Missing data presents a crucial challenge in data analysis,especially in high-dimensional datasets,where missing data often leads to biased conclusions and degraded model performance.In this study,we present a novel a...Missing data presents a crucial challenge in data analysis,especially in high-dimensional datasets,where missing data often leads to biased conclusions and degraded model performance.In this study,we present a novel autoencoder-based imputation framework that integrates a composite loss function to enhance robustness and precision.The proposed loss combines(i)a guided,masked mean squared error focusing on missing entries;(ii)a noise-aware regularization term to improve resilience against data corruption;and(iii)a variance penalty to encourage expressive yet stable reconstructions.We evaluate the proposed model across four missingness mechanisms,such as Missing Completely at Random,Missing at Random,Missing Not at Random,and Missing Not at Random with quantile censorship,under systematically varied feature counts,sample sizes,and missingness ratios ranging from 5%to 60%.Four publicly available real-world datasets(Stroke Prediction,Pima Indians Diabetes,Cardiovascular Disease,and Framingham Heart Study)were used,and the obtained results show that our proposed model consistently outperforms baseline methods,including traditional and deep learning-based techniques.An ablation study reveals the additive value of each component in the loss function.Additionally,we assessed the downstream utility of imputed data through classification tasks,where datasets imputed by the proposed method yielded the highest receiver operating characteristic area under the curve scores across all scenarios.The model demonstrates strong scalability and robustness,improving performance with larger datasets and higher feature counts.These results underscore the capacity of the proposed method to produce not only numerically accurate but also semantically useful imputations,making it a promising solution for robust data recovery in clinical applications.展开更多
Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness a...Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively.This study introduces an advanced,explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets,which reflects real-world network behavior through a blend of normal and diverse attack classes.The methodology begins with sophisticated data preprocessing,incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions,ensuring standardized and model-ready inputs.Critical dimensionality reduction is achieved via the Harris Hawks Optimization(HHO)algorithm—a nature-inspired metaheuristic modeled on hawks’hunting strategies.HHO efficiently identifies the most informative features by optimizing a fitness function based on classification performance.Following feature selection,the SMOTE is applied to the training data to resolve class imbalance by synthetically augmenting underrepresented attack types.The stacked architecture is then employed,combining the strengths of XGBoost,SVM,and RF as base learners.This layered approach improves prediction robustness and generalization by balancing bias and variance across diverse classifiers.The model was evaluated using standard classification metrics:precision,recall,F1-score,and overall accuracy.The best overall performance was recorded with an accuracy of 99.44%for UNSW-NB15,demonstrating the model’s effectiveness.After balancing,the model demonstrated a clear improvement in detecting the attacks.We tested the model on four datasets to show the effectiveness of the proposed approach and performed the ablation study to check the effect of each parameter.Also,the proposed model is computationaly efficient.To support transparency and trust in decision-making,explainable AI(XAI)techniques are incorporated that provides both global and local insight into feature contributions,and offers intuitive visualizations for individual predictions.This makes it suitable for practical deployment in cybersecurity environments that demand both precision and accountability.展开更多
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi...Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.展开更多
The increasing complexity of China’s electricity market creates substantial challenges for settlement automation,data consistency,and operational scalability.Existing provincial settlement systems are fragmented,lack...The increasing complexity of China’s electricity market creates substantial challenges for settlement automation,data consistency,and operational scalability.Existing provincial settlement systems are fragmented,lack a unified data structure,and depend heavily on manual intervention to process high-frequency and retroactive transactions.To address these limitations,a graph-based unified settlement framework is proposed to enhance automation,flexibility,and adaptability in electricity market settlements.A flexible attribute-graph model is employed to represent heterogeneousmulti-market data,enabling standardized integration,rapid querying,and seamless adaptation to evolving business requirements.An extensible operator library is designed to support configurable settlement rules,and a suite of modular tools—including dataset generation,formula configuration,billing templates,and task scheduling—facilitates end-to-end automated settlement processing.A robust refund-clearing mechanism is further incorporated,utilizing sandbox execution,data-version snapshots,dynamic lineage tracing,and real-time changecapture technologies to enable rapid and accurate recalculations under dynamic policy and data revisions.Case studies based on real-world data from regional Chinese markets validate the effectiveness of the proposed approach,demonstrating marked improvements in computational efficiency,system robustness,and automation.Moreover,enhanced settlement accuracy and high temporal granularity improve price-signal fidelity,promote cost-reflective tariffs,and incentivize energy-efficient and demand-responsive behavior among market participants.The method not only supports equitable and transparent market operations but also provides a generalizable,scalable foundation for modern electricity settlement platforms in increasingly complex and dynamic market environments.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
Automated essay scoring(AES)systems have gained significant importance in educational settings,offering a scalable,efficient,and objective method for evaluating student essays.However,developing AES systems for Arabic...Automated essay scoring(AES)systems have gained significant importance in educational settings,offering a scalable,efficient,and objective method for evaluating student essays.However,developing AES systems for Arabic poses distinct challenges due to the language’s complex morphology,diglossia,and the scarcity of annotated datasets.This paper presents a hybrid approach to Arabic AES by combining text-based,vector-based,and embeddingbased similarity measures to improve essay scoring accuracy while minimizing the training data required.Using a large Arabic essay dataset categorized into thematic groups,the study conducted four experiments to evaluate the impact of feature selection,data size,and model performance.Experiment 1 established a baseline using a non-machine learning approach,selecting top-N correlated features to predict essay scores.The subsequent experiments employed 5-fold cross-validation.Experiment 2 showed that combining embedding-based,text-based,and vector-based features in a Random Forest(RF)model achieved an R2 of 88.92%and an accuracy of 83.3%within a 0.5-point tolerance.Experiment 3 further refined the feature selection process,demonstrating that 19 correlated features yielded optimal results,improving R2 to 88.95%.In Experiment 4,an optimal data efficiency training approach was introduced,where training data portions increased from 5%to 50%.The study found that using just 10%of the data achieved near-peak performance,with an R2 of 85.49%,emphasizing an effective trade-off between performance and computational costs.These findings highlight the potential of the hybrid approach for developing scalable Arabic AES systems,especially in low-resource environments,addressing linguistic challenges while ensuring efficient data usage.展开更多
Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods...Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods,based on reliable existing data stored in project management tools’datasets,automating this evaluation process becomes a natural step forward.In this context,our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems.For this,we mathematically formalize two categories of expertise:technology-specific expertise,which denotes the skills required for a particular technology,and general expertise,which encapsulates overall knowledge in the software industry.Afterward,we automatically classify the zones of expertise associated with each task a developer has worked on using Bidirectional Encoder Representations from Transformers(BERT)-like transformers to handle the unique characteristics of project tool datasets effectively.Finally,our method evaluates the proficiency of each software specialist across already completed projects from both technology-specific and general perspectives.The method was experimentally validated,yielding promising results.展开更多
The rapid growth of biomedical data,particularly multi-omics data including genomes,transcriptomics,proteomics,metabolomics,and epigenomics,medical research and clinical decision-making confront both new opportunities...The rapid growth of biomedical data,particularly multi-omics data including genomes,transcriptomics,proteomics,metabolomics,and epigenomics,medical research and clinical decision-making confront both new opportunities and obstacles.The huge and diversified nature of these datasets cannot always be managed using traditional data analysis methods.As a consequence,deep learning has emerged as a strong tool for analysing numerous omics data due to its ability to handle complex and non-linear relationships.This paper explores the fundamental concepts of deep learning and how they are used in multi-omics medical data mining.We demonstrate how autoencoders,variational autoencoders,multimodal models,attention mechanisms,transformers,and graph neural networks enable pattern analysis and recognition across all omics data.Deep learning has been found to be effective in illness classification,biomarker identification,gene network learning,and therapeutic efficacy prediction.We also consider critical problems like as data quality,model explainability,whether findings can be repeated,and computational power requirements.We now consider future elements of combining omics with clinical and imaging data,explainable AI,federated learning,and real-time diagnostics.Overall,this study emphasises the need of collaborating across disciplines to advance deep learning-based multi-omics research for precision medicine and comprehending complicated disorders.展开更多
High-throughput transcriptomics has evolved from bulk RNA-seq to single-cell and spatial profiling,yet its clinical translation still depends on effective integration across diverse omics and data modalities.Emerging ...High-throughput transcriptomics has evolved from bulk RNA-seq to single-cell and spatial profiling,yet its clinical translation still depends on effective integration across diverse omics and data modalities.Emerging foundation models and multimodal learning frameworks are enabling scalable and transferable representations of cellular states,while advances in interpretability and real-world data integration are bridging the gap between discovery and clinical application.This paper outlines a concise roadmap for AI-driven,transcriptome-centered multi-omics integration in precision medicine(Figure 1).展开更多
Gastrointestinal tumors require personalized treatment strategies due to their heterogeneity and complexity.Multimodal artificial intelligence(AI)addresses this challenge by integrating diverse data sources-including ...Gastrointestinal tumors require personalized treatment strategies due to their heterogeneity and complexity.Multimodal artificial intelligence(AI)addresses this challenge by integrating diverse data sources-including computed tomography(CT),magnetic resonance imaging(MRI),endoscopic imaging,and genomic profiles-to enable intelligent decision-making for individualized therapy.This approach leverages AI algorithms to fuse imaging,endoscopic,and omics data,facilitating comprehensive characterization of tumor biology,prediction of treatment response,and optimization of therapeutic strategies.By combining CT and MRI for structural assessment,endoscopic data for real-time visual inspection,and genomic information for molecular profiling,multimodal AI enhances the accuracy of patient stratification and treatment personalization.The clinical implementation of this technology demonstrates potential for improving patient outcomes,advancing precision oncology,and supporting individualized care in gastrointestinal cancers.Ultimately,multimodal AI serves as a transformative tool in oncology,bridging data integration with clinical application to effectively tailor therapies.展开更多
We investigate the null tests of cosmic accelerated expansion by using the baryon acoustic oscillation(BAO)data measured by the dark energy spectroscopic instrument(DESI)and reconstruct the dimensionless Hubble parame...We investigate the null tests of cosmic accelerated expansion by using the baryon acoustic oscillation(BAO)data measured by the dark energy spectroscopic instrument(DESI)and reconstruct the dimensionless Hubble parameter E(z)from the DESI BAO Alcock-Paczynski(AP)data using Gaussian process to perform the null test.We find strong evidence of accelerated expansion from the DESI BAO AP data.By reconstructing the deceleration parameter q(z) from the DESI BAO AP data,we find that accelerated expansion persisted until z■0.7 with a 99.7%confidence level.Additionally,to provide insights into the Hubble tension problem,we propose combining the reconstructed E(z) with D_(H)/r_(d) data to derive a model-independent result r_(d)h=99.8±3.1 Mpc.This result is consistent with measurements from cosmic microwave background(CMB)anisotropies using the ΛCDM model.We also propose a model-independent method for reconstructing the comoving angular diameter distance D_(M)(z) from the distance modulus μ,using SNe Ia data and combining this result with DESI BAO data of D_(M)/r_(d) to constrain the value of r_(d).We find that the value of r_(d),derived from this model-independent method,is smaller than that obtained from CMB measurements,with a significant discrepancy of at least 4.17σ.All the conclusions drawn in this paper are independent of cosmological models and gravitational theories.展开更多
Parkinson’s disease(PD)is a debilitating neurological disorder affecting over 10 million people worldwide.PD classification models using voice signals as input are common in the literature.It is believed that using d...Parkinson’s disease(PD)is a debilitating neurological disorder affecting over 10 million people worldwide.PD classification models using voice signals as input are common in the literature.It is believed that using deep learning algorithms further enhances performance;nevertheless,it is challenging due to the nature of small-scale and imbalanced PD datasets.This paper proposed a convolutional neural network-based deep support vector machine(CNN-DSVM)to automate the feature extraction process using CNN and extend the conventional SVM to a DSVM for better classification performance in small-scale PD datasets.A customized kernel function reduces the impact of biased classification towards the majority class(healthy candidates in our consideration).An improved generative adversarial network(IGAN)was designed to generate additional training data to enhance the model’s performance.For performance evaluation,the proposed algorithm achieves a sensitivity of 97.6%and a specificity of 97.3%.The performance comparison is evaluated from five perspectives,including comparisons with different data generation algorithms,feature extraction techniques,kernel functions,and existing works.Results reveal the effectiveness of the IGAN algorithm,which improves the sensitivity and specificity by 4.05%–4.72%and 4.96%–5.86%,respectively;and the effectiveness of the CNN-DSVM algorithm,which improves the sensitivity by 1.24%–57.4%and specificity by 1.04%–163%and reduces biased detection towards the majority class.The ablation experiments confirm the effectiveness of individual components.Two future research directions have also been suggested.展开更多
To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)pre...To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR.展开更多
Irregular phase-space orbits of the electrons are harmful to the electron-beam transport quality and hence deteriorate the performance of a free-electron laser (FEL). In previous literature, it was demonstrated that...Irregular phase-space orbits of the electrons are harmful to the electron-beam transport quality and hence deteriorate the performance of a free-electron laser (FEL). In previous literature, it was demonstrated that the irregularity of the electron phase-space orbits could be caused in several ways, such as varying the wiggler amplitude and inducing sidebands. Based on a Hamiltonian model with a set of self-consistent differential equations, it is shown in this paper that the electron- beam normalized plasma frequency functions not only couple the electron motion with the FEL wave, which results in the evolution of the FEL wave field and a possible power saturation at a large beam current, but also cause the irregularity of the electron phase-space orbits when the normalized plasma frequency has a sufficiently large value, even if the initial energy of the electron is equal to the synchronous energy or the FEL wave does not reach power saturation.展开更多
Phase space reconstruction is the first step of recognizing the chaotic time series.On the basis of differential entropy ratio method,the embedding dimension opt m and time delay t are optimal for the state space reco...Phase space reconstruction is the first step of recognizing the chaotic time series.On the basis of differential entropy ratio method,the embedding dimension opt m and time delay t are optimal for the state space reconstruction could be determined.But they are not the optimal parameters accepted for prediction.This study proposes an improved method based on the differential entropy ratio and Radial Basis Function(RBF)neural network to estimate the embedding dimension m and the time delay t,which have both optimal characteristics of the state space reconstruction and the prediction.Simulating experiments of Lorenz system and Doffing system show that the original phase space could be reconstructed from the time series effectively,and both the prediction accuracy and prediction length are improved greatly.展开更多
Space satellite observations in an electron phase-space hole(electron hole) have shown that bipolar structures are discovered at the parallel cut of parallel electric field, while unipolar structures spring from the p...Space satellite observations in an electron phase-space hole(electron hole) have shown that bipolar structures are discovered at the parallel cut of parallel electric field, while unipolar structures spring from the parallel cut of perpendicular electric field. Particle-in-cell(PIC) simulations have demonstrated that the electron bi-stream instability induces several electron holes during its nonlinear evolution. However, how the unipolar structure of the parallel cut of the perpendicular electric field formed in these electron holes is still an unsolved problem,especially in a strongly magnetized plasma(Ω_e >ω_(pe), where Ω_e is defined as electron gyrofrequency and ω_(pe) is defined as plasma frequency, respectively). In this paper, with two-dimensional(2D) electrostatic PIC simulations, the evolution of the electron two-stream instability with a finite width in strongly magnetized plasma is investigated. Initially, those conditions lead to monochromatic electrostatic waves, and these waves coalesce with each other during their nonlinear evolution. At last, a solitary electrostatic structure is formed. In such an electron hole, a bipolar structure is formed in the parallel cut. of parallel electric field, while a unipolar structure presents in the parallel cut of perpendicular electric field.展开更多
This paper describes the use of log-linear energy phase-space projections to analyze microwave-assisted inactivation of bacteria and viruses under different fomite conditions within multimode microwave ovens. The oven...This paper describes the use of log-linear energy phase-space projections to analyze microwave-assisted inactivation of bacteria and viruses under different fomite conditions within multimode microwave ovens. The ovens are operated at a cavity-magnetron frequency of 2.45 ± 01 GHz. Porous fomites (moist face towels, cotton swabs, kitchen sponges, and scrubbing pads, cigarette filters and N95-like respirators);along with non-porous hard surface syringe fomites are studied. The fomites are classed as dielectric;and absorb microwave energy to varying degrees depending on their complex dielectric permittivity. Microorganism resilience to microwave stress (defined as ≥4 log<sub>10</sub> reduction in inactivation) when mapped using iso-volume trend-lines in energy phase-space reveals the persistence imparted by the fomite, and can be mapped between different microwave ovens. Microorganism resilience to thermal microwave-assisted treatment increases from vegetative Gram-negative to vegetative Gram-positive and on to Gram-positive spores. Bacteriophage MS2 and influenza viruses have an intermediate resilience dependency. It is shown that linear-scaled fomite temperature against process time graphs can differentiate between non-thermal and thermal micro-wave-assisted treatment of microorganisms.展开更多
We studied the continuity equation in presence of a local potential, and a non-local potential arising from electron-electron interaction in both commutative and non-commutative phase-space. Furthermore, we examined t...We studied the continuity equation in presence of a local potential, and a non-local potential arising from electron-electron interaction in both commutative and non-commutative phase-space. Furthermore, we examined the influence of the phase-space non-commutativity on both the locality and the non-locality, where the definition of current density in commutative phase-space cannot satisfy the condition of current conservation, but with the steady state, in order to solve this problem, we give a new definition of the current density including the contribution due to the non-local potential. We showed that the calculated current based on the new definition of current density maintains the current. As well for the case when the non- commutativity in phase-space considered, we found that the conservation of the current density completely violated;and the non-commutativity is not suitable for describing the current density in presence of non-local and local potentials. Nevertheless, under some conditions, we modified the current density to solve this problem. Subsequently, as an application we studied the Frahn-Lemmer non-local potential, taking into account that the employed methods concerning the phase-space non-commutativity are both of Bopp-shift linear transformation through the Heisenberg-like commutation relations, and the Moyal-Weyl product.展开更多
In this paper, decoherence of a damped anisotropic harmonic oscillator in the presence of a magnetic field is studied in the framework of the Lindblad theory of open quantum systems in noncommutative phase-space. Gene...In this paper, decoherence of a damped anisotropic harmonic oscillator in the presence of a magnetic field is studied in the framework of the Lindblad theory of open quantum systems in noncommutative phase-space. General fundamental conditions that should follow our quantum mechanical diffusion coefficients appearing in the master equation are kindly derived. From the master equation, the expressions of density operator, the Wigner distribution function, the expectation and variance with respect to coordinates and momenta are obtained. Based on these quantities, the total energy of the system is evaluated and simulations show its dependency to phase-space structure and its improvement due to noncommutativity effects and the environmental temperature as well. In addition, we also evaluate the decoherence time scale and show that it increases with noncommutativity phase-space effects as compared to the commutative case. It turns out from simulations that this time scale is significantly improved under magnetic field effects.展开更多
Microwave-assisted synthesis of gold and silver nanoparticles, as a function of Green Chemistry, non Green Chemistry, and four applicator types are reported. The applicator types are Domestic microwave ovens, commerci...Microwave-assisted synthesis of gold and silver nanoparticles, as a function of Green Chemistry, non Green Chemistry, and four applicator types are reported. The applicator types are Domestic microwave ovens, commercial temperature controlled microwave chemistry ovens (TCMC), digesters, and axial field helical antennae. For each of these microwave applicators the process energy budget where estimated (Watts multiplied by process time = kJ) and energy density (applied energy divided by suspension volume = kJ·ml<sup>-1</sup>) range between 180 ± 176.8 kJ, and 79.5 ± 79 kJ·ml<sup>-1</sup>, respectively. The axial field helical field an-tenna applicator is found to be the most energy efficient (0.253 kJ·m<sup>-1</sup> per kJ, at 36 W). Followed by microwave ovens (4.47 ± 3.9 kJ·ml<sup>-1</sup> per 76.83 ± 39 kJ), and TCMC ovens (2.86 ± 2.3 kJ·m<sup>-1</sup> per 343 ± 321.5 kJ). The digester applicators have the least energy efficiency (36.2 ± 50.7 kJ·m<sup>-1</sup> per 1010 ± 620 kJ). A comparison with reconstructed ‘non-thermal’ microwave oven inactivation microorganism experiments yields a power-law signature of n = 0.846 (R<sup>2</sup> = 0.7923) four orders of magnitude. The paper provides a discussion on the Au and Ag nanoparticle chemistry and bio-chemistry synthesis aspects of the microwave applicator energy datasets and variation within each dataset. The visual and analytical approach within the energy phase-space projection enables a nanoparticle synthesis route to be systematically characterized, and where changes to the synthesis are to be mapped and compared directly with historical datasets. In order to help identify lower cost nanoparticle synthesis, in addition to potentially reduce synthesis energy to routes informed changes to potentially reduce synthesis energy budget, along with nanoparticle morphology and yield.展开更多
文摘Missing data presents a crucial challenge in data analysis,especially in high-dimensional datasets,where missing data often leads to biased conclusions and degraded model performance.In this study,we present a novel autoencoder-based imputation framework that integrates a composite loss function to enhance robustness and precision.The proposed loss combines(i)a guided,masked mean squared error focusing on missing entries;(ii)a noise-aware regularization term to improve resilience against data corruption;and(iii)a variance penalty to encourage expressive yet stable reconstructions.We evaluate the proposed model across four missingness mechanisms,such as Missing Completely at Random,Missing at Random,Missing Not at Random,and Missing Not at Random with quantile censorship,under systematically varied feature counts,sample sizes,and missingness ratios ranging from 5%to 60%.Four publicly available real-world datasets(Stroke Prediction,Pima Indians Diabetes,Cardiovascular Disease,and Framingham Heart Study)were used,and the obtained results show that our proposed model consistently outperforms baseline methods,including traditional and deep learning-based techniques.An ablation study reveals the additive value of each component in the loss function.Additionally,we assessed the downstream utility of imputed data through classification tasks,where datasets imputed by the proposed method yielded the highest receiver operating characteristic area under the curve scores across all scenarios.The model demonstrates strong scalability and robustness,improving performance with larger datasets and higher feature counts.These results underscore the capacity of the proposed method to produce not only numerically accurate but also semantically useful imputations,making it a promising solution for robust data recovery in clinical applications.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R104)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively.This study introduces an advanced,explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets,which reflects real-world network behavior through a blend of normal and diverse attack classes.The methodology begins with sophisticated data preprocessing,incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions,ensuring standardized and model-ready inputs.Critical dimensionality reduction is achieved via the Harris Hawks Optimization(HHO)algorithm—a nature-inspired metaheuristic modeled on hawks’hunting strategies.HHO efficiently identifies the most informative features by optimizing a fitness function based on classification performance.Following feature selection,the SMOTE is applied to the training data to resolve class imbalance by synthetically augmenting underrepresented attack types.The stacked architecture is then employed,combining the strengths of XGBoost,SVM,and RF as base learners.This layered approach improves prediction robustness and generalization by balancing bias and variance across diverse classifiers.The model was evaluated using standard classification metrics:precision,recall,F1-score,and overall accuracy.The best overall performance was recorded with an accuracy of 99.44%for UNSW-NB15,demonstrating the model’s effectiveness.After balancing,the model demonstrated a clear improvement in detecting the attacks.We tested the model on four datasets to show the effectiveness of the proposed approach and performed the ablation study to check the effect of each parameter.Also,the proposed model is computationaly efficient.To support transparency and trust in decision-making,explainable AI(XAI)techniques are incorporated that provides both global and local insight into feature contributions,and offers intuitive visualizations for individual predictions.This makes it suitable for practical deployment in cybersecurity environments that demand both precision and accountability.
基金funded by University of Transport and Communications(UTC)under grant number T2025-CN-004.
文摘Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography.
基金funded by the Science and Technology Project of State Grid Corporation of China(5108-202355437A-3-2-ZN).
文摘The increasing complexity of China’s electricity market creates substantial challenges for settlement automation,data consistency,and operational scalability.Existing provincial settlement systems are fragmented,lack a unified data structure,and depend heavily on manual intervention to process high-frequency and retroactive transactions.To address these limitations,a graph-based unified settlement framework is proposed to enhance automation,flexibility,and adaptability in electricity market settlements.A flexible attribute-graph model is employed to represent heterogeneousmulti-market data,enabling standardized integration,rapid querying,and seamless adaptation to evolving business requirements.An extensible operator library is designed to support configurable settlement rules,and a suite of modular tools—including dataset generation,formula configuration,billing templates,and task scheduling—facilitates end-to-end automated settlement processing.A robust refund-clearing mechanism is further incorporated,utilizing sandbox execution,data-version snapshots,dynamic lineage tracing,and real-time changecapture technologies to enable rapid and accurate recalculations under dynamic policy and data revisions.Case studies based on real-world data from regional Chinese markets validate the effectiveness of the proposed approach,demonstrating marked improvements in computational efficiency,system robustness,and automation.Moreover,enhanced settlement accuracy and high temporal granularity improve price-signal fidelity,promote cost-reflective tariffs,and incentivize energy-efficient and demand-responsive behavior among market participants.The method not only supports equitable and transparent market operations but also provides a generalizable,scalable foundation for modern electricity settlement platforms in increasingly complex and dynamic market environments.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金funded by Deanship of Graduate studies and Scientific Research at Jouf University under grant No.(DGSSR-2024-02-01264).
文摘Automated essay scoring(AES)systems have gained significant importance in educational settings,offering a scalable,efficient,and objective method for evaluating student essays.However,developing AES systems for Arabic poses distinct challenges due to the language’s complex morphology,diglossia,and the scarcity of annotated datasets.This paper presents a hybrid approach to Arabic AES by combining text-based,vector-based,and embeddingbased similarity measures to improve essay scoring accuracy while minimizing the training data required.Using a large Arabic essay dataset categorized into thematic groups,the study conducted four experiments to evaluate the impact of feature selection,data size,and model performance.Experiment 1 established a baseline using a non-machine learning approach,selecting top-N correlated features to predict essay scores.The subsequent experiments employed 5-fold cross-validation.Experiment 2 showed that combining embedding-based,text-based,and vector-based features in a Random Forest(RF)model achieved an R2 of 88.92%and an accuracy of 83.3%within a 0.5-point tolerance.Experiment 3 further refined the feature selection process,demonstrating that 19 correlated features yielded optimal results,improving R2 to 88.95%.In Experiment 4,an optimal data efficiency training approach was introduced,where training data portions increased from 5%to 50%.The study found that using just 10%of the data achieved near-peak performance,with an R2 of 85.49%,emphasizing an effective trade-off between performance and computational costs.These findings highlight the potential of the hybrid approach for developing scalable Arabic AES systems,especially in low-resource environments,addressing linguistic challenges while ensuring efficient data usage.
基金supported by the project“Romanian Hub for Artificial Intelligence-HRIA”,Smart Growth,Digitization and Financial Instruments Program,2021–2027,MySMIS No.334906.
文摘Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods,based on reliable existing data stored in project management tools’datasets,automating this evaluation process becomes a natural step forward.In this context,our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems.For this,we mathematically formalize two categories of expertise:technology-specific expertise,which denotes the skills required for a particular technology,and general expertise,which encapsulates overall knowledge in the software industry.Afterward,we automatically classify the zones of expertise associated with each task a developer has worked on using Bidirectional Encoder Representations from Transformers(BERT)-like transformers to handle the unique characteristics of project tool datasets effectively.Finally,our method evaluates the proficiency of each software specialist across already completed projects from both technology-specific and general perspectives.The method was experimentally validated,yielding promising results.
文摘The rapid growth of biomedical data,particularly multi-omics data including genomes,transcriptomics,proteomics,metabolomics,and epigenomics,medical research and clinical decision-making confront both new opportunities and obstacles.The huge and diversified nature of these datasets cannot always be managed using traditional data analysis methods.As a consequence,deep learning has emerged as a strong tool for analysing numerous omics data due to its ability to handle complex and non-linear relationships.This paper explores the fundamental concepts of deep learning and how they are used in multi-omics medical data mining.We demonstrate how autoencoders,variational autoencoders,multimodal models,attention mechanisms,transformers,and graph neural networks enable pattern analysis and recognition across all omics data.Deep learning has been found to be effective in illness classification,biomarker identification,gene network learning,and therapeutic efficacy prediction.We also consider critical problems like as data quality,model explainability,whether findings can be repeated,and computational power requirements.We now consider future elements of combining omics with clinical and imaging data,explainable AI,federated learning,and real-time diagnostics.Overall,this study emphasises the need of collaborating across disciplines to advance deep learning-based multi-omics research for precision medicine and comprehending complicated disorders.
文摘High-throughput transcriptomics has evolved from bulk RNA-seq to single-cell and spatial profiling,yet its clinical translation still depends on effective integration across diverse omics and data modalities.Emerging foundation models and multimodal learning frameworks are enabling scalable and transferable representations of cellular states,while advances in interpretability and real-world data integration are bridging the gap between discovery and clinical application.This paper outlines a concise roadmap for AI-driven,transcriptome-centered multi-omics integration in precision medicine(Figure 1).
基金Supported by Xuhui District Health Commission,No.SHXH202214.
文摘Gastrointestinal tumors require personalized treatment strategies due to their heterogeneity and complexity.Multimodal artificial intelligence(AI)addresses this challenge by integrating diverse data sources-including computed tomography(CT),magnetic resonance imaging(MRI),endoscopic imaging,and genomic profiles-to enable intelligent decision-making for individualized therapy.This approach leverages AI algorithms to fuse imaging,endoscopic,and omics data,facilitating comprehensive characterization of tumor biology,prediction of treatment response,and optimization of therapeutic strategies.By combining CT and MRI for structural assessment,endoscopic data for real-time visual inspection,and genomic information for molecular profiling,multimodal AI enhances the accuracy of patient stratification and treatment personalization.The clinical implementation of this technology demonstrates potential for improving patient outcomes,advancing precision oncology,and supporting individualized care in gastrointestinal cancers.Ultimately,multimodal AI serves as a transformative tool in oncology,bridging data integration with clinical application to effectively tailor therapies.
基金supported in part by the National Key Research and Development Program of China (Grant No.2020YFC2201504)the National Natural Science Foundation of China (Grant Nos.12588101 and 12535002)。
文摘We investigate the null tests of cosmic accelerated expansion by using the baryon acoustic oscillation(BAO)data measured by the dark energy spectroscopic instrument(DESI)and reconstruct the dimensionless Hubble parameter E(z)from the DESI BAO Alcock-Paczynski(AP)data using Gaussian process to perform the null test.We find strong evidence of accelerated expansion from the DESI BAO AP data.By reconstructing the deceleration parameter q(z) from the DESI BAO AP data,we find that accelerated expansion persisted until z■0.7 with a 99.7%confidence level.Additionally,to provide insights into the Hubble tension problem,we propose combining the reconstructed E(z) with D_(H)/r_(d) data to derive a model-independent result r_(d)h=99.8±3.1 Mpc.This result is consistent with measurements from cosmic microwave background(CMB)anisotropies using the ΛCDM model.We also propose a model-independent method for reconstructing the comoving angular diameter distance D_(M)(z) from the distance modulus μ,using SNe Ia data and combining this result with DESI BAO data of D_(M)/r_(d) to constrain the value of r_(d).We find that the value of r_(d),derived from this model-independent method,is smaller than that obtained from CMB measurements,with a significant discrepancy of at least 4.17σ.All the conclusions drawn in this paper are independent of cosmological models and gravitational theories.
基金The work described in this paper was fully supported by a grant from Hong Kong Metropolitan University(RIF/2021/05).
文摘Parkinson’s disease(PD)is a debilitating neurological disorder affecting over 10 million people worldwide.PD classification models using voice signals as input are common in the literature.It is believed that using deep learning algorithms further enhances performance;nevertheless,it is challenging due to the nature of small-scale and imbalanced PD datasets.This paper proposed a convolutional neural network-based deep support vector machine(CNN-DSVM)to automate the feature extraction process using CNN and extend the conventional SVM to a DSVM for better classification performance in small-scale PD datasets.A customized kernel function reduces the impact of biased classification towards the majority class(healthy candidates in our consideration).An improved generative adversarial network(IGAN)was designed to generate additional training data to enhance the model’s performance.For performance evaluation,the proposed algorithm achieves a sensitivity of 97.6%and a specificity of 97.3%.The performance comparison is evaluated from five perspectives,including comparisons with different data generation algorithms,feature extraction techniques,kernel functions,and existing works.Results reveal the effectiveness of the IGAN algorithm,which improves the sensitivity and specificity by 4.05%–4.72%and 4.96%–5.86%,respectively;and the effectiveness of the CNN-DSVM algorithm,which improves the sensitivity by 1.24%–57.4%and specificity by 1.04%–163%and reduces biased detection towards the majority class.The ablation experiments confirm the effectiveness of individual components.Two future research directions have also been suggested.
文摘To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR.
基金Project supported by the Science Foundation of Department of Education of Sichuan Province,China (Grant No.12233454)the Youth Foundation of Department of Education of Sichuan Province,China (Grant No.10ZB080)the Xihua University Foundation,China (Grant No.Z0913306)
文摘Irregular phase-space orbits of the electrons are harmful to the electron-beam transport quality and hence deteriorate the performance of a free-electron laser (FEL). In previous literature, it was demonstrated that the irregularity of the electron phase-space orbits could be caused in several ways, such as varying the wiggler amplitude and inducing sidebands. Based on a Hamiltonian model with a set of self-consistent differential equations, it is shown in this paper that the electron- beam normalized plasma frequency functions not only couple the electron motion with the FEL wave, which results in the evolution of the FEL wave field and a possible power saturation at a large beam current, but also cause the irregularity of the electron phase-space orbits when the normalized plasma frequency has a sufficiently large value, even if the initial energy of the electron is equal to the synchronous energy or the FEL wave does not reach power saturation.
基金Supported by the Key Program of National Natural Science Foundation of China(Nos.61077071,51075349)Program of National Natural Science Foundation of Hebei Province(Nos.F2011203207,F2010001312)
文摘Phase space reconstruction is the first step of recognizing the chaotic time series.On the basis of differential entropy ratio method,the embedding dimension opt m and time delay t are optimal for the state space reconstruction could be determined.But they are not the optimal parameters accepted for prediction.This study proposes an improved method based on the differential entropy ratio and Radial Basis Function(RBF)neural network to estimate the embedding dimension m and the time delay t,which have both optimal characteristics of the state space reconstruction and the prediction.Simulating experiments of Lorenz system and Doffing system show that the original phase space could be reconstructed from the time series effectively,and both the prediction accuracy and prediction length are improved greatly.
基金Supported by the National Science Foundation of China(41474125,41331067,41421063)973 Program(2013CBA01503)Key Research Program of Frontier Sciences,CAS(QYZDJ-SSW-DQC010)
文摘Space satellite observations in an electron phase-space hole(electron hole) have shown that bipolar structures are discovered at the parallel cut of parallel electric field, while unipolar structures spring from the parallel cut of perpendicular electric field. Particle-in-cell(PIC) simulations have demonstrated that the electron bi-stream instability induces several electron holes during its nonlinear evolution. However, how the unipolar structure of the parallel cut of the perpendicular electric field formed in these electron holes is still an unsolved problem,especially in a strongly magnetized plasma(Ω_e >ω_(pe), where Ω_e is defined as electron gyrofrequency and ω_(pe) is defined as plasma frequency, respectively). In this paper, with two-dimensional(2D) electrostatic PIC simulations, the evolution of the electron two-stream instability with a finite width in strongly magnetized plasma is investigated. Initially, those conditions lead to monochromatic electrostatic waves, and these waves coalesce with each other during their nonlinear evolution. At last, a solitary electrostatic structure is formed. In such an electron hole, a bipolar structure is formed in the parallel cut. of parallel electric field, while a unipolar structure presents in the parallel cut of perpendicular electric field.
文摘This paper describes the use of log-linear energy phase-space projections to analyze microwave-assisted inactivation of bacteria and viruses under different fomite conditions within multimode microwave ovens. The ovens are operated at a cavity-magnetron frequency of 2.45 ± 01 GHz. Porous fomites (moist face towels, cotton swabs, kitchen sponges, and scrubbing pads, cigarette filters and N95-like respirators);along with non-porous hard surface syringe fomites are studied. The fomites are classed as dielectric;and absorb microwave energy to varying degrees depending on their complex dielectric permittivity. Microorganism resilience to microwave stress (defined as ≥4 log<sub>10</sub> reduction in inactivation) when mapped using iso-volume trend-lines in energy phase-space reveals the persistence imparted by the fomite, and can be mapped between different microwave ovens. Microorganism resilience to thermal microwave-assisted treatment increases from vegetative Gram-negative to vegetative Gram-positive and on to Gram-positive spores. Bacteriophage MS2 and influenza viruses have an intermediate resilience dependency. It is shown that linear-scaled fomite temperature against process time graphs can differentiate between non-thermal and thermal micro-wave-assisted treatment of microorganisms.
文摘We studied the continuity equation in presence of a local potential, and a non-local potential arising from electron-electron interaction in both commutative and non-commutative phase-space. Furthermore, we examined the influence of the phase-space non-commutativity on both the locality and the non-locality, where the definition of current density in commutative phase-space cannot satisfy the condition of current conservation, but with the steady state, in order to solve this problem, we give a new definition of the current density including the contribution due to the non-local potential. We showed that the calculated current based on the new definition of current density maintains the current. As well for the case when the non- commutativity in phase-space considered, we found that the conservation of the current density completely violated;and the non-commutativity is not suitable for describing the current density in presence of non-local and local potentials. Nevertheless, under some conditions, we modified the current density to solve this problem. Subsequently, as an application we studied the Frahn-Lemmer non-local potential, taking into account that the employed methods concerning the phase-space non-commutativity are both of Bopp-shift linear transformation through the Heisenberg-like commutation relations, and the Moyal-Weyl product.
文摘In this paper, decoherence of a damped anisotropic harmonic oscillator in the presence of a magnetic field is studied in the framework of the Lindblad theory of open quantum systems in noncommutative phase-space. General fundamental conditions that should follow our quantum mechanical diffusion coefficients appearing in the master equation are kindly derived. From the master equation, the expressions of density operator, the Wigner distribution function, the expectation and variance with respect to coordinates and momenta are obtained. Based on these quantities, the total energy of the system is evaluated and simulations show its dependency to phase-space structure and its improvement due to noncommutativity effects and the environmental temperature as well. In addition, we also evaluate the decoherence time scale and show that it increases with noncommutativity phase-space effects as compared to the commutative case. It turns out from simulations that this time scale is significantly improved under magnetic field effects.
文摘Microwave-assisted synthesis of gold and silver nanoparticles, as a function of Green Chemistry, non Green Chemistry, and four applicator types are reported. The applicator types are Domestic microwave ovens, commercial temperature controlled microwave chemistry ovens (TCMC), digesters, and axial field helical antennae. For each of these microwave applicators the process energy budget where estimated (Watts multiplied by process time = kJ) and energy density (applied energy divided by suspension volume = kJ·ml<sup>-1</sup>) range between 180 ± 176.8 kJ, and 79.5 ± 79 kJ·ml<sup>-1</sup>, respectively. The axial field helical field an-tenna applicator is found to be the most energy efficient (0.253 kJ·m<sup>-1</sup> per kJ, at 36 W). Followed by microwave ovens (4.47 ± 3.9 kJ·ml<sup>-1</sup> per 76.83 ± 39 kJ), and TCMC ovens (2.86 ± 2.3 kJ·m<sup>-1</sup> per 343 ± 321.5 kJ). The digester applicators have the least energy efficiency (36.2 ± 50.7 kJ·m<sup>-1</sup> per 1010 ± 620 kJ). A comparison with reconstructed ‘non-thermal’ microwave oven inactivation microorganism experiments yields a power-law signature of n = 0.846 (R<sup>2</sup> = 0.7923) four orders of magnitude. The paper provides a discussion on the Au and Ag nanoparticle chemistry and bio-chemistry synthesis aspects of the microwave applicator energy datasets and variation within each dataset. The visual and analytical approach within the energy phase-space projection enables a nanoparticle synthesis route to be systematically characterized, and where changes to the synthesis are to be mapped and compared directly with historical datasets. In order to help identify lower cost nanoparticle synthesis, in addition to potentially reduce synthesis energy to routes informed changes to potentially reduce synthesis energy budget, along with nanoparticle morphology and yield.