期刊文献+
共找到67篇文章
< 1 2 4 >
每页显示 20 50 100
Rational Design and Fabrication of Cyclotetrasiloxane-based Hybrid Superhydrophobic Fabrics for Oil/Water Separation and Self-cleaning
1
作者 Meng-Shu Liu Rungthip Kunthom +1 位作者 Beata Dudziec Hong-Zhi Liu 《Chinese Journal of Polymer Science》 2025年第6期1022-1031,I0011,共11页
Functional superhydrophobic coatings have attracted considerable attention because of their potential for a wide range of applications.In this study,a novel cyclotetrasiloxane-based hybrid superhydrophobic modifier(F-... Functional superhydrophobic coatings have attracted considerable attention because of their potential for a wide range of applications.In this study,a novel cyclotetrasiloxane-based hybrid superhydrophobic modifier(F-D_(4))was prepared for the first time using a mild thiolene click reaction of 2,4,6,8-tetravinyl-2,4,6,8-tetramethylcyclotetrasiloxane(Vi-D_(4))with perfluorohexylethanethiol(PFOT)and mercaptopropyltrimethoxysilane(MPTMS)as the raw materials.Then,F-D_(4) was introduced into the fabric via a sol-gel process,resulting in a superhydrophobic fabric(F-D_(4)-Fabric).The surface characteristics of the modified fabric were determined using scanning electron microscopy(SEM),Fourier transform infrared spectroscopy(FTIR),X-ray photoelectron spectroscopy(XPS),and water contact angle(WCA).The coated fabrics have outstanding mechanical,physical,and chemical stability,and exhibit excellent self-cleaning and anti-fouling properties.Owing to its superhydrophobicity,FD_(4)-Fabric could efficiently separate a range of oil/water mixtures with a separation efficiency of up to 99.99%.The study showed that the modification strategy used in the dip-coating process greatly affected the superhydrophobicity of the cotton fabric,which is useful for oil/water separation and self-cleaning applications. 展开更多
关键词 Cyclotetrasiloxane SUPERHYDROPHOBIC Oil/water separation FABRIC COATING
原文传递
AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model
2
作者 Brij B.Gupta Akshat Gaurav +3 位作者 Wadee Alhalabi Varsha Arya Shavi Bansal Ching-Hsien Hsu 《Computers, Materials & Continua》 2025年第9期4755-4772,共18页
Detecting cyber attacks in networks connected to the Internet of Things(IoT)is of utmost importance because of the growing vulnerabilities in the smart environment.Conventional models,such as Naive Bayes and support v... Detecting cyber attacks in networks connected to the Internet of Things(IoT)is of utmost importance because of the growing vulnerabilities in the smart environment.Conventional models,such as Naive Bayes and support vector machine(SVM),as well as ensemble methods,such as Gradient Boosting and eXtreme gradient boosting(XGBoost),are often plagued by high computational costs,which makes it challenging for them to perform real-time detection.In this regard,we suggested an attack detection approach that integrates Visual Geometry Group 16(VGG16),Artificial Rabbits Optimizer(ARO),and Random Forest Model to increase detection accuracy and operational efficiency in Internet of Things(IoT)networks.In the suggested model,the extraction of features from malware pictures was accomplished with the help of VGG16.The prediction process is carried out by the random forest model using the extracted features from the VGG16.Additionally,ARO is used to improve the hyper-parameters of the random forest model of the random forest.With an accuracy of 96.36%,the suggested model outperforms the standard models in terms of accuracy,F1-score,precision,and recall.The comparative research highlights our strategy’s success,which improves performance while maintaining a lower computational cost.This method is ideal for real-time applications,but it is effective. 展开更多
关键词 Malware detection VGG feature extraction artificial rabbits OPTIMIZATION random forest model
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
3
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Cardiovascular Sound Classification Using Neural Architectures and Deep Learning for Advancing Cardiac Wellness
4
作者 Deepak Mahto Sudhakar Kumar +6 位作者 Sunil KSingh Amit Chhabra Irfan Ahmad Khan Varsha Arya Wadee Alhalabi Brij B.Gupta Bassma Saleh Alsulami 《Computer Modeling in Engineering & Sciences》 2025年第6期3743-3767,共25页
Cardiovascular diseases(CVDs)remain one of the foremost causes of death globally;hence,the need for several must-have,advanced automated diagnostic solutions towards early detection and intervention.Traditional auscul... Cardiovascular diseases(CVDs)remain one of the foremost causes of death globally;hence,the need for several must-have,advanced automated diagnostic solutions towards early detection and intervention.Traditional auscultation of cardiovascular sounds is heavily reliant on clinical expertise and subject to high variability.To counter this limitation,this study proposes an AI-driven classification system for cardiovascular sounds whereby deep learning techniques are engaged to automate the detection of an abnormal heartbeat.We employ FastAI vision-learner-based convolutional neural networks(CNNs)that include ResNet,DenseNet,VGG,ConvNeXt,SqueezeNet,and AlexNet to classify heart sound recordings.Instead of raw waveform analysis,the proposed approach transforms preprocessed cardiovascular audio signals into spectrograms,which are suited for capturing temporal and frequency-wise patterns.The models are trained on the PASCAL Cardiovascular Challenge dataset while taking into consideration the recording variations,noise levels,and acoustic distortions.To demonstrate generalization,external validation using Google’s Audio set Heartbeat Sound dataset was performed using a dataset rich in cardiovascular sounds.Comparative analysis revealed that DenseNet-201,ConvNext Large,and ResNet-152 could deliver superior performance to the other architectures,achieving an accuracy of 81.50%,a precision of 85.50%,and an F1-score of 84.50%.In the process,we performed statistical significance testing,such as the Wilcoxon signed-rank test,to validate performance improvements over traditional classification methods.Beyond the technical contributions,the research underscores clinical integration,outlining a pathway in which the proposed system can augment conventional electronic stethoscopes and telemedicine platforms in the AI-assisted diagnostic workflows.We also discuss in detail issues of computational efficiency,model interpretability,and ethical considerations,particularly concerning algorithmic bias stemming from imbalanced datasets and the need for real-time processing in clinical settings.The study describes a scalable,automated system combining deep learning,feature extraction using spectrograms,and external validation that can assist healthcare providers in the early and accurate detection of cardiovascular disease.AI-driven solutions can be viable in improving access,reducing delays in diagnosis,and ultimately even the continued global burden of heart disease. 展开更多
关键词 Healthy society cardiovascular system SPECTROGRAM FastAI audio signals computer vision neural network
在线阅读 下载PDF
Making the case for the evolving role of social media in health professions education and a literature review on the application of some in ophthalmology 被引量:1
5
作者 Helena Prior Filipe Mila Kostic +1 位作者 Mildred Lopez Karl Golnik 《Annals of Eye Science》 2024年第2期1-11,共11页
Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s ... Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s initial skepticism SoMe has been gaining traction in supporting learning communities,and offering opportunities for innovation in HPE.Our study aims to explore the integration of SoMe in HPE.Four key components were outlined as necessary for a successful integration,and include designing learning experiences,defining educator roles,selecting appropriate platforms,and establishing educational objectives.Methods:This article stemmed from the online Teaching Skills Series module on SoMe in education from the Ophthalmology Foundation,and drew upon evidence supporting learning theories relevant to SoMe integration and models of education.Additionally,we conducted a literature review considering Englishlanguage articles on the application of SoMe in ophthalmology from PubMed over the past decade.Key Content and Findings:Early adopters of SoMe platforms in HPE have leveraged these tools to enhance learning experiences through interaction,dialogue,content sharing,and active learning strategies.By integrating SoMe into educational programs,both online and in-person,educators can overcome time and geographical constraints,fostering more diverse and inclusive learning communities.Careful consideration is,however,necessary to address potential limitations within HPE.Conclusions:This article lays groundwork for expanding SoMe integration in HPE design,emphasizing the supportive scaffold of various learning theories,and the need of furthering robust research on examining its advantages over traditional educational formats.Our literature review underscores an ongoing multifaceted,random application of SoMe platforms in ophthalmology education.We advocate for an effective incorporation of SoMe in HPE education,with the need to comply with good educational practice. 展开更多
关键词 Social media(SoMe) health professions education(HPE) active learning social learning technology enhanced learning
在线阅读 下载PDF
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
6
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance Protection systems Vehicle protection Armor design
在线阅读 下载PDF
Multifunctional HDPE/Cu biocidal nanocomposites for MEX additive manufactured parts: Perspectives for the defense industry
7
作者 Nectarios Vidakis Nikolaos Michailidis +7 位作者 Markos Petousis Nektarios K.Nasikas Vassilios Saltas Vassilis Papadakis Nikolaos Mountakis Apostolos Argyros Mariza Spiridaki Ioannis Valsamos 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第8期16-32,共17页
In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0... In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum. 展开更多
关键词 High-density polyethylene(HDPE) Copper(Cu) Material extrusion(MEX) Mechanical performance Electrical properties ANTIBACTERIAL Defense and security
在线阅读 下载PDF
Unleashing the Power of Multi-Agent Reinforcement Learning for Algorithmic Trading in the Digital Financial Frontier and Enterprise Information Systems
8
作者 Saket Sarin Sunil K.Singh +4 位作者 Sudhakar Kumar Shivam Goyal Brij Bhooshan Gupta Wadee Alhalabi Varsha Arya 《Computers, Materials & Continua》 SCIE EI 2024年第8期3123-3138,共16页
In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading... In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading.Our in-depth investigation delves into the intricacies of merging Multi-Agent Reinforcement Learning(MARL)and Explainable AI(XAI)within Fintech,aiming to refine Algorithmic Trading strategies.Through meticulous examination,we uncover the nuanced interactions of AI-driven agents as they collaborate and compete within the financial realm,employing sophisticated deep learning techniques to enhance the clarity and adaptability of trading decisions.These AI-infused Fintech platforms harness collective intelligence to unearth trends,mitigate risks,and provide tailored financial guidance,fostering benefits for individuals and enterprises navigating the digital landscape.Our research holds the potential to revolutionize finance,opening doors to fresh avenues for investment and asset management in the digital age.Additionally,our statistical evaluation yields encouraging results,with metrics such as Accuracy=0.85,Precision=0.88,and F1 Score=0.86,reaffirming the efficacy of our approach within Fintech and emphasizing its reliability and innovative prowess. 展开更多
关键词 Neurodynamic Fintech multi-agent reinforcement learning algorithmic trading digital financial frontier
在线阅读 下载PDF
A Comprehensive Image Processing Framework for Early Diagnosis of Diabetic Retinopathy
9
作者 Kusum Yadav Yasser Alharbi +6 位作者 Eissa Jaber Alreshidi Abdulrahman Alreshidi Anuj Kumar Jain Anurag Jain Kamal Kumar Sachin Sharma Brij BGupta 《Computers, Materials & Continua》 SCIE EI 2024年第11期2665-2683,共19页
In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis... In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis of medical images is essential for doctors,as manual investigation often leads to inter-observer variability.This research aims to enhance healthcare by enabling the early detection of diabetic retinopathy through an efficient image processing framework.The proposed hybridized method combines Modified Inertia Weight Particle Swarm Optimization(MIWPSO)and Fuzzy C-Means clustering(FCM)algorithms.Traditional FCM does not incorporate spatial neighborhood features,making it highly sensitive to noise,which significantly affects segmentation output.Our method incorporates a modified FCM that includes spatial functions in the fuzzy membership matrix to eliminate noise.The results demonstrate that the proposed FCM-MIWPSO method achieves highly precise and accurate medical image segmentation.Furthermore,segmented images are classified as benign or malignant using the Decision Tree-Based Temporal Association Rule(DT-TAR)Algorithm.Comparative analysis with existing state-of-the-art models indicates that the proposed FCM-MIWPSO segmentation technique achieves a remarkable accuracy of 98.42%on the dataset,highlighting its significant impact on improving diagnostic capabilities in medical imaging. 展开更多
关键词 Image processing biological data PSO Fuzzy C-Means(FCM)
在线阅读 下载PDF
Selective and Adaptive Incremental Transfer Learning with Multiple Datasets for Machine Fault Diagnosis
10
作者 Kwok Tai Chui Brij B.Gupta +1 位作者 Varsha Arya Miguel Torres-Ruiz 《Computers, Materials & Continua》 SCIE EI 2024年第1期1363-1379,共17页
The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation fo... The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure,and thus timely maintenance can ensure safe operations.Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model,which typically involves two datasets.In response to the availability of multiple datasets,this paper proposes using selective and adaptive incremental transfer learning(SA-ITL),which fuses three algorithms,namely,the hybrid selective algorithm,the transferability enhancement algorithm,and the incremental transfer learning algorithm.It is a selective algorithm that enables selecting and ordering appropriate datasets for transfer learning and selecting useful knowledge to avoid negative transfer.The algorithm also adaptively adjusts the portion of training data to balance the learning rate and training time.The proposed algorithm is evaluated and analyzed using ten benchmark datasets.Compared with other algorithms from existing works,SA-ITL improves the accuracy of all datasets.Ablation studies present the accuracy enhancements of the SA-ITL,including the hybrid selective algorithm(1.22%-3.82%),transferability enhancement algorithm(1.91%-4.15%),and incremental transfer learning algorithm(0.605%-2.68%).These also show the benefits of enhancing the target model with heterogeneous image datasets that widen the range of domain selection between source and target domains. 展开更多
关键词 Deep learning incremental learning machine fault diagnosis negative transfer transfer learning
在线阅读 下载PDF
LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes
11
作者 Brij B.Gupta Akshat Gaurav +3 位作者 Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Kwok Tai Chui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2689-2706,共18页
This study introduces a long-short-term memory(LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes,focusing on the critical application of elderly fall detection.It ... This study introduces a long-short-term memory(LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes,focusing on the critical application of elderly fall detection.It balances the dataset using the Synthetic Minority Over-sampling Technique(SMOTE),effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks.The proposed LSTM model is trained on the enriched dataset,capturing the temporal dependencies essential for anomaly recognition.The model demonstrated a significant improvement in anomaly detection,with an accuracy of 84%.The results,detailed in the comprehensive classification and confusion matrices,showed the model’s proficiency in distinguishing between normal activities and falls.This study contributes to the advancement of smart home safety,presenting a robust framework for real-time anomaly monitoring. 展开更多
关键词 LSTM neural networks anomaly detection smart home health-care elderly fall prevention
在线阅读 下载PDF
Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks
12
作者 Brij B.Gupta Akshat Gaurav +4 位作者 Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 《Computers, Materials & Continua》 SCIE EI 2024年第12期4109-4124,共16页
Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are eithe... Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application.This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection.Our model employs a two-fold optimization approach:first,it utilizes the analysis of the variance(ANOVA)F-test to select the optimal features for phishing detection,and second,it applies the Cuckoo Search algorithm to tune the hyperparameters(learning rate and dropout rate)of the deep learning model.Additionally,our model is trained in only five epochs,making it more lightweight than other deep learning(DL)and machine learning(ML)models.The proposed model achieved a phishing detection accuracy of 91%,with a precision of 92%for the’normal’class and 91%for the‘attack’class.Moreover,the model’s recall and F1-score are 91%for both classes.We also compared our approach with traditional DL/ML models and past literature,demonstrating that our model is more accurate.This study enhances the security of sensitive information and IoT devices by offering a novel and effective approach to phishing detection. 展开更多
关键词 Deep learning PHISHING Cuckoo Search cable news network(CNN) IOT ANOVA F-test
在线阅读 下载PDF
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems
13
作者 Brij B.Gupta Akshat Gaurav +4 位作者 Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2165-2183,共19页
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ... Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information systems.BERT’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing detection.Achieving an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing emails.This approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks. 展开更多
关键词 PHISHING BERT convolutional neural networks email security deep learning
在线阅读 下载PDF
A Comprehensive Survey on Federated Learning Applications in Computational Mental Healthcare 被引量:1
14
作者 Vajratiya Vajrobol Geetika Jain Saxena +6 位作者 Amit Pundir Sanjeev Singh Akshat Gaurav Savi Bansal Razaz Waheeb Attar Mosiur Rahman Brij B.Gupta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期49-90,共42页
Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Num... Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Numerous applications have been developed to support the challenges in intelligent healthcare systems.However,because mental health data is sensitive,privacy concerns have emerged.Federated learning has gotten some attention.This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems.It explores various dimensions of federated learning in mental health,such as datasets(their types and sources),applications categorized based on mental health symptoms,federated mental health frameworks,federated machine learning,federated deep learning,and the benefits of federated learning in mental health applications.This research conducts surveys to evaluate the current state of mental health applications,mainly focusing on the role of Federated Learning(FL)and related privacy and data security concerns.The survey provides valuable insights into how these applications are emerging and evolving,specifically emphasizing FL’s impact. 展开更多
关键词 DEPRESSION emotional recognition intelligent healthcare systems mental health federated learning stress detection sleep behaviour
在线阅读 下载PDF
Future of non-invasive graft evaluation:A systematic review of proteomics in kidney transplantation
15
作者 Eleni Avramidou Konstantina Psatha +2 位作者 Kallisti St John Georgios Tsoulfas Michalis Aivaliotis 《World Journal of Transplantation》 2025年第1期135-149,共15页
BACKGROUND Despite the developments in the field of kidney transplantation,the already existing diagnostic techniques for patient monitoring are considered insufficient.Protein biomarkers that can be derived from mode... BACKGROUND Despite the developments in the field of kidney transplantation,the already existing diagnostic techniques for patient monitoring are considered insufficient.Protein biomarkers that can be derived from modern approaches of proteomic analysis of liquid biopsies(serum,urine)represent a promising innovation in the monitoring of kidney transplant recipients.AIM To investigate the diagnostic utility of protein biomarkers derived from proteomics approaches in renal allograft assessment.METHODS A systematic review was conducted in accordance with PRISMA guidelines,based on research results from the PubMed and Scopus databases.The primary focus was on evaluating the role of biomarkers in the non-invasive diagnosis of transplant-related com-plications.Eligibility criteria included protein biomarkers and urine and blood samples,while exclusion criteria were language other than English and the use of low resolution and sensitivity methods.The selected research articles,were categorized based on the biological sample,condition and methodology and the significantly and reproducibly differentiated proteins were manually selected and extracted.Functional and network analysis of the selected proteins was performed.RESULTS In 17 included studies,58 proteins were studied,with the cytokine CXCL10 being the most investigated.Biological pathways related to immune response and fibrosis have shown to be enriched.Applications of biomarkers for the assessment of renal damage as well as the prediction of short-term and long-term function of the graft were reported.Overall,all studies have shown satisfactory diagnostic accuracy of proteins alone or in combination with conventional methods,as far as renal graft assessment is concerned.CONCLUSION Our review suggests that protein biomarkers,evaluated in specific biological fluids,can make a significant contribution to the timely,valid and non-invasive assessment of kidney graft. 展开更多
关键词 PROTEOMICS Kidney transplantation Graft evaluation Non-invasive diagnosis Kidney graft function
暂未订购
Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)
16
作者 Jitendra Kumar Samriya Virendra Singh +4 位作者 Gourav Bathla Meena Malik Varsha Arya Wadee Alhalabi Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3893-3910,共18页
The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated cha... The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated challenges,such as data security,interoperability,and ethical concerns,is crucial to realizing the full potential of IoT in healthcare.Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems.In this context,this paper presents a novelmethod for healthcare data privacy analysis.The technique is based on the identification of anomalies in cloud-based Internet of Things(IoT)networks,and it is optimized using explainable artificial intelligence.For anomaly detection,the Radial Boltzmann Gaussian Temporal Fuzzy Network(RBGTFN)is used in the process of doing information privacy analysis for healthcare data.Remora Colony SwarmOptimization is then used to carry out the optimization of the network.The performance of the model in identifying anomalies across a variety of healthcare data is evaluated by an experimental study.This evaluation suggested that themodel measures the accuracy,precision,latency,Quality of Service(QoS),and scalability of themodel.A remarkable 95%precision,93%latency,89%quality of service,98%detection accuracy,and 96%scalability were obtained by the suggested model,as shown by the subsequent findings. 展开更多
关键词 Healthcare data privacy analysis anomaly detection cloud IoT network explainable artificial intelligence temporal fuzzy network
在线阅读 下载PDF
Insight to drug delivery aspects for colorectal cancer 被引量:5
17
作者 Arvind Gulbake Aviral Jain +2 位作者 Ashish Jain Ankit Jain Sanjay K Jain 《World Journal of Gastroenterology》 SCIE CAS 2016年第2期582-599,共18页
Colorectal cancer(CRC) is the third most common cancer diagnosed worldwide in human beings. Surgery, chemotherapy, radiotherapy and targeted therapiesare the conventional four approaches which are currently used for t... Colorectal cancer(CRC) is the third most common cancer diagnosed worldwide in human beings. Surgery, chemotherapy, radiotherapy and targeted therapiesare the conventional four approaches which are currently used for the treatment of CRC. The site specific delivery of chemotherapeutics to their site of action would increase effectiveness with reducing side effects. Targeted oral drug delivery systems based on polysaccharides are being investigated to target and deliver chemotherapeutic and chemopreventive agents directly to colon and rectum. Site-specific drug delivery to colon increases its concentration at the target site, and thus requires a lower dose and hence abridged side effects. Some novel therapies are also briefly discussed in article such as receptor(epidermal growth factor receptor, folate receptor, wheat germ agglutinin, VEGF receptor, hyaluronic acid receptor) based targeting therapy; colon targeted proapoptotic anticancer drug delivery system, gene therapy. Even though good treatment options are available for CRC, the ultimate therapeutic approach is to avert the incidence of CRC. It was also found that CRCs could be prevented by diet and nutrition such as calcium, vitamin D, curcumin, quercetin and fish oil supplements. Immunotherapy and vaccination are used nowadays which are showing better results against CRC. 展开更多
关键词 COLORECTAL cancer RECEPTOR based targetedtherapy GENE delivery
暂未订购
A Comparison Study of Deep Galerkin Method and Deep Ritz Method for Elliptic Problems with Different Boundary Conditions 被引量:5
18
作者 Jingrun Chen Rui Du Keke Wu 《Communications in Mathematical Research》 CSCD 2020年第3期354-376,共23页
Recent years have witnessed growing interests in solving partial differential equations by deep neural networks,especially in the high-dimensional case.Unlike classical numerical methods,such as finite difference meth... Recent years have witnessed growing interests in solving partial differential equations by deep neural networks,especially in the high-dimensional case.Unlike classical numerical methods,such as finite difference method and finite element method,the enforcement of boundary conditions in deep neural networks is highly nontrivial.One general strategy is to use the penalty method.In the work,we conduct a comparison study for elliptic problems with four different boundary conditions,i.e.,Dirichlet,Neumann,Robin,and periodic boundary conditions,using two representative methods:deep Galerkin method and deep Ritz method.In the former,the PDE residual is minimized in the least-squares sense while the corresponding variational problem is minimized in the latter.Therefore,it is reasonably expected that deep Galerkin method works better for smooth solutions while deep Ritz method works better for low-regularity solutions.However,by a number of examples,we observe that deep Ritz method can outperform deep Galerkin method with a clear dependence of dimensionality even for smooth solutions and deep Galerkin method can also outperform deep Ritz method for low-regularity solutions.Besides,in some cases,when the boundary condition can be implemented in an exact manner,we find that such a strategy not only provides a better approximate solution but also facilitates the training process. 展开更多
关键词 Partial differential equations boundary conditions deep Galerkin method deep Ritz method penalty method
在线阅读 下载PDF
The Relationship of Effortful Control to Academic Achievement via Children’s Learning-Related Behaviors
19
作者 Maria Sofologi Sofia Koulouri +7 位作者 Magda Ntinou Effie Katsadima Aphrodite Papantoniou Konstantinos Staikopoulos Panagiotis Varsamis Harilaos Zaragkas Despina Moraitou Georgia Papantoniou 《Journal of Behavioral and Brain Science》 CAS 2022年第8期380-399,共20页
Effortful control (EC) is a temperamental self-regulatory capacity, defined as the efficiency of executive attention [1], which is related to individual differences in self-regulation. Although effortful control cover... Effortful control (EC) is a temperamental self-regulatory capacity, defined as the efficiency of executive attention [1], which is related to individual differences in self-regulation. Although effortful control covers some dispositional self-regulatory abilities important to cope with social demands of successful adaptation to school, such as attention regulation, individual differences in EC have recently been associated with school functioning through academic achievement including the efficient use of learning-related behaviors, which have been found to be a necessary precursor of learning and they refer to a set of children’s behaviors that involve organizational skills and appropriate habits of study. Therefore, the aim of this study is to review the literature on EC’s relationship to academic achievement via learning-related behaviors, which reflect the use of metacognitive control processes in kindergarten and elementary school students. The findings indicate that EC affects academic achievement through the facilitation of the efficient use of metacognitive control processes. 展开更多
关键词 Academic Achievement Effortful Control Learning-Related Behaviors Metacognitive Control SELF-REGULATION
在线阅读 下载PDF
Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm
20
作者 Brij Bhooshan Gupta Akshat Gaurav +3 位作者 Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Kwok Tai Chui 《Computers, Materials & Continua》 SCIE EI 2024年第9期4895-4916,共22页
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detec... Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishingUniformResource Locator(URLs).Addressing these challenge,we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network(RNN)with the hyperparameter optimization prowess of theWhale Optimization Algorithm(WOA).Ourmodel capitalizes on an extensive Kaggle dataset,featuring over 11,000 URLs,each delineated by 30 attributes.The WOA’s hyperparameter optimization enhances the RNN’s performance,evidenced by a meticulous validation process.The results,encapsulated in precision,recall,and F1-score metrics,surpass baseline models,achieving an overall accuracy of 92%.This study not only demonstrates the RNN’s proficiency in learning complex patterns but also underscores the WOA’s effectiveness in refining machine learning models for the critical task of phishing detection. 展开更多
关键词 Phishing detection Recurrent Neural Network(RNN) Whale Optimization Algorithm(WOA) CYBERSECURITY machine learning optimization
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部