期刊文献+
共找到69篇文章
< 1 2 4 >
每页显示 20 50 100
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS
1
作者 Mochan Fan Zhipeng Zhang +4 位作者 Zonghang Li Gang Sun Hongfang Yu Jiawen Kang Mohsen Guizani 《Digital Communications and Networks》 2025年第3期837-849,共13页
Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing sol... Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance. 展开更多
关键词 Permissioned blockchain Vertical federated learning Privacy protection Replicated secret sharing
在线阅读 下载PDF
Optimized Cardiovascular Disease Prediction Using Clustered Butterfly Algorithm
2
作者 Kamepalli S.L.Prasanna Vijaya J +2 位作者 Parvathaneni Naga Srinivasu Babar Shah Farman Ali 《Computers, Materials & Continua》 2025年第10期1603-1630,共28页
Cardiovascular disease prediction is a significant area of research in healthcare management systems(HMS).We will only be able to reduce the number of deaths if we anticipate cardiac problems in advance.The existing h... Cardiovascular disease prediction is a significant area of research in healthcare management systems(HMS).We will only be able to reduce the number of deaths if we anticipate cardiac problems in advance.The existing heart disease detection systems using machine learning have not yet produced sufficient results due to the reliance on available data.We present Clustered Butterfly Optimization Techniques(RoughK-means+BOA)as a new hybrid method for predicting heart disease.This method comprises two phases:clustering data using Roughk-means(RKM)and data analysis using the butterfly optimization algorithm(BOA).The benchmark dataset from the UCI repository is used for our experiments.The experiments are divided into three sets:the first set involves the RKM clustering technique,the next set evaluates the classification outcomes,and the last set validates the performance of the proposed hybrid model.The proposed RoughK-means+BOA has achieved a reasonable accuracy of 97.03 and a minimal error rate of 2.97.This result is comparatively better than other combinations of optimization techniques.In addition,this approach effectively enhances data segmentation,optimization,and classification performance. 展开更多
关键词 Cardiovascular disease prediction healthcare management system clustering RoughK-means classification butterfly optimization algorithm
在线阅读 下载PDF
Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning
3
作者 Mathew Nicho Oluwasegun Adelaiye +1 位作者 Christopher D.McDermott Shini Girija 《Computers, Materials & Continua》 2025年第4期281-308,共28页
The successful penetration of government,corporate,and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace.Advanced Persistent Threat(APT)attacks continue to pos... The successful penetration of government,corporate,and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace.Advanced Persistent Threat(APT)attacks continue to pose significant challenges for organizations despite technological advancements in artificial intelligence(AI)-based defense mechanisms.While AI has enhanced organizational capabilities for deterrence,detection,and mitigation of APTs,the global escalation in reported incidents,particularly those successfully penetrating critical government infrastructure has heightened concerns among information technology(IT)security administrators and decision-makers.Literature review has identified the stealthy lateral movement(LM)of malware within the initially infected local area network(LAN)as a significant concern.However,current literature has yet to propose a viable approach for resource-efficient,real-time detection of APT malware lateral movement within the initially compromised LAN following perimeter breach.Researchers have suggested the nature of the dataset,optimal feature selection,and the choice of machine learning(ML)techniques as critical factors for detection.Hence,the objective of the research described here was to successfully demonstrate a simplified lightweight ML method for detecting the LM of APT vectors.While the nearest detection rate achieved in the LM domain within LAN was 99.89%,as reported in relevant studies,our approach surpassed it,with a detection rate of 99.95%for the modified random forest(RF)classifier for dataset 1.Additionally,our approach achieved a perfect 100%detection rate for the decision tree(DT)and RF classifiers with dataset 2,a milestone not previously reached in studies within this domain involving two distinct datasets.Using the ML life cycle methodology,we deployed K-nearest neighbor(KNN),support vector machine(SVM),DT,and RF on three relevant datasets to detect the LM of APTs at the affected LAN prior to data exfiltration/destruction.Feature engineering presented four critical APT LM intrusion detection(ID)indicators(features)across the three datasets,namely,the source port number,the destination port number,the packets,and the bytes.This study demonstrates the effectiveness of lightweight ML classifiers in detecting APT lateral movement after network perimeter breach.It contributes to the field by proposing a non-intrusive network detection method capable of identifying APT malware before data exfiltration,thus providing an additional layer of organizational defense. 展开更多
关键词 Intrusion detection lateral movement machine learning advanced persistent threats
在线阅读 下载PDF
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation 被引量:4
4
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
在线阅读 下载PDF
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A
5
作者 Hikmat Adhami Mohammad Alja’afreh +3 位作者 Mohamed Hoda Jiaqi Zhao Yong Zhou Abdulmotaleb El Saddik 《Digital Communications and Networks》 SCIE CSCD 2024年第2期347-354,共8页
Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications... Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications.This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet.While the 5th generation of mobile networks is not yet widely deployed,Long-Term Evolution(LTE-A)latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin.This work investigates an interesting solution based on the incorporation of Software-defined networking(SDN)and Multi-access Mobile Edge Computing(MEC)technologies in an LTE-A network,to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges.Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators(KPIs)such as throughput,End-2-End(E2E)delay,and jitter.The best scenario possible is clearly the one integrating MEC and SDN approaches,where the overall delay,jitter,and throughput for haptics-attained 2 ms,0.01 ms,and 1000 packets per second.The results obtained give clear evidence that the integration of,both SDN and MEC,in LTE-A indicates performance improvement,and fulfills the standard requirements in terms of the above KPIs,for realizing a Digital Twin/Tactile Internet-based system. 展开更多
关键词 LTE-A 5G Digital twin Tactile Internet KPIs SDN MEC NFV Haptic
在线阅读 下载PDF
Ada-FFL:Adaptive computing fairness federated learning
6
作者 Yue Cong Jing Qiu +4 位作者 Kun Zhang Zhongyang Fang Chengliang Gao Shen Su Zhihong Tian 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第3期573-584,共12页
As the scale of federated learning expands,solving the Non-IID data problem of federated learning has become a key challenge of interest.Most existing solutions generally aim to solve the overall performance improveme... As the scale of federated learning expands,solving the Non-IID data problem of federated learning has become a key challenge of interest.Most existing solutions generally aim to solve the overall performance improvement of all clients;however,the overall performance improvement often sacrifices the performance of certain clients,such as clients with less data.Ignoring fairness may greatly reduce the willingness of some clients to participate in federated learning.In order to solve the above problem,the authors propose Ada-FFL,an adaptive fairness federated aggregation learning algorithm,which can dynamically adjust the fairness coefficient according to the update of the local models,ensuring the convergence performance of the global model and the fairness between federated learning clients.By integrating coarse-grained and fine-grained equity solutions,the authors evaluate the deviation of local models by considering both global equity and individual equity,then the weight ratio will be dynamically allocated for each client based on the evaluated deviation value,which can ensure that the update differences of local models are fully considered in each round of training.Finally,by combining a regularisation term to limit the local model update to be closer to the global model,the sensitivity of the model to input perturbations can be reduced,and the generalisation ability of the global model can be improved.Through numerous experiments on several federal data sets,the authors show that our method has more advantages in convergence effect and fairness than the existing baselines. 展开更多
关键词 adaptive fariness aggregation FAIRNESS federated learning non-IID
在线阅读 下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
7
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
在线阅读 下载PDF
Accelerated Particle Swarm Optimization Algorithm for Efficient Cluster Head Selection in WSN
8
作者 Imtiaz Ahmad Tariq Hussain +3 位作者 Babar Shah Altaf Hussain Iqtidar Ali Farman Ali 《Computers, Materials & Continua》 SCIE EI 2024年第6期3585-3629,共45页
Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and cost.One of them is a sensor network with embe... Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and cost.One of them is a sensor network with embedded sensors working as the primary nodes,termed Wireless Sensor Networks(WSNs),in which numerous sensors are connected to at least one Base Station(BS).These sensors gather information from the environment and transmit it to a BS or gathering location.WSNs have several challenges,including throughput,energy usage,and network lifetime concerns.Different strategies have been applied to get over these restrictions.Clustering may,therefore,be thought of as the best way to solve such issues.Consequently,it is crucial to analyze effective Cluster Head(CH)selection to maximize efficiency throughput,extend the network lifetime,and minimize energy consumption.This paper proposed an Accelerated Particle Swarm Optimization(APSO)algorithm based on the Low Energy Adaptive Clustering Hierarchy(LEACH),Neighboring Based Energy Efficient Routing(NBEER),Cooperative Energy Efficient Routing(CEER),and Cooperative Relay Neighboring Based Energy Efficient Routing(CR-NBEER)techniques.With the help of APSO in the implementation of the WSN,the main methodology of this article has taken place.The simulation findings in this study demonstrated that the suggested approach uses less energy,with respective energy consumption ranges of 0.1441 to 0.013 for 5 CH,1.003 to 0.0521 for 10 CH,and 0.1734 to 0.0911 for 15 CH.The sending packets ratio was also raised for all three CH selection scenarios,increasing from 659 to 1730.The number of dead nodes likewise dropped for the given combination,falling between 71 and 66.The network lifetime was deemed to have risen based on the results found.A hybrid with a few valuable parameters can further improve the suggested APSO-based protocol.Similar to underwater,WSN can make use of the proposed protocol.The overall results have been evaluated and compared with the existing approaches of sensor networks. 展开更多
关键词 Wireless sensor network cluster head selection low energy adaptive clustering hierarchy accelerated particle swarm optimization
在线阅读 下载PDF
Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks
9
作者 Altaf Hussain Shuaiyong Li +4 位作者 Tariq Hussain Razaz Waheeb Attar Farman Ali Ahmed Alhomoud Babar Shah 《Computers, Materials & Continua》 SCIE EI 2024年第11期2357-2394,共38页
Ad hoc networks offer promising applications due to their ease of use,installation,and deployment,as they do not require a centralized control entity.In these networks,nodes function as senders,receivers,and routers.O... Ad hoc networks offer promising applications due to their ease of use,installation,and deployment,as they do not require a centralized control entity.In these networks,nodes function as senders,receivers,and routers.One such network is the Flying Ad hoc Network(FANET),where nodes operate in three dimensions(3D)using Unmanned Aerial Vehicles(UAVs)that are remotely controlled.With the integration of the Internet of Things(IoT),these nodes form an IoT-enabled network called the Internet of UAVs(IoU).However,the airborne nodes in FANET consume high energy due to their payloads and low-power batteries.An optimal routing approach for communication is essential to address the problem of energy consumption and ensure energy-efficient data transmission in FANET.This paper proposes a novel energy-efficient routing protocol named the Integrated Energy-Efficient Distributed Link Stability Algorithm(IEE-DLSA),featuring a relay mechanism to provide optimal routing with energy efficiency in FANET.The energy efficiency of IEE-DLSA is enhanced using the Red-Black(R-B)tree to ensure the fairness of advanced energy-efficient nodes.Maintaining link stability,transmission loss avoidance,delay awareness with defined threshold metrics,and improving the overall performance of the proposed protocol are the core functionalities of IEE-DLSA.The simulations demonstrate that the proposed protocol performs well compared to traditional FANET routing protocols.The evaluation metrics considered in this study include network delay,packet delivery ratio,network throughput,transmission loss,network stability,and energy consumption. 展开更多
关键词 FANET UAV internet of UAVs relay mechanism energy consumption ROUTING IEE-DLSA
在线阅读 下载PDF
Intelligent cache and buffer optimization for mobile VR adaptive transmission in 5G edge computing networks
10
作者 Junchao Yang Ali Kashif Bashir +2 位作者 Zhiwei Guo Keping Yu Mohsen Guizani 《Digital Communications and Networks》 CSCD 2024年第5期1234-1244,共11页
Virtual Reality(VR)is a key industry for the development of the digital economy in the future.Mobile VR has advantages in terms of mobility,lightweight and cost-effectiveness,which has gradually become the mainstream ... Virtual Reality(VR)is a key industry for the development of the digital economy in the future.Mobile VR has advantages in terms of mobility,lightweight and cost-effectiveness,which has gradually become the mainstream implementation of VR.In this paper,a mobile VR video adaptive transmission mechanism based on intelligent caching and hierarchical buffering strategy in Mobile Edge Computing(MEC)-equipped 5G networks is proposed,aiming at the low latency requirements of mobile VR services and flexible buffer management for VR video adaptive transmission.To support VR content proactive caching and intelligent buffer management,users’behavioral similarity and head movement trajectory are jointly used for viewpoint prediction.The tile-based content is proactively cached in the MEC nodes based on the popularity of the VR content.Second,a hierarchical buffer-based adaptive update algorithm is presented,which jointly considers bandwidth,buffer,and predicted viewpoint status to update the tile chunk in client buffer.Then,according to the decomposition of the problem,the buffer update problem is modeled as an optimization problem,and the corresponding solution algorithms are presented.Finally,the simulation results show that the adaptive caching algorithm based on 5G intelligent edge and hierarchical buffer strategy can improve the user experience in the case of bandwidth fluctuations,and the proposed viewpoint prediction method can significantly improve the accuracy of viewpoint prediction by 15%. 展开更多
关键词 Virtual reality Adaptive transmission Edge cache Buffer management 5G Mobile edge computing
在线阅读 下载PDF
Reading Loss in Arabic Language During COVID-19 in the UAE and Proposed Solutions:The Perspectives of Primary-Grade Arabic Language Teachers
11
作者 Karima Almazroui Muhra Albloushi 《Sociology Study》 2024年第2期107-118,共12页
The COVID-19 pandemic caused significant disruptions in the field of education worldwide,including in the United Arab Emirates.Teachers and students had to adapt to remote learning and virtual classrooms,leading to va... The COVID-19 pandemic caused significant disruptions in the field of education worldwide,including in the United Arab Emirates.Teachers and students had to adapt to remote learning and virtual classrooms,leading to various challenges in maintaining educational standards.The sudden transition to remote teaching could have a negative impact on students’reading abilities,especially in the Arabic language.To gain insight into the unique challenges encountered by Arabic language teachers in the UAE,a survey was conducted to explore their assessment of teaching quality,student-teacher interaction,and learning outcomes amidst the COVID-19 pandemic.The results of the survey revealed a significant decline of student reading abilities and identified several major issues in online Arabic language teaching.These issues included limited interaction between students and teachers,challenges in monitoring students’class participation and performance,and challenges in effectively assessing students’reading skills.The results also demonstrated some other challenges faced by Arabic language teachers,including a lack of preparedness,a lack of subscription to relevant platforms,and a lack of resources for online learning.Several solutions to these challenges are proposed,including reevaluating the balance between depth and breadth in the curriculum,integrating language skills into the curriculum more effectively,providing more comprehensive teacher professional development,implementing student grouping strategies,utilizing retired and expert teachers in specific content areas,allocating time for interventions,and improving support from both teachers and parents to ensure the quality of online learning. 展开更多
关键词 reading loss Arabic language teachers primary grades online learning United Arab Emirates
在线阅读 下载PDF
United Arabic Emirates Weather Stations: A Spatial Analysis with myGeoffice©
12
作者 Joao Negreiros Mohammad Kuhail 《Journal of Geoscience and Environment Protection》 2024年第12期373-387,共15页
This paper presents a spatial analysis of weather data from ten stations in the United Arab Emirates (UAE) using myGeoffice©, a web-based Geographical Information System (GIS) tool. This study investigates patter... This paper presents a spatial analysis of weather data from ten stations in the United Arab Emirates (UAE) using myGeoffice©, a web-based Geographical Information System (GIS) tool. This study investigates patterns in rainfall, station connectivity, and the impact of various factors on rainfall prediction. Cluster analysis was applied to classify regions based on rainfall patterns, and algorithms such as Dijkstra’s shortest path and Kruskal’s minimum spanning tree were used to evaluate connectivity among stations. Geographically Weighted Regression (GWR) was employed to model the effects of temperature, humidity, and wind on rainfall. The results indicate that temperature is the dominant factor negatively affecting rainfall, with variations observed across different locations. The study also uses probabilistic models, such as Binomial and Poisson distributions, to predict the likelihood of rainfall and flood occurrences. Overall, the analysis demonstrates the utility of GIS statistical methods in uncovering spatial weather patterns to support more informed decision-making in weather-related studies for the UAE. 展开更多
关键词 United Arabic Emirates Weather Stations Spatial Analysis myGeoffice©
在线阅读 下载PDF
Mobile money innovations,income inequality and gender inclusion in sub-Saharan Africa
13
作者 Simplice A.Asongu Peter Agyemang-Mintah +1 位作者 Joseph Nnanna Yolande E.Ngoungou 《Financial Innovation》 2024年第1期3936-3956,共21页
This study assesses the role of mobile money innovations on income inequality and gender inclusion in 42 sub-Saharan African countries from 1980 to 2019 using interactive quantile regressions.It finds that,first,incom... This study assesses the role of mobile money innovations on income inequality and gender inclusion in 42 sub-Saharan African countries from 1980 to 2019 using interactive quantile regressions.It finds that,first,income inequality unconditionally reduces the involvement of women in business and politics.Second,mobile money innovations interact with income inequality to have a positive impact on women in business and politics.Third,the net effects of mobile money innovations on gender inclusion through income inequality are consistently negative.Fourth,as the positive conditional or interactive effects and negative net effects are consistent across the conditional distribution of gender inclusion,thresholds at which mobile money innovations can completely dampen the negative effect of income inequality on gender inclusion are provided.Therefore,policymakers should work toward improving conditions for mobile money innovations.They should also be aware that reducing both income inequality and enhancing mobile money innovations simultaneously leads to more inclusive outcomes in terms of gender inclusion. 展开更多
关键词 Financial inclusion INEQUALITY Mobile phones Sub-Saharan Africa WOMEN
在线阅读 下载PDF
Role of diet on non-alcoholic fatty liver disease: An updated narrative review 被引量:9
14
作者 Dimitrios Papandreou Eleni Andreou 《World Journal of Hepatology》 CAS 2015年第3期575-582,共8页
The purpose of this article review is to update what is known about the role of diet on non-alcoholic fatty liver disease(NAFLD). NAFLD is the most common cause of chronic liver disease in the developed world and is c... The purpose of this article review is to update what is known about the role of diet on non-alcoholic fatty liver disease(NAFLD). NAFLD is the most common cause of chronic liver disease in the developed world and is considered to be a spectrum, ranging from fatty infiltration of the liver alone(steatosis), which may lead to fatty infiltration with inflammation known as non alcoholic steatohepatitis While the majority of individualswith risk factors like obesity and insulin resistance have steatosis, only few people may develop steatohepatitis. Current treatment relies on weight loss and exercise, although various insulin-sensitizing medications appear promising. Weight loss alone by dietary changes has been shown to lead to histological improvement in fatty liver making nutrition therapy to become a cornerstone of treatment for NAFLD. Supplementation of vitamin E, C and omega 3 fatty acids are under consideration with some conflicting data. Moreover, research has been showed that saturated fat, trans-fatty acid, carbohydrate, and simple sugars(fructose and sucrose) may play significant role in the intrahepatic fat accumulation. However, true associations with specific nutrients yet to be clarified. 展开更多
关键词 DIET Non-alcoholic FATTY ACIDS FATTY ACIDS OBESITY INSULIN resistance
暂未订购
Dynamic spillovers between the term structure of interest rates,bitcoin,and safe‑haven currencies 被引量:4
15
作者 David Y.Aharon Zaghum Umar Xuan Vinh Vo 《Financial Innovation》 2021年第1期1334-1358,共25页
This study examines the connectedness between the US yield curve components(i.e.,level,slope,and curvature),exchange rates,and the historical volatility of the exchange rates of the main safe-haven fiat currencies(Can... This study examines the connectedness between the US yield curve components(i.e.,level,slope,and curvature),exchange rates,and the historical volatility of the exchange rates of the main safe-haven fiat currencies(Canada,Switzerland,EURO,Japan,and the UK)and the leading cryptocurrency,the Bitcoin.Results of the static analysis show that the level and slope of the yield curve are net transmitters of shocks to both the exchange rate and its volatility.The exchange rate of the Euro and the volatility of the Euro and the Canadian dollar exchange rate are net transmitters of shocks.Meanwhile,the curvature of the yield curve and the Japanese Yen,Swiss Franc,and British Pound act mainly as net receivers.Our static connectedness analysis shows that Bitcoin is mainly independent of shocks from the yield curve’s level,slope,and curvature,and from any main currency investigated.These findings hint that Bitcoin might provide hedging benefits.However,similar to the static analysis,our dynamic analysis shows that during different periods and particularly in stressful times,Bitcoin is far from being isolated from other currencies or the yield curve components.The dynamic analysis allows us to observe Bitcoin’s connectedness in times of stress.Evidence supporting this contention is the substantially increased connectedness due to policy shocks,political uncertainty,and systemic crisis,implying no empirical support for Bitcoin’s safe-haven property during stress times.The increased connectedness in the dynamic analysis compared with the static approach implies that in normal times and especially in stressful times,Bitcoin has the property of a diversifier.The results may have important implications for investors and policymakers regarding their risk monitoring and their assets allocation and investment strategies. 展开更多
关键词 Bitcoin Term structure slope CURVATURE Diebold and Yilmaz Connectedness Cryptocurrency FOREX CURRENCIES Safe haven
在线阅读 下载PDF
Scribble-Supervised Video Object Segmentation 被引量:3
16
作者 Peiliang Huang Junwei Han +2 位作者 Nian Liu Jun Ren Dingwen Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第2期339-353,共15页
Recently,video object segmentation has received great attention in the computer vision community.Most of the existing methods heavily rely on the pixel-wise human annotations,which are expensive and time-consuming to ... Recently,video object segmentation has received great attention in the computer vision community.Most of the existing methods heavily rely on the pixel-wise human annotations,which are expensive and time-consuming to obtain.To tackle this problem,we make an early attempt to achieve video object segmentation with scribble-level supervision,which can alleviate large amounts of human labor for collecting the manual annotation.However,using conventional network architectures and learning objective functions under this scenario cannot work well as the supervision information is highly sparse and incomplete.To address this issue,this paper introduces two novel elements to learn the video object segmentation model.The first one is the scribble attention module,which captures more accurate context information and learns an effective attention map to enhance the contrast between foreground and background.The other one is the scribble-supervised loss,which can optimize the unlabeled pixels and dynamically correct inaccurate segmented areas during the training stage.To evaluate the proposed method,we implement experiments on two video object segmentation benchmark datasets,You Tube-video object segmentation(VOS),and densely annotated video segmentation(DAVIS)-2017.We first generate the scribble annotations from the original per-pixel annotations.Then,we train our model and compare its test performance with the baseline models and other existing works.Extensive experiments demonstrate that the proposed method can work effectively and approach to the methods requiring the dense per-pixel annotations. 展开更多
关键词 Convolutional neural networks(CNNs) SCRIBBLE self-attention video object segmentation weakly supervised
在线阅读 下载PDF
LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec 被引量:3
17
作者 Jin Wang Changqing Zhao +3 位作者 Shiming He Yu Gu Osama Alfarraj Ahed Abugabah 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期1207-1222,共16页
System logs record detailed information about system operation and areimportant for analyzing the system's operational status and performance. Rapidand accurate detection of system anomalies is of great significan... System logs record detailed information about system operation and areimportant for analyzing the system's operational status and performance. Rapidand accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more andmore complex, and the number of system logs gradually increases, which bringschallenges to analyze system logs. Some recent studies show that logs can beunstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a longtime to train models. Therefore, to reduce the computational cost and avoid loginstability we propose a new Word2Vec-based log unsupervised anomaly detection method (LogUAD). LogUAD does not require a log parsing step and takesoriginal log messages as input to avoid the noise. LogUAD uses Word2Vec togenerate word vectors and generates weighted log sequence feature vectors withTF-IDF to handle the evolution of log statements. At last, a computationally effi-cient unsupervised clustering is exploited to detect the anomaly. We conductedextensive experiments on the public dataset from Blue Gene/L (BGL). Experimental results show that the F1-score of LogUAD can be improved by 67.25%compared to LogCluster. 展开更多
关键词 Log anomaly detection log instability word2Vec feature extraction
在线阅读 下载PDF
Data-Fusion for Epidemiological Analysis of Covid-19 Variants in UAE 被引量:1
18
作者 Anoud Bani-Hani Anaïs Lavorel Newel Bessadet 《Computers, Materials & Continua》 SCIE EI 2021年第9期3895-3913,共19页
Since December 2019,a new pandemic has appeared causing a considerable negative global impact.The SARS-CoV-2 first emerged from China and transformed to a global pandemic within a short time.The virus was further obse... Since December 2019,a new pandemic has appeared causing a considerable negative global impact.The SARS-CoV-2 first emerged from China and transformed to a global pandemic within a short time.The virus was further observed to be spreading rapidly and mutating at a fast pace,with over 5,775 distinct variations of the virus observed globally(at the time of submitting this paper).Extensive research has been ongoing worldwide in order to get a better understanding of its behaviour,influence and more importantly,ways for reducing its impact.Data analytics has been playing a pivotal role in this research to obtain valuable insights into understanding and fighting against the spread of infection.However,this is time and resource intensive,making it difficult to observe and quickly identify the impact of mutations.Factors such as the spread or virulence could explain the three months delay in revealing the new virus variant in the UK.This paper presents an extensive correlation analysis of the effect caused by the different SARS-CoV-2 strains,and their influence on the population across diverse factors,such as propagation and fatality rates,during the peak of the pandemic,with a focus on two major countries in the Middle East,the United Arab Emirate(UAE)and the Kingdom of Saudi Arabia(KSA).This research aims to investigate the epidemiological behaviour of the Coronavirus’genomic variants over time in the UAE,compared with the KSA,where correlation analysis is carried out for a number of cases,deaths and their statistical deviations.The results of the analysis highlight very interesting insights into the epidemiological impact of the Covid-19 genomic behaviour in both countries,which could lead to important actions taken to minimize the impact on wider public health,possibly saving lives,and the economy.For instance,our method identifies a potential correlation between a spike in the number of deaths per case of 5.5 observed in the UAE by March 24th,with the emergence of new genomic variants of the Coronavirus(G0_c,G0_e1 and G0_e2).Our proposed methodology can be instrumental in identifying and classifying new variations of the virus earlier,and possibly predicting foreseeable mutations through pattern analysis,hence creating proactive measures to control its spread,such as the recent case of the new virus variant,recently discovered in the UK. 展开更多
关键词 SARS-CoV-2 GENOME covid-19 public health PANDEMIC EPIDEMIOLOGY case study United Arab Emirates UAE Kingdom of Saudi Arabia KSA
暂未订购
Mapping of Compositional Diversity and Chronological Ages of Lunar Farside Multiring Mare Moscoviense Basin:Implications to the Middle Imbrian Mare Basalts 被引量:1
19
作者 A.Karthi S.Arivazhagan Manish Sharma 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2022年第12期130-151,共22页
The Mare Moscoviense is an astonishing rare flatland multi-ring basin and one of the recognizable mare regions on the Moon's farside.The mineralogical,chronological,topographical and morphological studies of the m... The Mare Moscoviense is an astonishing rare flatland multi-ring basin and one of the recognizable mare regions on the Moon's farside.The mineralogical,chronological,topographical and morphological studies of the maria surface of the Moon provide a primary understanding of the origin and evolution of the mare provinces.In this study,the Chandrayaan-1 M^(3)data have been employed to prepare optical maturity index,FeO and TiO^(2)concentration,and standard band ratio map to detect the mafic indexes like olivine and pyroxene minerals.The crater size frequency distribution method has been applied to LROC WAC data to obtain the absolute model ages of the Moscoviense basin.The four geological unit ages were observed as 3.57 Ga(U-2),3.65 Ga(U-1),3.8 Ga(U-3)and 3.92 Ga(U-4),which could have been formed between the Imbrian and Nectarian epochs.The M^(3)imaging and reflectance spectral parameters were used to reveal the minerals like pyroxene,olivine,ilmenite,plagioclase,orthopyroxene-olivine-spinel lithology,and olivine-pyroxene mixtures present in the gabbroic basalt,anorthositic and massive ilmenite rocks,and validated with the existing database.The results show that the Moscoviense basin is dominated by intermediate TiO^(2)basalts that derived from olivine-ilmenite-pyroxene cumulate depths ranging from 200 to 500 km between 3.5 Ga and 3.6 Ga. 展开更多
关键词 ASTROBIOLOGY molecular processes methods:data analysis techniques:image processing techniques:imaging spectroscopy techniques:spectroscopic planets and satellites:composition planets and satellites:surfaces planets and satellites:terrestrial planets
在线阅读 下载PDF
CEER:Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters 被引量:2
20
作者 Sayyed Mudassar Shah Tariq Hussain +3 位作者 Babar Shah Farman Ali Khalid Zaman Kyung-Sup Kwak 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2587-2602,共16页
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration applications.In most of these applications,the network is composed of several sensor nodes deployed at different ... Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration applications.In most of these applications,the network is composed of several sensor nodes deployed at different depths in the water.Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level;these nodes need multihop communication facilitated by a suitable routing scheme.In this research work,a Cluster-based Cooperative Energy Efficient Routing(CEER)mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH mechanisms.The optimal role of clustering and cooperation provides load balancing and improves the network profoundly.The simulation results using MATLAB show better performance of CEER routing protocol in terms of various parameters as compared to Co-UWSN routing protocol,i.e.,the average end-to-end delay of CEER was 17.39,Co-UWSN was 55.819 and LEACH was 70.08.In addition,the average total energy consumption of CEER was 9.273,Co-UWSN was 12.198,and LEACH was 45.33.The packet delivery ratio of CEER was 53.955,CO-UWSN was 42.047,and LEACH was 30.31.The stability period CEER was 130.9,CO-UWSN was 129.3,and LEACH was 119.1.The obtained results maximized the lifetime and improved the overall performance of the CEER routing protocol. 展开更多
关键词 Cluster head co-UWSN UWSN RELAY LEACH CEER
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部