Functional superhydrophobic coatings have attracted considerable attention because of their potential for a wide range of applications.In this study,a novel cyclotetrasiloxane-based hybrid superhydrophobic modifier(F-...Functional superhydrophobic coatings have attracted considerable attention because of their potential for a wide range of applications.In this study,a novel cyclotetrasiloxane-based hybrid superhydrophobic modifier(F-D_(4))was prepared for the first time using a mild thiolene click reaction of 2,4,6,8-tetravinyl-2,4,6,8-tetramethylcyclotetrasiloxane(Vi-D_(4))with perfluorohexylethanethiol(PFOT)and mercaptopropyltrimethoxysilane(MPTMS)as the raw materials.Then,F-D_(4) was introduced into the fabric via a sol-gel process,resulting in a superhydrophobic fabric(F-D_(4)-Fabric).The surface characteristics of the modified fabric were determined using scanning electron microscopy(SEM),Fourier transform infrared spectroscopy(FTIR),X-ray photoelectron spectroscopy(XPS),and water contact angle(WCA).The coated fabrics have outstanding mechanical,physical,and chemical stability,and exhibit excellent self-cleaning and anti-fouling properties.Owing to its superhydrophobicity,FD_(4)-Fabric could efficiently separate a range of oil/water mixtures with a separation efficiency of up to 99.99%.The study showed that the modification strategy used in the dip-coating process greatly affected the superhydrophobicity of the cotton fabric,which is useful for oil/water separation and self-cleaning applications.展开更多
Detecting cyber attacks in networks connected to the Internet of Things(IoT)is of utmost importance because of the growing vulnerabilities in the smart environment.Conventional models,such as Naive Bayes and support v...Detecting cyber attacks in networks connected to the Internet of Things(IoT)is of utmost importance because of the growing vulnerabilities in the smart environment.Conventional models,such as Naive Bayes and support vector machine(SVM),as well as ensemble methods,such as Gradient Boosting and eXtreme gradient boosting(XGBoost),are often plagued by high computational costs,which makes it challenging for them to perform real-time detection.In this regard,we suggested an attack detection approach that integrates Visual Geometry Group 16(VGG16),Artificial Rabbits Optimizer(ARO),and Random Forest Model to increase detection accuracy and operational efficiency in Internet of Things(IoT)networks.In the suggested model,the extraction of features from malware pictures was accomplished with the help of VGG16.The prediction process is carried out by the random forest model using the extracted features from the VGG16.Additionally,ARO is used to improve the hyper-parameters of the random forest model of the random forest.With an accuracy of 96.36%,the suggested model outperforms the standard models in terms of accuracy,F1-score,precision,and recall.The comparative research highlights our strategy’s success,which improves performance while maintaining a lower computational cost.This method is ideal for real-time applications,but it is effective.展开更多
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system...As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk.展开更多
Cardiovascular diseases(CVDs)remain one of the foremost causes of death globally;hence,the need for several must-have,advanced automated diagnostic solutions towards early detection and intervention.Traditional auscul...Cardiovascular diseases(CVDs)remain one of the foremost causes of death globally;hence,the need for several must-have,advanced automated diagnostic solutions towards early detection and intervention.Traditional auscultation of cardiovascular sounds is heavily reliant on clinical expertise and subject to high variability.To counter this limitation,this study proposes an AI-driven classification system for cardiovascular sounds whereby deep learning techniques are engaged to automate the detection of an abnormal heartbeat.We employ FastAI vision-learner-based convolutional neural networks(CNNs)that include ResNet,DenseNet,VGG,ConvNeXt,SqueezeNet,and AlexNet to classify heart sound recordings.Instead of raw waveform analysis,the proposed approach transforms preprocessed cardiovascular audio signals into spectrograms,which are suited for capturing temporal and frequency-wise patterns.The models are trained on the PASCAL Cardiovascular Challenge dataset while taking into consideration the recording variations,noise levels,and acoustic distortions.To demonstrate generalization,external validation using Google’s Audio set Heartbeat Sound dataset was performed using a dataset rich in cardiovascular sounds.Comparative analysis revealed that DenseNet-201,ConvNext Large,and ResNet-152 could deliver superior performance to the other architectures,achieving an accuracy of 81.50%,a precision of 85.50%,and an F1-score of 84.50%.In the process,we performed statistical significance testing,such as the Wilcoxon signed-rank test,to validate performance improvements over traditional classification methods.Beyond the technical contributions,the research underscores clinical integration,outlining a pathway in which the proposed system can augment conventional electronic stethoscopes and telemedicine platforms in the AI-assisted diagnostic workflows.We also discuss in detail issues of computational efficiency,model interpretability,and ethical considerations,particularly concerning algorithmic bias stemming from imbalanced datasets and the need for real-time processing in clinical settings.The study describes a scalable,automated system combining deep learning,feature extraction using spectrograms,and external validation that can assist healthcare providers in the early and accurate detection of cardiovascular disease.AI-driven solutions can be viable in improving access,reducing delays in diagnosis,and ultimately even the continued global burden of heart disease.展开更多
Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s ...Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s initial skepticism SoMe has been gaining traction in supporting learning communities,and offering opportunities for innovation in HPE.Our study aims to explore the integration of SoMe in HPE.Four key components were outlined as necessary for a successful integration,and include designing learning experiences,defining educator roles,selecting appropriate platforms,and establishing educational objectives.Methods:This article stemmed from the online Teaching Skills Series module on SoMe in education from the Ophthalmology Foundation,and drew upon evidence supporting learning theories relevant to SoMe integration and models of education.Additionally,we conducted a literature review considering Englishlanguage articles on the application of SoMe in ophthalmology from PubMed over the past decade.Key Content and Findings:Early adopters of SoMe platforms in HPE have leveraged these tools to enhance learning experiences through interaction,dialogue,content sharing,and active learning strategies.By integrating SoMe into educational programs,both online and in-person,educators can overcome time and geographical constraints,fostering more diverse and inclusive learning communities.Careful consideration is,however,necessary to address potential limitations within HPE.Conclusions:This article lays groundwork for expanding SoMe integration in HPE design,emphasizing the supportive scaffold of various learning theories,and the need of furthering robust research on examining its advantages over traditional educational formats.Our literature review underscores an ongoing multifaceted,random application of SoMe platforms in ophthalmology education.We advocate for an effective incorporation of SoMe in HPE education,with the need to comply with good educational practice.展开更多
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i...A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.展开更多
In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0...In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum.展开更多
In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading...In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading.Our in-depth investigation delves into the intricacies of merging Multi-Agent Reinforcement Learning(MARL)and Explainable AI(XAI)within Fintech,aiming to refine Algorithmic Trading strategies.Through meticulous examination,we uncover the nuanced interactions of AI-driven agents as they collaborate and compete within the financial realm,employing sophisticated deep learning techniques to enhance the clarity and adaptability of trading decisions.These AI-infused Fintech platforms harness collective intelligence to unearth trends,mitigate risks,and provide tailored financial guidance,fostering benefits for individuals and enterprises navigating the digital landscape.Our research holds the potential to revolutionize finance,opening doors to fresh avenues for investment and asset management in the digital age.Additionally,our statistical evaluation yields encouraging results,with metrics such as Accuracy=0.85,Precision=0.88,and F1 Score=0.86,reaffirming the efficacy of our approach within Fintech and emphasizing its reliability and innovative prowess.展开更多
In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis...In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis of medical images is essential for doctors,as manual investigation often leads to inter-observer variability.This research aims to enhance healthcare by enabling the early detection of diabetic retinopathy through an efficient image processing framework.The proposed hybridized method combines Modified Inertia Weight Particle Swarm Optimization(MIWPSO)and Fuzzy C-Means clustering(FCM)algorithms.Traditional FCM does not incorporate spatial neighborhood features,making it highly sensitive to noise,which significantly affects segmentation output.Our method incorporates a modified FCM that includes spatial functions in the fuzzy membership matrix to eliminate noise.The results demonstrate that the proposed FCM-MIWPSO method achieves highly precise and accurate medical image segmentation.Furthermore,segmented images are classified as benign or malignant using the Decision Tree-Based Temporal Association Rule(DT-TAR)Algorithm.Comparative analysis with existing state-of-the-art models indicates that the proposed FCM-MIWPSO segmentation technique achieves a remarkable accuracy of 98.42%on the dataset,highlighting its significant impact on improving diagnostic capabilities in medical imaging.展开更多
The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation fo...The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure,and thus timely maintenance can ensure safe operations.Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model,which typically involves two datasets.In response to the availability of multiple datasets,this paper proposes using selective and adaptive incremental transfer learning(SA-ITL),which fuses three algorithms,namely,the hybrid selective algorithm,the transferability enhancement algorithm,and the incremental transfer learning algorithm.It is a selective algorithm that enables selecting and ordering appropriate datasets for transfer learning and selecting useful knowledge to avoid negative transfer.The algorithm also adaptively adjusts the portion of training data to balance the learning rate and training time.The proposed algorithm is evaluated and analyzed using ten benchmark datasets.Compared with other algorithms from existing works,SA-ITL improves the accuracy of all datasets.Ablation studies present the accuracy enhancements of the SA-ITL,including the hybrid selective algorithm(1.22%-3.82%),transferability enhancement algorithm(1.91%-4.15%),and incremental transfer learning algorithm(0.605%-2.68%).These also show the benefits of enhancing the target model with heterogeneous image datasets that widen the range of domain selection between source and target domains.展开更多
This study introduces a long-short-term memory(LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes,focusing on the critical application of elderly fall detection.It ...This study introduces a long-short-term memory(LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes,focusing on the critical application of elderly fall detection.It balances the dataset using the Synthetic Minority Over-sampling Technique(SMOTE),effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks.The proposed LSTM model is trained on the enriched dataset,capturing the temporal dependencies essential for anomaly recognition.The model demonstrated a significant improvement in anomaly detection,with an accuracy of 84%.The results,detailed in the comprehensive classification and confusion matrices,showed the model’s proficiency in distinguishing between normal activities and falls.This study contributes to the advancement of smart home safety,presenting a robust framework for real-time anomaly monitoring.展开更多
Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are eithe...Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application.This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection.Our model employs a two-fold optimization approach:first,it utilizes the analysis of the variance(ANOVA)F-test to select the optimal features for phishing detection,and second,it applies the Cuckoo Search algorithm to tune the hyperparameters(learning rate and dropout rate)of the deep learning model.Additionally,our model is trained in only five epochs,making it more lightweight than other deep learning(DL)and machine learning(ML)models.The proposed model achieved a phishing detection accuracy of 91%,with a precision of 92%for the’normal’class and 91%for the‘attack’class.Moreover,the model’s recall and F1-score are 91%for both classes.We also compared our approach with traditional DL/ML models and past literature,demonstrating that our model is more accurate.This study enhances the security of sensitive information and IoT devices by offering a novel and effective approach to phishing detection.展开更多
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ...Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information systems.BERT’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing detection.Achieving an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing emails.This approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks.展开更多
Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Num...Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Numerous applications have been developed to support the challenges in intelligent healthcare systems.However,because mental health data is sensitive,privacy concerns have emerged.Federated learning has gotten some attention.This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems.It explores various dimensions of federated learning in mental health,such as datasets(their types and sources),applications categorized based on mental health symptoms,federated mental health frameworks,federated machine learning,federated deep learning,and the benefits of federated learning in mental health applications.This research conducts surveys to evaluate the current state of mental health applications,mainly focusing on the role of Federated Learning(FL)and related privacy and data security concerns.The survey provides valuable insights into how these applications are emerging and evolving,specifically emphasizing FL’s impact.展开更多
BACKGROUND Despite the developments in the field of kidney transplantation,the already existing diagnostic techniques for patient monitoring are considered insufficient.Protein biomarkers that can be derived from mode...BACKGROUND Despite the developments in the field of kidney transplantation,the already existing diagnostic techniques for patient monitoring are considered insufficient.Protein biomarkers that can be derived from modern approaches of proteomic analysis of liquid biopsies(serum,urine)represent a promising innovation in the monitoring of kidney transplant recipients.AIM To investigate the diagnostic utility of protein biomarkers derived from proteomics approaches in renal allograft assessment.METHODS A systematic review was conducted in accordance with PRISMA guidelines,based on research results from the PubMed and Scopus databases.The primary focus was on evaluating the role of biomarkers in the non-invasive diagnosis of transplant-related com-plications.Eligibility criteria included protein biomarkers and urine and blood samples,while exclusion criteria were language other than English and the use of low resolution and sensitivity methods.The selected research articles,were categorized based on the biological sample,condition and methodology and the significantly and reproducibly differentiated proteins were manually selected and extracted.Functional and network analysis of the selected proteins was performed.RESULTS In 17 included studies,58 proteins were studied,with the cytokine CXCL10 being the most investigated.Biological pathways related to immune response and fibrosis have shown to be enriched.Applications of biomarkers for the assessment of renal damage as well as the prediction of short-term and long-term function of the graft were reported.Overall,all studies have shown satisfactory diagnostic accuracy of proteins alone or in combination with conventional methods,as far as renal graft assessment is concerned.CONCLUSION Our review suggests that protein biomarkers,evaluated in specific biological fluids,can make a significant contribution to the timely,valid and non-invasive assessment of kidney graft.展开更多
The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated cha...The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated challenges,such as data security,interoperability,and ethical concerns,is crucial to realizing the full potential of IoT in healthcare.Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems.In this context,this paper presents a novelmethod for healthcare data privacy analysis.The technique is based on the identification of anomalies in cloud-based Internet of Things(IoT)networks,and it is optimized using explainable artificial intelligence.For anomaly detection,the Radial Boltzmann Gaussian Temporal Fuzzy Network(RBGTFN)is used in the process of doing information privacy analysis for healthcare data.Remora Colony SwarmOptimization is then used to carry out the optimization of the network.The performance of the model in identifying anomalies across a variety of healthcare data is evaluated by an experimental study.This evaluation suggested that themodel measures the accuracy,precision,latency,Quality of Service(QoS),and scalability of themodel.A remarkable 95%precision,93%latency,89%quality of service,98%detection accuracy,and 96%scalability were obtained by the suggested model,as shown by the subsequent findings.展开更多
Colorectal cancer(CRC) is the third most common cancer diagnosed worldwide in human beings. Surgery, chemotherapy, radiotherapy and targeted therapiesare the conventional four approaches which are currently used for t...Colorectal cancer(CRC) is the third most common cancer diagnosed worldwide in human beings. Surgery, chemotherapy, radiotherapy and targeted therapiesare the conventional four approaches which are currently used for the treatment of CRC. The site specific delivery of chemotherapeutics to their site of action would increase effectiveness with reducing side effects. Targeted oral drug delivery systems based on polysaccharides are being investigated to target and deliver chemotherapeutic and chemopreventive agents directly to colon and rectum. Site-specific drug delivery to colon increases its concentration at the target site, and thus requires a lower dose and hence abridged side effects. Some novel therapies are also briefly discussed in article such as receptor(epidermal growth factor receptor, folate receptor, wheat germ agglutinin, VEGF receptor, hyaluronic acid receptor) based targeting therapy; colon targeted proapoptotic anticancer drug delivery system, gene therapy. Even though good treatment options are available for CRC, the ultimate therapeutic approach is to avert the incidence of CRC. It was also found that CRCs could be prevented by diet and nutrition such as calcium, vitamin D, curcumin, quercetin and fish oil supplements. Immunotherapy and vaccination are used nowadays which are showing better results against CRC.展开更多
Recent years have witnessed growing interests in solving partial differential equations by deep neural networks,especially in the high-dimensional case.Unlike classical numerical methods,such as finite difference meth...Recent years have witnessed growing interests in solving partial differential equations by deep neural networks,especially in the high-dimensional case.Unlike classical numerical methods,such as finite difference method and finite element method,the enforcement of boundary conditions in deep neural networks is highly nontrivial.One general strategy is to use the penalty method.In the work,we conduct a comparison study for elliptic problems with four different boundary conditions,i.e.,Dirichlet,Neumann,Robin,and periodic boundary conditions,using two representative methods:deep Galerkin method and deep Ritz method.In the former,the PDE residual is minimized in the least-squares sense while the corresponding variational problem is minimized in the latter.Therefore,it is reasonably expected that deep Galerkin method works better for smooth solutions while deep Ritz method works better for low-regularity solutions.However,by a number of examples,we observe that deep Ritz method can outperform deep Galerkin method with a clear dependence of dimensionality even for smooth solutions and deep Galerkin method can also outperform deep Ritz method for low-regularity solutions.Besides,in some cases,when the boundary condition can be implemented in an exact manner,we find that such a strategy not only provides a better approximate solution but also facilitates the training process.展开更多
Effortful control (EC) is a temperamental self-regulatory capacity, defined as the efficiency of executive attention [1], which is related to individual differences in self-regulation. Although effortful control cover...Effortful control (EC) is a temperamental self-regulatory capacity, defined as the efficiency of executive attention [1], which is related to individual differences in self-regulation. Although effortful control covers some dispositional self-regulatory abilities important to cope with social demands of successful adaptation to school, such as attention regulation, individual differences in EC have recently been associated with school functioning through academic achievement including the efficient use of learning-related behaviors, which have been found to be a necessary precursor of learning and they refer to a set of children’s behaviors that involve organizational skills and appropriate habits of study. Therefore, the aim of this study is to review the literature on EC’s relationship to academic achievement via learning-related behaviors, which reflect the use of metacognitive control processes in kindergarten and elementary school students. The findings indicate that EC affects academic achievement through the facilitation of the efficient use of metacognitive control processes.展开更多
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detec...Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishingUniformResource Locator(URLs).Addressing these challenge,we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network(RNN)with the hyperparameter optimization prowess of theWhale Optimization Algorithm(WOA).Ourmodel capitalizes on an extensive Kaggle dataset,featuring over 11,000 URLs,each delineated by 30 attributes.The WOA’s hyperparameter optimization enhances the RNN’s performance,evidenced by a meticulous validation process.The results,encapsulated in precision,recall,and F1-score metrics,surpass baseline models,achieving an overall accuracy of 92%.This study not only demonstrates the RNN’s proficiency in learning complex patterns but also underscores the WOA’s effectiveness in refining machine learning models for the critical task of phishing detection.展开更多
基金financially supported by the National Key R&D Program of China(No.2022YFE0197000)。
文摘Functional superhydrophobic coatings have attracted considerable attention because of their potential for a wide range of applications.In this study,a novel cyclotetrasiloxane-based hybrid superhydrophobic modifier(F-D_(4))was prepared for the first time using a mild thiolene click reaction of 2,4,6,8-tetravinyl-2,4,6,8-tetramethylcyclotetrasiloxane(Vi-D_(4))with perfluorohexylethanethiol(PFOT)and mercaptopropyltrimethoxysilane(MPTMS)as the raw materials.Then,F-D_(4) was introduced into the fabric via a sol-gel process,resulting in a superhydrophobic fabric(F-D_(4)-Fabric).The surface characteristics of the modified fabric were determined using scanning electron microscopy(SEM),Fourier transform infrared spectroscopy(FTIR),X-ray photoelectron spectroscopy(XPS),and water contact angle(WCA).The coated fabrics have outstanding mechanical,physical,and chemical stability,and exhibit excellent self-cleaning and anti-fouling properties.Owing to its superhydrophobicity,FD_(4)-Fabric could efficiently separate a range of oil/water mixtures with a separation efficiency of up to 99.99%.The study showed that the modification strategy used in the dip-coating process greatly affected the superhydrophobicity of the cotton fabric,which is useful for oil/water separation and self-cleaning applications.
基金funded by Institutional Fund Projects under grant no.(IFPDP-261-22)。
文摘Detecting cyber attacks in networks connected to the Internet of Things(IoT)is of utmost importance because of the growing vulnerabilities in the smart environment.Conventional models,such as Naive Bayes and support vector machine(SVM),as well as ensemble methods,such as Gradient Boosting and eXtreme gradient boosting(XGBoost),are often plagued by high computational costs,which makes it challenging for them to perform real-time detection.In this regard,we suggested an attack detection approach that integrates Visual Geometry Group 16(VGG16),Artificial Rabbits Optimizer(ARO),and Random Forest Model to increase detection accuracy and operational efficiency in Internet of Things(IoT)networks.In the suggested model,the extraction of features from malware pictures was accomplished with the help of VGG16.The prediction process is carried out by the random forest model using the extracted features from the VGG16.Additionally,ARO is used to improve the hyper-parameters of the random forest model of the random forest.With an accuracy of 96.36%,the suggested model outperforms the standard models in terms of accuracy,F1-score,precision,and recall.The comparative research highlights our strategy’s success,which improves performance while maintaining a lower computational cost.This method is ideal for real-time applications,but it is effective.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabiathe Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia for funding this research work through the project number NBU-FFR-2025-1092-10.
文摘As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk.
基金funded by the deanship of scientific research(DSR),King Abdulaziz University,Jeddah,under grant No.(G-1436-611-309).
文摘Cardiovascular diseases(CVDs)remain one of the foremost causes of death globally;hence,the need for several must-have,advanced automated diagnostic solutions towards early detection and intervention.Traditional auscultation of cardiovascular sounds is heavily reliant on clinical expertise and subject to high variability.To counter this limitation,this study proposes an AI-driven classification system for cardiovascular sounds whereby deep learning techniques are engaged to automate the detection of an abnormal heartbeat.We employ FastAI vision-learner-based convolutional neural networks(CNNs)that include ResNet,DenseNet,VGG,ConvNeXt,SqueezeNet,and AlexNet to classify heart sound recordings.Instead of raw waveform analysis,the proposed approach transforms preprocessed cardiovascular audio signals into spectrograms,which are suited for capturing temporal and frequency-wise patterns.The models are trained on the PASCAL Cardiovascular Challenge dataset while taking into consideration the recording variations,noise levels,and acoustic distortions.To demonstrate generalization,external validation using Google’s Audio set Heartbeat Sound dataset was performed using a dataset rich in cardiovascular sounds.Comparative analysis revealed that DenseNet-201,ConvNext Large,and ResNet-152 could deliver superior performance to the other architectures,achieving an accuracy of 81.50%,a precision of 85.50%,and an F1-score of 84.50%.In the process,we performed statistical significance testing,such as the Wilcoxon signed-rank test,to validate performance improvements over traditional classification methods.Beyond the technical contributions,the research underscores clinical integration,outlining a pathway in which the proposed system can augment conventional electronic stethoscopes and telemedicine platforms in the AI-assisted diagnostic workflows.We also discuss in detail issues of computational efficiency,model interpretability,and ethical considerations,particularly concerning algorithmic bias stemming from imbalanced datasets and the need for real-time processing in clinical settings.The study describes a scalable,automated system combining deep learning,feature extraction using spectrograms,and external validation that can assist healthcare providers in the early and accurate detection of cardiovascular disease.AI-driven solutions can be viable in improving access,reducing delays in diagnosis,and ultimately even the continued global burden of heart disease.
文摘Background and Objective:Social media(SoMe)has emerged as a tool in health professions education(HPE),particularly amidst the challenges posed by the coronavirus disease 2019(COVID-19)pandemic.Despite the academia’s initial skepticism SoMe has been gaining traction in supporting learning communities,and offering opportunities for innovation in HPE.Our study aims to explore the integration of SoMe in HPE.Four key components were outlined as necessary for a successful integration,and include designing learning experiences,defining educator roles,selecting appropriate platforms,and establishing educational objectives.Methods:This article stemmed from the online Teaching Skills Series module on SoMe in education from the Ophthalmology Foundation,and drew upon evidence supporting learning theories relevant to SoMe integration and models of education.Additionally,we conducted a literature review considering Englishlanguage articles on the application of SoMe in ophthalmology from PubMed over the past decade.Key Content and Findings:Early adopters of SoMe platforms in HPE have leveraged these tools to enhance learning experiences through interaction,dialogue,content sharing,and active learning strategies.By integrating SoMe into educational programs,both online and in-person,educators can overcome time and geographical constraints,fostering more diverse and inclusive learning communities.Careful consideration is,however,necessary to address potential limitations within HPE.Conclusions:This article lays groundwork for expanding SoMe integration in HPE design,emphasizing the supportive scaffold of various learning theories,and the need of furthering robust research on examining its advantages over traditional educational formats.Our literature review underscores an ongoing multifaceted,random application of SoMe platforms in ophthalmology education.We advocate for an effective incorporation of SoMe in HPE education,with the need to comply with good educational practice.
基金co-financed by the European Regional Development Fund of the European UnionGreek national funds through the Operational Program Competitiveness,Entrepreneurship and Innovation,under the call RESEARCH-CREATE-INNOVATE(project code:T1EDK-04429)。
文摘A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.
文摘In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum.
基金This project was funded by Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah underGrant No.(IFPIP-1127-611-1443)the authors,therefore,acknowledge with thanks DSR technical and financial support.
文摘In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading.Our in-depth investigation delves into the intricacies of merging Multi-Agent Reinforcement Learning(MARL)and Explainable AI(XAI)within Fintech,aiming to refine Algorithmic Trading strategies.Through meticulous examination,we uncover the nuanced interactions of AI-driven agents as they collaborate and compete within the financial realm,employing sophisticated deep learning techniques to enhance the clarity and adaptability of trading decisions.These AI-infused Fintech platforms harness collective intelligence to unearth trends,mitigate risks,and provide tailored financial guidance,fostering benefits for individuals and enterprises navigating the digital landscape.Our research holds the potential to revolutionize finance,opening doors to fresh avenues for investment and asset management in the digital age.Additionally,our statistical evaluation yields encouraging results,with metrics such as Accuracy=0.85,Precision=0.88,and F1 Score=0.86,reaffirming the efficacy of our approach within Fintech and emphasizing its reliability and innovative prowess.
基金Scientific Research Deanship has funded this project at the University of Ha’il–Saudi Arabia Ha’il–Saudi Arabia through project number RG-21104.
文摘In today’s world,image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images.Automated analysis of medical images is essential for doctors,as manual investigation often leads to inter-observer variability.This research aims to enhance healthcare by enabling the early detection of diabetic retinopathy through an efficient image processing framework.The proposed hybridized method combines Modified Inertia Weight Particle Swarm Optimization(MIWPSO)and Fuzzy C-Means clustering(FCM)algorithms.Traditional FCM does not incorporate spatial neighborhood features,making it highly sensitive to noise,which significantly affects segmentation output.Our method incorporates a modified FCM that includes spatial functions in the fuzzy membership matrix to eliminate noise.The results demonstrate that the proposed FCM-MIWPSO method achieves highly precise and accurate medical image segmentation.Furthermore,segmented images are classified as benign or malignant using the Decision Tree-Based Temporal Association Rule(DT-TAR)Algorithm.Comparative analysis with existing state-of-the-art models indicates that the proposed FCM-MIWPSO segmentation technique achieves a remarkable accuracy of 98.42%on the dataset,highlighting its significant impact on improving diagnostic capabilities in medical imaging.
文摘The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure,and thus timely maintenance can ensure safe operations.Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model,which typically involves two datasets.In response to the availability of multiple datasets,this paper proposes using selective and adaptive incremental transfer learning(SA-ITL),which fuses three algorithms,namely,the hybrid selective algorithm,the transferability enhancement algorithm,and the incremental transfer learning algorithm.It is a selective algorithm that enables selecting and ordering appropriate datasets for transfer learning and selecting useful knowledge to avoid negative transfer.The algorithm also adaptively adjusts the portion of training data to balance the learning rate and training time.The proposed algorithm is evaluated and analyzed using ten benchmark datasets.Compared with other algorithms from existing works,SA-ITL improves the accuracy of all datasets.Ablation studies present the accuracy enhancements of the SA-ITL,including the hybrid selective algorithm(1.22%-3.82%),transferability enhancement algorithm(1.91%-4.15%),and incremental transfer learning algorithm(0.605%-2.68%).These also show the benefits of enhancing the target model with heterogeneous image datasets that widen the range of domain selection between source and target domains.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University,Arar,KSA for funding this research work through the Project Number“NBU-FFR-2024-1092-04”.
文摘This study introduces a long-short-term memory(LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes,focusing on the critical application of elderly fall detection.It balances the dataset using the Synthetic Minority Over-sampling Technique(SMOTE),effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks.The proposed LSTM model is trained on the enriched dataset,capturing the temporal dependencies essential for anomaly recognition.The model demonstrated a significant improvement in anomaly detection,with an accuracy of 84%.The results,detailed in the comprehensive classification and confusion matrices,showed the model’s proficiency in distinguishing between normal activities and falls.This study contributes to the advancement of smart home safety,presenting a robust framework for real-time anomaly monitoring.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi ArabiaThe authors extend their appreciation to the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia for funding this research work through the Project number“NBU-FFR-2024-1092-09”.
文摘Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application.This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection.Our model employs a two-fold optimization approach:first,it utilizes the analysis of the variance(ANOVA)F-test to select the optimal features for phishing detection,and second,it applies the Cuckoo Search algorithm to tune the hyperparameters(learning rate and dropout rate)of the deep learning model.Additionally,our model is trained in only five epochs,making it more lightweight than other deep learning(DL)and machine learning(ML)models.The proposed model achieved a phishing detection accuracy of 91%,with a precision of 92%for the’normal’class and 91%for the‘attack’class.Moreover,the model’s recall and F1-score are 91%for both classes.We also compared our approach with traditional DL/ML models and past literature,demonstrating that our model is more accurate.This study enhances the security of sensitive information and IoT devices by offering a novel and effective approach to phishing detection.
基金supported by a grant from Hong Kong Metropolitan University (RD/2023/2.3)supported Princess Nourah bint Abdulrah-man University Researchers Supporting Project number (PNURSP2024R 343)+1 种基金Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabiathe Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia for funding this research work through the project number“NBU-FFR-2024-1092-09”.
文摘Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information systems.BERT’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing detection.Achieving an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing emails.This approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks.
文摘Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Numerous applications have been developed to support the challenges in intelligent healthcare systems.However,because mental health data is sensitive,privacy concerns have emerged.Federated learning has gotten some attention.This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems.It explores various dimensions of federated learning in mental health,such as datasets(their types and sources),applications categorized based on mental health symptoms,federated mental health frameworks,federated machine learning,federated deep learning,and the benefits of federated learning in mental health applications.This research conducts surveys to evaluate the current state of mental health applications,mainly focusing on the role of Federated Learning(FL)and related privacy and data security concerns.The survey provides valuable insights into how these applications are emerging and evolving,specifically emphasizing FL’s impact.
文摘BACKGROUND Despite the developments in the field of kidney transplantation,the already existing diagnostic techniques for patient monitoring are considered insufficient.Protein biomarkers that can be derived from modern approaches of proteomic analysis of liquid biopsies(serum,urine)represent a promising innovation in the monitoring of kidney transplant recipients.AIM To investigate the diagnostic utility of protein biomarkers derived from proteomics approaches in renal allograft assessment.METHODS A systematic review was conducted in accordance with PRISMA guidelines,based on research results from the PubMed and Scopus databases.The primary focus was on evaluating the role of biomarkers in the non-invasive diagnosis of transplant-related com-plications.Eligibility criteria included protein biomarkers and urine and blood samples,while exclusion criteria were language other than English and the use of low resolution and sensitivity methods.The selected research articles,were categorized based on the biological sample,condition and methodology and the significantly and reproducibly differentiated proteins were manually selected and extracted.Functional and network analysis of the selected proteins was performed.RESULTS In 17 included studies,58 proteins were studied,with the cytokine CXCL10 being the most investigated.Biological pathways related to immune response and fibrosis have shown to be enriched.Applications of biomarkers for the assessment of renal damage as well as the prediction of short-term and long-term function of the graft were reported.Overall,all studies have shown satisfactory diagnostic accuracy of proteins alone or in combination with conventional methods,as far as renal graft assessment is concerned.CONCLUSION Our review suggests that protein biomarkers,evaluated in specific biological fluids,can make a significant contribution to the timely,valid and non-invasive assessment of kidney graft.
基金funded by Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah under grant No.(RG-6-611-43)the authors,therefore,acknowledge with thanks DSR technical and financial support.
文摘The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated challenges,such as data security,interoperability,and ethical concerns,is crucial to realizing the full potential of IoT in healthcare.Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems.In this context,this paper presents a novelmethod for healthcare data privacy analysis.The technique is based on the identification of anomalies in cloud-based Internet of Things(IoT)networks,and it is optimized using explainable artificial intelligence.For anomaly detection,the Radial Boltzmann Gaussian Temporal Fuzzy Network(RBGTFN)is used in the process of doing information privacy analysis for healthcare data.Remora Colony SwarmOptimization is then used to carry out the optimization of the network.The performance of the model in identifying anomalies across a variety of healthcare data is evaluated by an experimental study.This evaluation suggested that themodel measures the accuracy,precision,latency,Quality of Service(QoS),and scalability of themodel.A remarkable 95%precision,93%latency,89%quality of service,98%detection accuracy,and 96%scalability were obtained by the suggested model,as shown by the subsequent findings.
文摘Colorectal cancer(CRC) is the third most common cancer diagnosed worldwide in human beings. Surgery, chemotherapy, radiotherapy and targeted therapiesare the conventional four approaches which are currently used for the treatment of CRC. The site specific delivery of chemotherapeutics to their site of action would increase effectiveness with reducing side effects. Targeted oral drug delivery systems based on polysaccharides are being investigated to target and deliver chemotherapeutic and chemopreventive agents directly to colon and rectum. Site-specific drug delivery to colon increases its concentration at the target site, and thus requires a lower dose and hence abridged side effects. Some novel therapies are also briefly discussed in article such as receptor(epidermal growth factor receptor, folate receptor, wheat germ agglutinin, VEGF receptor, hyaluronic acid receptor) based targeting therapy; colon targeted proapoptotic anticancer drug delivery system, gene therapy. Even though good treatment options are available for CRC, the ultimate therapeutic approach is to avert the incidence of CRC. It was also found that CRCs could be prevented by diet and nutrition such as calcium, vitamin D, curcumin, quercetin and fish oil supplements. Immunotherapy and vaccination are used nowadays which are showing better results against CRC.
基金the grants NSFC 11971021National Key R&D Program of China(No.2018YF645B0204404)NSFC 11501399(R.Du)。
文摘Recent years have witnessed growing interests in solving partial differential equations by deep neural networks,especially in the high-dimensional case.Unlike classical numerical methods,such as finite difference method and finite element method,the enforcement of boundary conditions in deep neural networks is highly nontrivial.One general strategy is to use the penalty method.In the work,we conduct a comparison study for elliptic problems with four different boundary conditions,i.e.,Dirichlet,Neumann,Robin,and periodic boundary conditions,using two representative methods:deep Galerkin method and deep Ritz method.In the former,the PDE residual is minimized in the least-squares sense while the corresponding variational problem is minimized in the latter.Therefore,it is reasonably expected that deep Galerkin method works better for smooth solutions while deep Ritz method works better for low-regularity solutions.However,by a number of examples,we observe that deep Ritz method can outperform deep Galerkin method with a clear dependence of dimensionality even for smooth solutions and deep Galerkin method can also outperform deep Ritz method for low-regularity solutions.Besides,in some cases,when the boundary condition can be implemented in an exact manner,we find that such a strategy not only provides a better approximate solution but also facilitates the training process.
文摘Effortful control (EC) is a temperamental self-regulatory capacity, defined as the efficiency of executive attention [1], which is related to individual differences in self-regulation. Although effortful control covers some dispositional self-regulatory abilities important to cope with social demands of successful adaptation to school, such as attention regulation, individual differences in EC have recently been associated with school functioning through academic achievement including the efficient use of learning-related behaviors, which have been found to be a necessary precursor of learning and they refer to a set of children’s behaviors that involve organizational skills and appropriate habits of study. Therefore, the aim of this study is to review the literature on EC’s relationship to academic achievement via learning-related behaviors, which reflect the use of metacognitive control processes in kindergarten and elementary school students. The findings indicate that EC affects academic achievement through the facilitation of the efficient use of metacognitive control processes.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343)PrincessNourah bint Abdulrahman University,Riyadh,Saudi ArabiaDeanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia,for funding this researchwork through the project number“NBU-FFR-2024-1092-02”.
文摘Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishingUniformResource Locator(URLs).Addressing these challenge,we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network(RNN)with the hyperparameter optimization prowess of theWhale Optimization Algorithm(WOA).Ourmodel capitalizes on an extensive Kaggle dataset,featuring over 11,000 URLs,each delineated by 30 attributes.The WOA’s hyperparameter optimization enhances the RNN’s performance,evidenced by a meticulous validation process.The results,encapsulated in precision,recall,and F1-score metrics,surpass baseline models,achieving an overall accuracy of 92%.This study not only demonstrates the RNN’s proficiency in learning complex patterns but also underscores the WOA’s effectiveness in refining machine learning models for the critical task of phishing detection.