re- sults demonstrate that the distribution of stress on the cross section of the specimen is similar to that in 2-dimension. However, the value of the stress on the cross section varies along the thickness of the specimen and the stress is bigger when getting closer to the end of the specimen. For the specimen with a height-to-diameter ratio of 1 and a Poisson’s ratio of 0.25, the tensile strength calculat- ed with the classical 2-D formula is 23.3% smaller than the real strength. Therefore, the classical 2-D formula is too conservative.
基金supported in part by the National Natural Science Foundation of China (No.62002113)the Natural Science Foundation of Hunan Province (No. 2021JJ40122).
文摘Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.
基金Supported by the Natural Science Foundation of Jiangsu Education Bureau under Grant No.09KJB140010the Project Prepared for National Natural Science Foundation of Xuzhou Normal University under Grant No.08XLY03
基金Supported by the National Natural Science Foundation of China(10571141,70971109,71371152)supported by the Talents Fund of Xi’an Polytechnic University(BS1320)the Mathematics Discipline Development Fund of Xi’an Ploytechnic University(107090701)
文摘When all the involved data in indefinite quadratic programs change simultaneously,we show the locally Lipschtiz continuity of the KKT set of the quadratic programming problem firstly, then we establish the locally Lipschtiz continuity of the KKT solution set. Finally, the similar conclusion for the corresponding optimal value function is obtained.
文摘In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality where this set changes over time. We introduce a traffic locality oriented route discovery algorithm with delay, TLRDA-D. It utilises traffic locality by establishing a neighbourhood that includes the most likely destinations for a particular source node. The source node broadcasts the route request according to the original routing used. However, each intermediate node broadcasts the route request with a delay beyond this boundary to give priority for route requests that are travelling within their own source node’s neighbourhood region. This ap-proach improves the end-to-end delay and packet loss, as it generates less contention throughout the network. TLRDA-D is analysed using simulation to study the effect of adding a delay to route request propagation and to decide on the amount of the added delay.
基金financially supported by the German Research Foundation(509134333)the Australian Research Council(DP220103222)the National Natural Science Foundation of China(11674399)。
基金National Natural Science Foundation of China,Grant/Award Number:51677059。
文摘Introducing carbon trading into electricity market can convert carbon dioxide into schedulable resources with economic value.However,the randomness of wind power generation puts forward higher requirements for electricity market transactions.Therefore,the carbon trading market is introduced into the wind power market,and a new form of low-carbon economic dispatch model is developed.First,the economic dispatch goal of wind power is be considered.It is projected to save money and reduce the cost of power generation for the system.The model includes risk operating costs to account for the impact of wind power output variability on the system,as well as wind farm negative efficiency operating costs to account for the loss caused by wind abandonment.The model also employs carbon trading market metrics to achieve the goal of lowering system carbon emissions,and analyze the impact of different carbon trading prices on the system.A low-carbon economic dispatch model for the wind power market is implemented based on the following two goals.Finally,the solution is optimised using the Ant-lion optimisation method,which combines Levi's flight mechanism and golden sine.The proposed model and algorithm's rationality is proven through the use of cases.
基金supported in part by the Natural Science Foundation of Hunan Province under Grant Nos.2023JJ30316 and 2022JJ2029in part by a project supported by Scientific Research Fund of Hunan Provincial Education Department under Grant No.22A0686+1 种基金in part by the National Natural Science Foundation of China under Grant No.62172058Researchers Supporting Project(No.RSP2023R102)King Saud University,Riyadh,Saudi Arabia.
文摘Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they propagate through deeper layers of the network,leading to misclassifications.Moreover,image denoising compromises the classification accuracy of original examples.To address these challenges in AE defense through image denoising,this paper proposes a novel AE detection technique.The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network(CNN)network structures.The used detector model integrates the classification results of different models as the input to the detector and calculates the final output of the detector based on a machine-learning voting algorithm.By analyzing the discrepancy between predictions made by the model on original examples and denoised examples,AEs are detected effectively.This technique reduces computational overhead without modifying the model structure or parameters,effectively avoiding the error amplification caused by denoising.The proposed approach demonstrates excellent detection performance against mainstream AE attacks.Experimental results show outstanding detection performance in well-known AE attacks,including Fast Gradient Sign Method(FGSM),Basic Iteration Method(BIM),DeepFool,and Carlini&Wagner(C&W),achieving a 94%success rate in FGSM detection,while only reducing the accuracy of clean examples by 4%.
基金This research was supported in part by Basic Science Research Program through the National Research Foundation of Korea(NRF),funded by the Ministry of Education(NRF-2021R1A6A1A03039493)in part by the NRF grant funded by the Korea government(MSIT)(NRF-2022R1A2C1004401).
文摘Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%.
文摘The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio.
基金supported in part by the National Natural Science Foundation of China under Grant 62272062the Researchers Supporting Project number.(RSP2023R102)King Saud University+5 种基金Riyadh,Saudi Arabia,the Open Research Fund of the Hunan Provincial Key Laboratory of Network Investigational Technology under Grant 2018WLZC003the National Science Foundation of Hunan Province under Grant 2020JJ2029the Hunan Provincial Key Research and Development Program under Grant 2022GK2019the Science Fund for Creative Research Groups of Hunan Province under Grant 2020JJ1006the Scientific Research Fund of Hunan Provincial Transportation Department under Grant 202143the Open Fund of Key Laboratory of Safety Control of Bridge Engineering,Ministry of Education(Changsha University of Science Technology)under Grant 21KB07.
文摘Sensors produce a large amount of multivariate time series data to record the states of Internet of Things(IoT)systems.Multivariate time series timestamp anomaly detection(TSAD)can identify timestamps of attacks and malfunctions.However,it is necessary to determine which sensor or indicator is abnormal to facilitate a more detailed diagnosis,a process referred to as fine-grained anomaly detection(FGAD).Although further FGAD can be extended based on TSAD methods,existing works do not provide a quantitative evaluation,and the performance is unknown.Therefore,to tackle the FGAD problem,this paper first verifies that the TSAD methods achieve low performance when applied to the FGAD task directly because of the excessive fusion of features and the ignoring of the relationship’s dynamic changes between indicators.Accordingly,this paper proposes a mul-tivariate time series fine-grained anomaly detection(MFGAD)framework.To avoid excessive fusion of features,MFGAD constructs two sub-models to independently identify the abnormal timestamp and abnormal indicator instead of a single model and then combines the two kinds of abnormal results to detect the fine-grained anomaly.Based on this framework,an algorithm based on Graph Attention Neural Network(GAT)and Attention Convolutional Long-Short Term Memory(A-ConvLSTM)is proposed,in which GAT learns temporal features of multiple indicators to detect abnormal timestamps and A-ConvLSTM captures the dynamic relationship between indicators to identify abnormal indicators.Extensive simulations on a real-world dataset demonstrate that the proposed algorithm can achieve a higher F1 score and hit rate than the extension of existing TSAD methods with the benefit of two independent sub-models for timestamp and indicator detection.
基金The National Key R&D Program of China(No.2018YFC0830200)the Open Research Fund from State Key Laboratory of Smart Grid Protection and Control(No.NARI-T-2-2019189)+1 种基金Rapid Support Project(No.61406190120)the Fundamental Research Funds for the Central Universities(No.2242021k10011).