Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow...Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils.展开更多
To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS ch...To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration.展开更多
In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation cou...In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity.展开更多
We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangleds...We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement.展开更多
Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect corona...Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events.展开更多
The determination of the effective minimum detectable activity (MDA) of radionuclides by a detection system plays an im- portant role in environmental radiation monitoring. In this study, the responses of an NaI(TI...The determination of the effective minimum detectable activity (MDA) of radionuclides by a detection system plays an im- portant role in environmental radiation monitoring. In this study, the responses of an NaI(TI) airborne γ ray spectrometry (AGRS) system to different radionuclides (137Cs and 131I) were investigated using the Monte Carlo technique. The MDA values were determined under different conditions according to the counting spectra obtained from the Monte Carlo simulation. The equivalent mass thickness method was applied to the Monte Carlo modeling for monitoring ground radiation to reduce sta- tistical uncertainty. The secondary source method was used to monitor both air and ground radiation. A quadratic relationship was found between the MDA and activity concentration. An exponential relationship was found between the MDA and altitude The MDA of a specific radionuclide from external detectors was found to be superior to that obtained from internal detectors under the same conditions. The MDA values in an NaI(Tl) AGRS system under different conditions can be estimated based on the results of this study.展开更多
Single orbit bistatic space-based radar (SBR) is composed of two radars in the same orbit. The characteristics of the clutter Doppler-angle spectrum of a single orbit bistatic SBR show that the slope of the mainbeam...Single orbit bistatic space-based radar (SBR) is composed of two radars in the same orbit. The characteristics of the clutter Doppler-angle spectrum of a single orbit bistatic SBR show that the slope of the mainbeam clutter spectrum is highly sensitive to the cone angles. Therefore, the minimum detectable velocity of the bistatic system is dependent on the cone angle. Then a new combined working mode of singleorbit bistatic SBR system was developed in which one radar will act as the transmitter and another as the receiver to improve detection performance for all angles. Simulation results by space-time adaptive processing verify the improved detection performance. The new design also reduces the average power of each radar system and the size and weight of the on-board solar array-battery system.展开更多
Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still st...Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still struggle to deal with the complex and changing scenarios captured by drones,mainly due to two reasons:(A)RGB-IR fusion detectors are susceptible to inferior inputs that degrade performance and stability.(B)RGB-IR fusion detectors are susceptible to redundant features that reduce accuracy and efficiency.In this paper,an innovative RGB-IR fusion detection framework based on global-local feature optimization,named GLFDet,is proposed to improve the detection performance and efficiency of drone-captured objects.The key components of GLFDet include a Global Feature Optimization(GFO)module,a Local Feature Optimization(LFO)module and a Channel Separation Fusion(CSF)module.Specifically,GFO calculates the information content of the input image from the frequency domain and optimizes the features holistically.Then,LFO dynamically selects high-value features and filters out low-value features before fusion,which significantly improves the efficiency of fusion.Finally,CSF fuses the RGB and IR features across the corresponding channels,which avoids the rearrangement of the channel relationships and enhances the model stability.Extensive experimental results show that the proposed method achieves the best performance on three popular RGB-IR datasets Drone Vehicle,VEDAI,and LLVIP.In addition,GLFDet is more lightweight than other comparable models,making it more appealing to edge devices such as drones.The code is available at https://github.com/lao chen330/GLFDet.展开更多
Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods...Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure.展开更多
Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of...Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research.展开更多
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi...The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.展开更多
Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional comp...Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional computer-aided detection systems.Recent advances in deep learning have enabled more robust and scalable solutions for large-scale screening,yet a systematic comparison of modern object detection architectures on nationally representative datasets remains limited.This study presents a comprehensive quantitative comparison of prominent deep learning–based object detection architectures for Artificial Intelligence-assisted mammography analysis using the MammosighTR dataset,developed within the Turkish National Breast Cancer Screening Program.The dataset comprises 12,740 patient cases collected between 2016 and 2022,annotated with BI-RADS categories,breast density levels,and lesion localization labels.A total of 31 models were evaluated,including One-Stage,Two-Stage,and Transformer-based architectures,under a unified experimental framework at both patient and breast levels.The results demonstrate that Two-Stage architectures consistently outperform One-Stage models,achieving approximately 2%–4%higher Macro F1-Scores and more balanced precision–recall trade-offs,with Double-Head R-CNN and Dynamic R-CNN yielding the highest overall performance(Macro F1≈0.84–0.86).This advantage is primarily attributed to the region proposal mechanism and improved class balance inherent to Two-Stage designs.One-Stage detectors exhibited higher sensitivity and faster inference,reaching Recall values above 0.88,but experienced minor reductions in Precision and overall accuracy(≈1%–2%)compared with Two-Stage models.Among Transformer-based architectures,Deformable DEtection TRansformer demonstrated strong robustness and consistency across datasets,achieving Macro F1-Scores comparable to CNN-based detectors(≈0.83–0.85)while exhibiting minimal performance degradation under distributional shifts.Breast density–based analysis revealed increased misclassification rates in medium-density categories(types B and C),whereas Transformer-based architectures maintained more stable performance in high-density type D tissue.These findings quantitatively confirm that both architectural design and tissue characteristics play a decisive role in diagnostic accuracy.Overall,the study provides a reproducible benchmark and highlights the potential of hybrid approaches that combine the accuracy of Two-Stage detectors with the contextual modeling capability of Transformer architectures for clinically reliable breast cancer screening systems.展开更多
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr...Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessm...Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessment and human health protection.However,current visual detection methods can only distinguish individual PDA isomers and failed to identify binary or ternary mixtures.Herein,a highly active and ultrastable peroxidase(POD)-like CoPt graphitic nanozyme was used for naked-eye identification and colorimetric/fluorescent(FL)dual-mode quantitative detection of PDA isomers.The CoPt@G nanozyme effectively catalyzed the oxidation of OPD,MPD,PPD,OPD+PPD,OPD+MPD,MPD+PPD and OPD+MPD+PPD into yellow,colorless,lilac,yellow,yellow,wine red and reddish-brown products,respectively,in the presence of H_(2)O_(2).Thus,the MPD,PPD,MPD+PPD and OPD+MPD+PPD were easily identified based on the distinct color of their oxidation products,and the OPD,OPD+PPD,OPD+MPD could be further identified by the additional addition of MPD or PPD.Subsequently,CoPt@G/H_(2)O_(2)-,a 3,3′,5,5′-tetramethylbenzidine(TMB)/CoPt@G/H_(2)O_(2)-,and MPD/CoPt@G/H_(2)O_(2)-enabled colorimetric/FL dual-mode platforms for the quantitative detection of OPD,MPD and PPD were proposed.The experimental results illustrated that the constructed sensing platforms exhibit satisfactory sensitivity,comparable to that reported in previous studies.Finally,the evaluation of PDAs in water samples was realized,yielding satisfactory recoveries.This work expanded the application prospects of nanozymes in assessing environmental risks and protection of human security.展开更多
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen...Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios.展开更多
Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning appr...Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints.展开更多
文摘Three long-term field trials in humid regions of Canada and the USA were used to evaluate the influence of soil depth and sample numbers on soil organic carbon (SOC) sequestration in no-tillage (NT) and moldboard plow (MP) corn (Zea mays L.) and soybean (Glycine max L.) production systems. The first trial was conducted on a Maryhill silt loam (Typic Hapludalf) at Elora, Ontario, Canada, the second on a Brookston clay loam (Typic Argiaquoll) at Woodslee, Ontario, Canada, and the third on a Thorp silt loam (Argiaquic Argialboll) at Urbana, Illinois, USA. No-tillage led to significantly higher SOC concentrations in the top 5 cm compared to MP at all 3 sites. However, NT resulted in significantly lower SOC in sub-surface soils as compared to MP at Woodslee (10-20 cm, P = 0.01) and Urbana (20-30 cm, P < 0.10). No-tillage had significantly more SOC storage than MP at the Elora site (3.3 Mg C ha-1) and at the Woodslee site (6.2 Mg C ha-1) on an equivalent mass basis (1350 Mg ha-1 soil equivalent mass). Similarly, NT had greater SOC storage than MP at the Urbana site (2.7 Mg C ha-1) on an equivalent mass basis of 675 Mg ha-1 soil. However, these differences disappeared when the entire plow layer was evaluated for both the Woodslee and Urbana sites as a result of the higher SOC concentrations in MP than in NT at depth. Using the minimum detectable difference technique, we observed that up to 1500 soil sample per tillage treatment comparison will have to be collected and analyzed for the Elora and Woodslee sites and over 40 soil samples per tillage treatment comparison for the Urbana to statistically separate significant differences in the SOC contents of sub-plow depth soils. Therefore, it is impracticable, and at the least prohibitively expensive, to detect tillage-induced differences in soil C beyond the plow layer in various soils.
文摘To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration.
基金This work was supported by the Sichuan Science and Technology Program(No.2020JDRC0108)the National Science Foundation of China(Nos.41774147 and 41774190).
文摘In this study,the theory of minimum detectable activity concentration(MDAC)for airborne gamma-ray spectrometry(AGS)was derived,and the relationship between the MDAC and the intrinsic effi-ciency of a scintillation counter,volume,and energy res-olution of scintillation crystals,and flight altitude of an aircraft was investigated.To verify this theory,experi-mental devices based on NaI and CeBr 3 scintillation counters were prepared,and the potassium,uranium,and thorium contents in calibration pads obtained via the stripping ratio method and theory were compared.The MDACs of AGS under different conditions were calculated and analyzed using the proposed theory and the Monte Carlo method.The relative errors found via a comparison of the experimental and theoretical results were less than 4%.The theory of MDAC can guide the work of AGS in probing areas with low radioactivity.
基金Supported by National Natural Science Foundation of China under Grant Nos.60873191,60903152,and 60821001SRFDP under Grant No.200800131016+5 种基金Beijing Nova Program under Grant No.2008B51Key Project of Chinese Ministry of Education under Grant No.109014Beijing Natural Science Foundation under Grant No.4072020China Postdoctoral Science Foundation under Grant No.20090450018National Laboratory for Modern Communications Science Foundation of China under Grant No.9140C1101010601ISN Open Foundation
文摘We present a new quantum protocol for solving detectable Byzantine agreement problem between threeparties by employing one quantum key distribution protocol.The protocol is suggested by a special four-qubit entangledstate instead of singlet states,which shows that singlet states are not necessary to achieve detectable Byzantine agreement.
文摘Background:Myxomas are the most common primary cardiac tumors.Angiographically detectable neovascularity(ADN)of myxoma is increasingly being reported as a result of the use of coronary angiography(CAG)to detect coronary artery disease.However,the clinical signifi cance of these fi ndings is not fully understood.Methods:We enrolled 59 patients with cardiac myxoma who also underwent CAG between January 2013 and October 2018.Patients were followed up for a mean of 28.9 months(range 1-69 months).The clinical features,echocardiography measurements,pathological examination fi ndings,CAG results,and outcomes during follow-up were compared between patients with ADN and patients without ADN.Results:ADN was found in 25 patients(42.4%).The arteries feeding the ADN included the right coronary artery(n=15),the left circumfl ex coronary artery(n=7),and both arteries(n=3).The patients with ADN had a higher proportion of eosinophils(3.2%vs.2.2%,P=0.03)and higher low-density lipoprotein cholesterol level(2.7 mmol/L vs.2.2 mmol/L,P=0.02).Myxoma pedicles were more likely to be located in the interatrial septum in patients with ADN(96%vs.73.5%,P=0.02).No signifi cant correlation was observed between the groups in clinical manifestations,atrial arrhythmia,myxoma size,cardiac chamber size,left ventricular ejection fraction,and the prevalence of complication with coronary artery disease[16%in the ADN group(n=4)vs.20.6%in the non-ADN group(n=7),P=0.66].However,patients with ADN tended to have a lower incidence of major adverse cardiac and cerebrovascular events on long-term follow-up(0%vs.14.7%,P=0.07).Conclusion:CAG-detected ADN in patients with cardiac myxoma is associated with a borderline lower rate of major adverse cardiac and cerebrovascular events.
基金supported by the National Defense Basic Scientific Research Project(Grant No.B2520133077)National High-tech R&D Program of China("863"Program)(Grant No.2012AA061803)
文摘The determination of the effective minimum detectable activity (MDA) of radionuclides by a detection system plays an im- portant role in environmental radiation monitoring. In this study, the responses of an NaI(TI) airborne γ ray spectrometry (AGRS) system to different radionuclides (137Cs and 131I) were investigated using the Monte Carlo technique. The MDA values were determined under different conditions according to the counting spectra obtained from the Monte Carlo simulation. The equivalent mass thickness method was applied to the Monte Carlo modeling for monitoring ground radiation to reduce sta- tistical uncertainty. The secondary source method was used to monitor both air and ground radiation. A quadratic relationship was found between the MDA and activity concentration. An exponential relationship was found between the MDA and altitude The MDA of a specific radionuclide from external detectors was found to be superior to that obtained from internal detectors under the same conditions. The MDA values in an NaI(Tl) AGRS system under different conditions can be estimated based on the results of this study.
文摘Single orbit bistatic space-based radar (SBR) is composed of two radars in the same orbit. The characteristics of the clutter Doppler-angle spectrum of a single orbit bistatic SBR show that the slope of the mainbeam clutter spectrum is highly sensitive to the cone angles. Therefore, the minimum detectable velocity of the bistatic system is dependent on the cone angle. Then a new combined working mode of singleorbit bistatic SBR system was developed in which one radar will act as the transmitter and another as the receiver to improve detection performance for all angles. Simulation results by space-time adaptive processing verify the improved detection performance. The new design also reduces the average power of each radar system and the size and weight of the on-board solar array-battery system.
基金supported by the National Natural Science Foundation of China(No.62276204)the Fundamental Research Funds for the Central Universities,China(No.YJSJ24011)+1 种基金the Natural Science Basic Research Program of Shaanxi,China(Nos.2022JM-340 and 2023-JC-QN-0710)the China Postdoctoral Science Foundation(Nos.2020T130494 and 2018M633470)。
文摘Visible and infrared(RGB-IR)fusion object detection plays an important role in security,disaster relief,etc.In recent years,deep-learning-based RGB-IR fusion detection methods have been developing rapidly,but still struggle to deal with the complex and changing scenarios captured by drones,mainly due to two reasons:(A)RGB-IR fusion detectors are susceptible to inferior inputs that degrade performance and stability.(B)RGB-IR fusion detectors are susceptible to redundant features that reduce accuracy and efficiency.In this paper,an innovative RGB-IR fusion detection framework based on global-local feature optimization,named GLFDet,is proposed to improve the detection performance and efficiency of drone-captured objects.The key components of GLFDet include a Global Feature Optimization(GFO)module,a Local Feature Optimization(LFO)module and a Channel Separation Fusion(CSF)module.Specifically,GFO calculates the information content of the input image from the frequency domain and optimizes the features holistically.Then,LFO dynamically selects high-value features and filters out low-value features before fusion,which significantly improves the efficiency of fusion.Finally,CSF fuses the RGB and IR features across the corresponding channels,which avoids the rearrangement of the channel relationships and enhances the model stability.Extensive experimental results show that the proposed method achieves the best performance on three popular RGB-IR datasets Drone Vehicle,VEDAI,and LLVIP.In addition,GLFDet is more lightweight than other comparable models,making it more appealing to edge devices such as drones.The code is available at https://github.com/lao chen330/GLFDet.
基金supported by the Extral High Voltage Power Transmission Company,China Southern Power Grid Co.,Ltd.
文摘Distributed Denial-of-Service(DDoS)attacks pose severe threats to Industrial Control Networks(ICNs),where service disruption can cause significant economic losses and operational risks.Existing signature-based methods are ineffective against novel attacks,and traditional machine learning models struggle to capture the complex temporal dependencies and dynamic traffic patterns inherent in ICN environments.To address these challenges,this study proposes a deep feature-driven hybrid framework that integrates Transformer,BiLSTM,and KNN to achieve accurate and robust DDoS detection.The Transformer component extracts global temporal dependencies from network traffic flows,while BiLSTM captures fine-grained sequential dynamics.The learned embeddings are then classified using an instance-based KNN layer,enhancing decision boundary precision.This cascaded architecture balances feature abstraction and locality preservation,improving both generalization and robustness.The proposed approach was evaluated on a newly collected real-time ICN traffic dataset and further validated using the public CIC-IDS2017 and Edge-IIoT datasets to demonstrate generalization.Comprehensive metrics including accuracy,precision,recall,F1-score,ROC-AUC,PR-AUC,false positive rate(FPR),and detection latency were employed.Results show that the hybrid framework achieves 98.42%accuracy with an ROC-AUC of 0.992 and FPR below 1%,outperforming baseline machine learning and deep learning models.Robustness experiments under Gaussian noise perturbations confirmed stable performance with less than 2%accuracy degradation.Moreover,detection latency remained below 2.1 ms per sample,indicating suitability for real-time ICS deployment.In summary,the proposed hybrid temporal learning and instance-based classification model offers a scalable and effective solution for DDoS detection in industrial control environments.By combining global contextual modeling,sequential learning,and instance-based refinement,the framework demonstrates strong adaptability across datasets and resilience against noise,providing practical utility for safeguarding critical infrastructure.
基金supported in part by the by Chongqing Research Program of Basic Research and Frontier Technology under Grant CSTB2025NSCQ-GPX1309.
文摘Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2025-02-01276).
文摘The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.
文摘Breast cancer screening programs rely heavily on mammography for early detection;however,diagnostic performance is strongly affected by inter-reader variability,breast density,and the limitations of conven-tional computer-aided detection systems.Recent advances in deep learning have enabled more robust and scalable solutions for large-scale screening,yet a systematic comparison of modern object detection architectures on nationally representative datasets remains limited.This study presents a comprehensive quantitative comparison of prominent deep learning–based object detection architectures for Artificial Intelligence-assisted mammography analysis using the MammosighTR dataset,developed within the Turkish National Breast Cancer Screening Program.The dataset comprises 12,740 patient cases collected between 2016 and 2022,annotated with BI-RADS categories,breast density levels,and lesion localization labels.A total of 31 models were evaluated,including One-Stage,Two-Stage,and Transformer-based architectures,under a unified experimental framework at both patient and breast levels.The results demonstrate that Two-Stage architectures consistently outperform One-Stage models,achieving approximately 2%–4%higher Macro F1-Scores and more balanced precision–recall trade-offs,with Double-Head R-CNN and Dynamic R-CNN yielding the highest overall performance(Macro F1≈0.84–0.86).This advantage is primarily attributed to the region proposal mechanism and improved class balance inherent to Two-Stage designs.One-Stage detectors exhibited higher sensitivity and faster inference,reaching Recall values above 0.88,but experienced minor reductions in Precision and overall accuracy(≈1%–2%)compared with Two-Stage models.Among Transformer-based architectures,Deformable DEtection TRansformer demonstrated strong robustness and consistency across datasets,achieving Macro F1-Scores comparable to CNN-based detectors(≈0.83–0.85)while exhibiting minimal performance degradation under distributional shifts.Breast density–based analysis revealed increased misclassification rates in medium-density categories(types B and C),whereas Transformer-based architectures maintained more stable performance in high-density type D tissue.These findings quantitatively confirm that both architectural design and tissue characteristics play a decisive role in diagnostic accuracy.Overall,the study provides a reproducible benchmark and highlights the potential of hybrid approaches that combine the accuracy of Two-Stage detectors with the contextual modeling capability of Transformer architectures for clinically reliable breast cancer screening systems.
文摘Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金supported by the National Key Research and Development Program of China(No.2022YFC2403500)the National Natural Science Foundation of China(No.22225401)+1 种基金the Science and Technology Innovation Program of Hunan Province(No.2020RC4017)the Guizhou Provincial Science and Technology Projects(No.ZK[2023]293).
文摘Simultaneous identification and quantitative detection of phenylenediamine(PDA)isomers,including o-phenylenediamine(OPD),m-phenylenediamine(MPD),and p-phenylenediamine(PPD),are essential for environmental risk assessment and human health protection.However,current visual detection methods can only distinguish individual PDA isomers and failed to identify binary or ternary mixtures.Herein,a highly active and ultrastable peroxidase(POD)-like CoPt graphitic nanozyme was used for naked-eye identification and colorimetric/fluorescent(FL)dual-mode quantitative detection of PDA isomers.The CoPt@G nanozyme effectively catalyzed the oxidation of OPD,MPD,PPD,OPD+PPD,OPD+MPD,MPD+PPD and OPD+MPD+PPD into yellow,colorless,lilac,yellow,yellow,wine red and reddish-brown products,respectively,in the presence of H_(2)O_(2).Thus,the MPD,PPD,MPD+PPD and OPD+MPD+PPD were easily identified based on the distinct color of their oxidation products,and the OPD,OPD+PPD,OPD+MPD could be further identified by the additional addition of MPD or PPD.Subsequently,CoPt@G/H_(2)O_(2)-,a 3,3′,5,5′-tetramethylbenzidine(TMB)/CoPt@G/H_(2)O_(2)-,and MPD/CoPt@G/H_(2)O_(2)-enabled colorimetric/FL dual-mode platforms for the quantitative detection of OPD,MPD and PPD were proposed.The experimental results illustrated that the constructed sensing platforms exhibit satisfactory sensitivity,comparable to that reported in previous studies.Finally,the evaluation of PDAs in water samples was realized,yielding satisfactory recoveries.This work expanded the application prospects of nanozymes in assessing environmental risks and protection of human security.
基金supported by the National Research Foundation of Korea(NRF)funded by the Korea government(RS-2023-00249743)Additionally,this research was supported by the Global-Learning&Academic Research Institution for Master’s,PhD Students,and Postdocs(LAMP)Program of the National Research Foundation of Korea(NRF)grant funded by the Ministry of Education(RS-2024-00443714)This research was also supported by the“Research Base Construction Fund Support Program”funded by Jeonbuk National University in 2025.
文摘Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios.
文摘Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints.