The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ...The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.展开更多
Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment s...Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment service, who are experiencing cognitive impairment but do not receive a dementia diagnosis. Methods: A qualitative design was employed. Semi-structured interviews were conducted with a purposeful sample of thirteen participants recruited from a memory assessment service. Thematic analysis, that was data driven and inductive, was undertaken to analyse the data. Results: Two global themes were developed. “Understanding exercise and sleep as part of my lifestyle” was made up of themes representing how participants viewed exercise and sleep as part of their lifestyles in terms of acknowledging the positive impacts and the barriers to exercise and sleep. The second global theme “Understanding my experience of the healthy lifestyle intervention” was made up of themes that identified the positive impact of the intervention regarding improving health and wellbeing, enabling validation of proactive behaviours and motivation to engage in healthy lifestyle behaviours, so promoting positive behaviour change. Conclusion: Patients experiencing age-related cognitive impairment, applied and benefited from a healthy lifestyle Fitbit-based intervention to facilitate and promote physical activity, better sleep hygiene and healthy lifestyles.展开更多
The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas a...The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas and stars of our own Milkyway Galaxy. This research builds on work from a previous paper that sought to impute this missing galactic information using Inpainting, polar transforms and Linear Regression ANNs. In that paper, the author only attempted to impute the data in the Northern hemisphere using the ANN model, which subsequently confirmed the existence of the Great Attractor and the homogeneity of the Universe. In this paper, the author has imputed the Southern Hemisphere and discovered a region that is mostly devoid of stars. Since this area appears to be the counterpart to the Great Attractor, the author refers to it as the Great Repeller and postulates that it is an area of physical repulsion, inline with the work of GerdPommerenke and others. Finally, the paper investigates large scale structures in the imputed galaxies.展开更多
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri...One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility.展开更多
Background:In recent years,there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs.However,t...Background:In recent years,there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs.However,there is a lack of psychometric evaluation for instruments assessing smartphone addiction and social media addiction in Thailand.The present study evaluated the psychometric properties and gender measurement invariance of the Thai version of the Smartphone Application-Based Addiction Scale(SABAS)and Bergen Social Media Addiction Scale(BSMAS).Method:A total of 801 Thai university students participated in an online survey from January 2022 to July 2022 which included demographic information,SABAS,BSMAS,and the Internet Gaming Disorder Scale-Short Form(IGDS9-SF).Results:Confirmatory Factor Analyses(CFAs)found that both the SABAS and BSMAS had a one-factor structure.Findings demonstrated adequate psychometric properties of both instruments and also supported measurement invariance across genders.Moreover,scores on the SABAS and BSMAS were correlated with scores on the IGDS9-SF.Conclusion:The results indicated that the SABAS and BSMAS are useful psychometric instruments for assessing the risk of smartphone addiction and social media addiction among Thai young adults.展开更多
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net...Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues.展开更多
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e...In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings.展开更多
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re...The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.展开更多
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t...Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to 7G.Furthermore,it improves the array gain and directivity,increasing the detection range and angular resolution of radar systems.This study proposes two highly efficient SLL reduction techniques.These techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,respectively.The convolution process determines the element’s excitations while the GA optimizes the element spacing.For M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,respectively.When the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher SLL.Tomitigate the increased HPBWof the odd and even excitations,the element spacing is optimized using the GA.Thereby,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the SLL.Furthermore,for extreme SLL reduction,the DConv/GA is introduced.In this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation vectors.It provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.展开更多
Research Background: Compared to the general population, people experiencing age-related cognitive decline are more likely to have low levels of physical activity and sleep problems. Sufficient physical activity and q...Research Background: Compared to the general population, people experiencing age-related cognitive decline are more likely to have low levels of physical activity and sleep problems. Sufficient physical activity and quality sleep are protective factors against cognitive decline and poor health and can improve coping with stressors. The “Active Feedback” intervention comprises a wearable activity and sleep tracker (Fitbit), access to Fitbit software healthy lifestyle software apps;one session with Memory Assessment Service (MAS) staff providing physical activity and sleep hygiene advice and two further engagement, discussion, and feedback sessions. Purpose/Aim: This study investigates the acceptability and feasibility of Active Feedback and the effect on stress, mental wellbeing, and sleep quality, and the links between these factors. Methods: An open-label patient cohort design with no control group was used. Pre-intervention, 4-week and 8-week intervention assessments were performed using participant self-report measures: Perceived Stress Scale (PSS), Warwick-Edinburgh Mental Wellbeing Scale (WEMWBS), and Sleep Conditioning Index (SCI). Twenty-five participants completed an eight-week three-session intervention (18 males and 7 females), with the age range of 66 - 84 years old, and average age of 73.8 years (SD = 5.09). Fifteen participants had a diagnosis of MCI, ten participants did not. Results: There were non-significant improvements in SCI scores from 21.0 (SD = 8.84) to 21.6 (SD = 6.20) at 8 weeks, PSS scores from 17.5 (SD = 5.89) to 17.0 (SD = 6.20) at 8 weeks, and WEMWBS scores from 46.9 (SD = 9.23) to 48.8 (SD = 9.69) at 8 weeks. There were negative correlations between WEMWBS and PSS. Conclusion: Active Feedback intervention was found to be feasible and acceptable. Active Feedback could be enhanced to include motivational interviewing and goal setting.展开更多
Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when deal...Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field.展开更多
What should academic institutions be doing in order to benefit students,the community at large,and society in the new era?Particularly,as computing is impacting all aspects of human society,it also brings many challen...What should academic institutions be doing in order to benefit students,the community at large,and society in the new era?Particularly,as computing is impacting all aspects of human society,it also brings many challenges and opportunities for the academic departments of computer science.Some of these challenges include the increasing impact of software on society,issues involving privacy and data abuse,and ethical issues concerning AI.Towards addressing these challenges,the Korea Advanced Institute of Science and Technology(KAIST)leverages its position as an educator in order to train the future computing workforce to be more aware of these issues.To achieve this goal,KAIST mainly adopts three strategies:Combining science&technology and humanities together;putting academy and industry together;training software experts while making them understand people and the world.展开更多
Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on...Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on deep learning for the localization and classification of thyroid nodules.First,we propose the multitask TransUnet,which combines the TransUnet encoder and decoder with multitask learning.Second,we propose the DualLoss function,tailored to the thyroid nodule localization and classification tasks.It balances the learning of the localization and classification tasks to help improve the model’s generalization ability.Third,we introduce strategies for augmenting the data.Finally,we submit a novel deep learning model,ThyroidNet,to accurately detect thyroid nodules.Results:ThyroidNet was evaluated on private datasets and was comparable to other existing methods,including U-Net and TransUnet.Experimental results show that ThyroidNet outperformed these methods in localizing and classifying thyroid nodules.It achieved improved accuracy of 3.9%and 1.5%,respectively.Conclusion:ThyroidNet significantly improves the clinical diagnosis of thyroid nodules and supports medical image analysis tasks.Future research directions include optimization of the model structure,expansion of the dataset size,reduction of computational complexity and memory requirements,and exploration of additional applications of ThyroidNet in medical image analysis.展开更多
The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environment...The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems.展开更多
Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the ...Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the joint impact of a pier and an abutment in proximity to one another on scour.This study conducted laboratory experiments and flow analyses to examine the interaction of piers and abutments and their effect on clear-water scour.The experiments were conducted in a rectangular laboratory flume.They included 18 main tests(with a combination of different types of piers and abutments)and five control tests(with individual piers or abutments).Three pier types(a rectangular pier with a rounded edge,a group of three cylindrical piers,and a single cylindrical pier)and two abutment types(a wingewall abutment and a semicircular abutment)were used.An acoustic Doppler velocimeter was used to measure the three-dimensional flow velocity for analyses of streamline,velocity magnitude,vertical velocity,and bed shear stress.The results showed that the velocity near the pier and abutment increased by up to 80%.The maximum scour depth around the abutment increased by up to 19%.In contrast,the maximum scour depth around the pier increased significantly by up to l71%.The presence of the pier in the vicinity of the abutment led to an increase in the scour hole volume by up to 87%relative to the case with a solitary abutment.Empirical equations were also derived to accurately estimate the maximum scour depth at the pier adjacent to the abutment.展开更多
Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from li...Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from limitations such as uncertainty and imprecise data, leading to late-stage diagnoses. To address this, various expert systems have been developed, but many rely on type-1 fuzzy logic and lack mobile-based applications for data collection and feedback to healthcare practitioners. This research investigates the development of an Enhanced Mobile-based Fuzzy Expert system (EMFES) for breast cancer pre-growth prognosis. The study explores the use of type-2 fuzzy logic to enhance accuracy and model uncertainty effectively. Additionally, it evaluates the advantages of employing the python programming language over java for implementation and considers specific risk factors for data collection. The research aims to dynamically generate fuzzy rules, adapting to evolving breast cancer research and patient data. Key research questions focus on the comparative effectiveness of type-2 fuzzy logic, the handling of uncertainty and imprecise data, the integration of mobile-based features, the choice of programming language, and the creation of dynamic fuzzy rules. Furthermore, the study examines the differences between the Mamdani Inference System and the Sugeno Fuzzy Inference method and explores challenges and opportunities in deploying the EMFES on mobile devices. The research identifies a critical gap in existing breast cancer diagnostic systems, emphasizing the need for a comprehensive, mobile-enabled, and adaptable solution by developing an EMFES that leverages Type-2 fuzzy logic, the Sugeno Inference Algorithm, Python Programming, and dynamic fuzzy rule generation. This study seeks to enhance early breast cancer detection and ultimately reduce breast cancer-related mortality.展开更多
Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source na...Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source nature.There are many android malware detection techniques available to exploit the source code andfind associated components during execution time.To obtain a better result we create a hybrid technique merging static and dynamic processes.In this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing system.In the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given approach.The Android Sensitive Permission is one major key point to be considered while detecting malware.We select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or benign.Thefinal goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.展开更多
The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communi...The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communication protocols.This brings forth new methods and models to fuse the information yielded by the various industrial plant elements and generates emerging security challenges that we have to face,providing ad-hoc functions for scheduling and guaranteeing the network operations.Recently,the large development of SoftwareDefined Networking(SDN)and Artificial Intelligence(AI)technologies have made feasible the design and control of scalable and secure IIoT networks.This paper studies how AI and SDN technologies combined can be leveraged towards improving the security and functionality of these IIoT networks.After surveying the state-of-the-art research efforts in the subject,the paper introduces a candidate architecture for AI-enabled Software-Defined IIoT Network(AI-SDIN)that divides the traditional industrial networks into three functional layers.And with this aim in mind,key technologies(Blockchain-based Data Sharing,Intelligent Wireless Data Sensing,Edge Intelligence,Time-Sensitive Networks,Integrating SDN&TSN,Distributed AI)and improve applications based on AISDIN are also discussed.Further,the paper also highlights new opportunities and potential research challenges in control and automation of IIoT networks.展开更多
Addressing classification and prediction challenges, tree ensemble models have gained significant importance. Boosting ensemble techniques are commonly employed for forecasting Type-II diabetes mellitus. Light Gradien...Addressing classification and prediction challenges, tree ensemble models have gained significant importance. Boosting ensemble techniques are commonly employed for forecasting Type-II diabetes mellitus. Light Gradient Boosting Machine (LightGBM) is a widely used algorithm known for its leaf growth strategy, loss reduction, and enhanced training precision. However, LightGBM is prone to overfitting. In contrast, CatBoost utilizes balanced base predictors known as decision tables, which mitigate overfitting risks and significantly improve testing time efficiency. CatBoost’s algorithm structure counteracts gradient boosting biases and incorporates an overfitting detector to stop training early. This study focuses on developing a hybrid model that combines LightGBM and CatBoost to minimize overfitting and improve accuracy by reducing variance. For the purpose of finding the best hyperparameters to use with the underlying learners, the Bayesian hyperparameter optimization method is used. By fine-tuning the regularization parameter values, the hybrid model effectively reduces variance (overfitting). Comparative evaluation against LightGBM, CatBoost, XGBoost, Decision Tree, Random Forest, AdaBoost, and GBM algorithms demonstrates that the hybrid model has the best F1-score (99.37%), recall (99.25%), and accuracy (99.37%). Consequently, the proposed framework holds promise for early diabetes prediction in the healthcare industry and exhibits potential applicability to other datasets sharing similarities with diabetes.展开更多
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca...Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.展开更多
基金supported by project TRANSACT funded under H2020-EU.2.1.1.-INDUSTRIAL LEADERSHIP-Leadership in Enabling and Industrial Technologies-Information and Communication Technologies(Grant Agreement ID:101007260).
文摘The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
文摘Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment service, who are experiencing cognitive impairment but do not receive a dementia diagnosis. Methods: A qualitative design was employed. Semi-structured interviews were conducted with a purposeful sample of thirteen participants recruited from a memory assessment service. Thematic analysis, that was data driven and inductive, was undertaken to analyse the data. Results: Two global themes were developed. “Understanding exercise and sleep as part of my lifestyle” was made up of themes representing how participants viewed exercise and sleep as part of their lifestyles in terms of acknowledging the positive impacts and the barriers to exercise and sleep. The second global theme “Understanding my experience of the healthy lifestyle intervention” was made up of themes that identified the positive impact of the intervention regarding improving health and wellbeing, enabling validation of proactive behaviours and motivation to engage in healthy lifestyle behaviours, so promoting positive behaviour change. Conclusion: Patients experiencing age-related cognitive impairment, applied and benefited from a healthy lifestyle Fitbit-based intervention to facilitate and promote physical activity, better sleep hygiene and healthy lifestyles.
文摘The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas and stars of our own Milkyway Galaxy. This research builds on work from a previous paper that sought to impute this missing galactic information using Inpainting, polar transforms and Linear Regression ANNs. In that paper, the author only attempted to impute the data in the Northern hemisphere using the ANN model, which subsequently confirmed the existence of the Great Attractor and the homogeneity of the Universe. In this paper, the author has imputed the Southern Hemisphere and discovered a region that is mostly devoid of stars. Since this area appears to be the counterpart to the Great Attractor, the author refers to it as the Great Repeller and postulates that it is an area of physical repulsion, inline with the work of GerdPommerenke and others. Finally, the paper investigates large scale structures in the imputed galaxies.
基金The Faculty of Information Science and Technology,Universiti Kebangsaan Malaysia,provided funding for this research through the Research Grant“An Intelligent 4IR Mobile Technology for Express Bus Safety System Scheme DCP-2017-020/2”.
文摘One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility.
基金This research was funded by the Ministry of Science and Technology,Taiwan(MOST 110-2410-H-006-115)the Higher Education Sprout Project,Ministry of Education to the Headquarters of University Advancement at National Cheng Kung University(NCKU)the 2021 Southeast and South Asia and Taiwan Universities Joint Research Scheme(NCKU 31),and the E-Da Hospital(EDAHC111004).
文摘Background:In recent years,there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs.However,there is a lack of psychometric evaluation for instruments assessing smartphone addiction and social media addiction in Thailand.The present study evaluated the psychometric properties and gender measurement invariance of the Thai version of the Smartphone Application-Based Addiction Scale(SABAS)and Bergen Social Media Addiction Scale(BSMAS).Method:A total of 801 Thai university students participated in an online survey from January 2022 to July 2022 which included demographic information,SABAS,BSMAS,and the Internet Gaming Disorder Scale-Short Form(IGDS9-SF).Results:Confirmatory Factor Analyses(CFAs)found that both the SABAS and BSMAS had a one-factor structure.Findings demonstrated adequate psychometric properties of both instruments and also supported measurement invariance across genders.Moreover,scores on the SABAS and BSMAS were correlated with scores on the IGDS9-SF.Conclusion:The results indicated that the SABAS and BSMAS are useful psychometric instruments for assessing the risk of smartphone addiction and social media addiction among Thai young adults.
基金supported in part by the National Key Research and Development Program of China (Grant No.2020YFA0711301)in part by the National Natural Science Foundation of China (Grant No.62341110 and U22A2002)in part by the Suzhou Science and Technology Project。
文摘Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues.
基金the Deanship of Scientific Research at King Khalid University for funding this work through large group research project under Grant Number RGP2/474/44.
文摘In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings.
基金This work is supported by EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab,Prince Sultan University,Kingdom of Saudi Arabia,by paying the APC.
文摘The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.
基金Research Supporting Project Number(RSPD2023R 585),King Saud University,Riyadh,Saudi Arabia.
文摘Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to 7G.Furthermore,it improves the array gain and directivity,increasing the detection range and angular resolution of radar systems.This study proposes two highly efficient SLL reduction techniques.These techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,respectively.The convolution process determines the element’s excitations while the GA optimizes the element spacing.For M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,respectively.When the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher SLL.Tomitigate the increased HPBWof the odd and even excitations,the element spacing is optimized using the GA.Thereby,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the SLL.Furthermore,for extreme SLL reduction,the DConv/GA is introduced.In this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation vectors.It provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.
文摘Research Background: Compared to the general population, people experiencing age-related cognitive decline are more likely to have low levels of physical activity and sleep problems. Sufficient physical activity and quality sleep are protective factors against cognitive decline and poor health and can improve coping with stressors. The “Active Feedback” intervention comprises a wearable activity and sleep tracker (Fitbit), access to Fitbit software healthy lifestyle software apps;one session with Memory Assessment Service (MAS) staff providing physical activity and sleep hygiene advice and two further engagement, discussion, and feedback sessions. Purpose/Aim: This study investigates the acceptability and feasibility of Active Feedback and the effect on stress, mental wellbeing, and sleep quality, and the links between these factors. Methods: An open-label patient cohort design with no control group was used. Pre-intervention, 4-week and 8-week intervention assessments were performed using participant self-report measures: Perceived Stress Scale (PSS), Warwick-Edinburgh Mental Wellbeing Scale (WEMWBS), and Sleep Conditioning Index (SCI). Twenty-five participants completed an eight-week three-session intervention (18 males and 7 females), with the age range of 66 - 84 years old, and average age of 73.8 years (SD = 5.09). Fifteen participants had a diagnosis of MCI, ten participants did not. Results: There were non-significant improvements in SCI scores from 21.0 (SD = 8.84) to 21.6 (SD = 6.20) at 8 weeks, PSS scores from 17.5 (SD = 5.89) to 17.0 (SD = 6.20) at 8 weeks, and WEMWBS scores from 46.9 (SD = 9.23) to 48.8 (SD = 9.69) at 8 weeks. There were negative correlations between WEMWBS and PSS. Conclusion: Active Feedback intervention was found to be feasible and acceptable. Active Feedback could be enhanced to include motivational interviewing and goal setting.
文摘Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field.
文摘What should academic institutions be doing in order to benefit students,the community at large,and society in the new era?Particularly,as computing is impacting all aspects of human society,it also brings many challenges and opportunities for the academic departments of computer science.Some of these challenges include the increasing impact of software on society,issues involving privacy and data abuse,and ethical issues concerning AI.Towards addressing these challenges,the Korea Advanced Institute of Science and Technology(KAIST)leverages its position as an educator in order to train the future computing workforce to be more aware of these issues.To achieve this goal,KAIST mainly adopts three strategies:Combining science&technology and humanities together;putting academy and industry together;training software experts while making them understand people and the world.
基金supported by MRC,UK (MC_PC_17171)Royal Society,UK (RP202G0230)+8 种基金BHF,UK (AA/18/3/34220)Hope Foundation for Cancer Research,UK (RM60G0680)GCRF,UK (P202PF11)Sino-UK Industrial Fund,UK (RP202G0289)LIAS,UK (P202ED10,P202RE969)Data Science Enhancement Fund,UK (P202RE237)Fight for Sight,UK (24NN201)Sino-UK Education Fund,UK (OP202006)BBSRC,UK (RM32G0178B8).
文摘Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on deep learning for the localization and classification of thyroid nodules.First,we propose the multitask TransUnet,which combines the TransUnet encoder and decoder with multitask learning.Second,we propose the DualLoss function,tailored to the thyroid nodule localization and classification tasks.It balances the learning of the localization and classification tasks to help improve the model’s generalization ability.Third,we introduce strategies for augmenting the data.Finally,we submit a novel deep learning model,ThyroidNet,to accurately detect thyroid nodules.Results:ThyroidNet was evaluated on private datasets and was comparable to other existing methods,including U-Net and TransUnet.Experimental results show that ThyroidNet outperformed these methods in localizing and classifying thyroid nodules.It achieved improved accuracy of 3.9%and 1.5%,respectively.Conclusion:ThyroidNet significantly improves the clinical diagnosis of thyroid nodules and supports medical image analysis tasks.Future research directions include optimization of the model structure,expansion of the dataset size,reduction of computational complexity and memory requirements,and exploration of additional applications of ThyroidNet in medical image analysis.
基金supported by the Japan Society for the Promotion of Science(JSPS)KAKENHI Grant Number JP22F22368。
文摘The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems.
文摘Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the joint impact of a pier and an abutment in proximity to one another on scour.This study conducted laboratory experiments and flow analyses to examine the interaction of piers and abutments and their effect on clear-water scour.The experiments were conducted in a rectangular laboratory flume.They included 18 main tests(with a combination of different types of piers and abutments)and five control tests(with individual piers or abutments).Three pier types(a rectangular pier with a rounded edge,a group of three cylindrical piers,and a single cylindrical pier)and two abutment types(a wingewall abutment and a semicircular abutment)were used.An acoustic Doppler velocimeter was used to measure the three-dimensional flow velocity for analyses of streamline,velocity magnitude,vertical velocity,and bed shear stress.The results showed that the velocity near the pier and abutment increased by up to 80%.The maximum scour depth around the abutment increased by up to 19%.In contrast,the maximum scour depth around the pier increased significantly by up to l71%.The presence of the pier in the vicinity of the abutment led to an increase in the scour hole volume by up to 87%relative to the case with a solitary abutment.Empirical equations were also derived to accurately estimate the maximum scour depth at the pier adjacent to the abutment.
文摘Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from limitations such as uncertainty and imprecise data, leading to late-stage diagnoses. To address this, various expert systems have been developed, but many rely on type-1 fuzzy logic and lack mobile-based applications for data collection and feedback to healthcare practitioners. This research investigates the development of an Enhanced Mobile-based Fuzzy Expert system (EMFES) for breast cancer pre-growth prognosis. The study explores the use of type-2 fuzzy logic to enhance accuracy and model uncertainty effectively. Additionally, it evaluates the advantages of employing the python programming language over java for implementation and considers specific risk factors for data collection. The research aims to dynamically generate fuzzy rules, adapting to evolving breast cancer research and patient data. Key research questions focus on the comparative effectiveness of type-2 fuzzy logic, the handling of uncertainty and imprecise data, the integration of mobile-based features, the choice of programming language, and the creation of dynamic fuzzy rules. Furthermore, the study examines the differences between the Mamdani Inference System and the Sugeno Fuzzy Inference method and explores challenges and opportunities in deploying the EMFES on mobile devices. The research identifies a critical gap in existing breast cancer diagnostic systems, emphasizing the need for a comprehensive, mobile-enabled, and adaptable solution by developing an EMFES that leverages Type-2 fuzzy logic, the Sugeno Inference Algorithm, Python Programming, and dynamic fuzzy rule generation. This study seeks to enhance early breast cancer detection and ultimately reduce breast cancer-related mortality.
文摘Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source nature.There are many android malware detection techniques available to exploit the source code andfind associated components during execution time.To obtain a better result we create a hybrid technique merging static and dynamic processes.In this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing system.In the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given approach.The Android Sensitive Permission is one major key point to be considered while detecting malware.We select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or benign.Thefinal goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
基金This work was supported by the six talent peaks project in Jiangsu Province(No.XYDXX-012)Natural Science Foundation of China(No.62002045),China Postdoctoral Science Foundation(No.2021M690565)Fundamental Research Funds for the Cornell University(No.N2117002).
文摘The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communication protocols.This brings forth new methods and models to fuse the information yielded by the various industrial plant elements and generates emerging security challenges that we have to face,providing ad-hoc functions for scheduling and guaranteeing the network operations.Recently,the large development of SoftwareDefined Networking(SDN)and Artificial Intelligence(AI)technologies have made feasible the design and control of scalable and secure IIoT networks.This paper studies how AI and SDN technologies combined can be leveraged towards improving the security and functionality of these IIoT networks.After surveying the state-of-the-art research efforts in the subject,the paper introduces a candidate architecture for AI-enabled Software-Defined IIoT Network(AI-SDIN)that divides the traditional industrial networks into three functional layers.And with this aim in mind,key technologies(Blockchain-based Data Sharing,Intelligent Wireless Data Sensing,Edge Intelligence,Time-Sensitive Networks,Integrating SDN&TSN,Distributed AI)and improve applications based on AISDIN are also discussed.Further,the paper also highlights new opportunities and potential research challenges in control and automation of IIoT networks.
文摘Addressing classification and prediction challenges, tree ensemble models have gained significant importance. Boosting ensemble techniques are commonly employed for forecasting Type-II diabetes mellitus. Light Gradient Boosting Machine (LightGBM) is a widely used algorithm known for its leaf growth strategy, loss reduction, and enhanced training precision. However, LightGBM is prone to overfitting. In contrast, CatBoost utilizes balanced base predictors known as decision tables, which mitigate overfitting risks and significantly improve testing time efficiency. CatBoost’s algorithm structure counteracts gradient boosting biases and incorporates an overfitting detector to stop training early. This study focuses on developing a hybrid model that combines LightGBM and CatBoost to minimize overfitting and improve accuracy by reducing variance. For the purpose of finding the best hyperparameters to use with the underlying learners, the Bayesian hyperparameter optimization method is used. By fine-tuning the regularization parameter values, the hybrid model effectively reduces variance (overfitting). Comparative evaluation against LightGBM, CatBoost, XGBoost, Decision Tree, Random Forest, AdaBoost, and GBM algorithms demonstrates that the hybrid model has the best F1-score (99.37%), recall (99.25%), and accuracy (99.37%). Consequently, the proposed framework holds promise for early diabetes prediction in the healthcare industry and exhibits potential applicability to other datasets sharing similarities with diabetes.
基金This work is partially sponsored by National Key R&D Program of China(No.2019YFB2101700)National Science Foundation of China(No.62172297,No.61902276)+1 种基金the Key Research and Development Project of Sichuan Province(No.2021YFSY0012)Tianjin Intelligent Manufacturing Special Fund Project(No.20211097,No.20201159).
文摘Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.