The implementation of blockchain technology in integrated IoT networks for constructing scalable Intelligent Transportation Systems (ITSs) in India has the potential to revolutionize the way we approach transportation. By leveraging the power of IoT and blockchain, we can create a highly secure, transparent, and efficient system that can transform the way we move people and goods. India, one of the world’s most populous countries, has a highly congested and inefficient transportation system that often leads to delays, accidents, and waste of time and resources. The integration of IoT and blockchain can help address these issues by enabling real-time monitoring, tracking, and optimization of traffic flows, thereby reducing congestion, improving safety, and increasing the overall efficiency of the transportation system. This paper explores the potential of blockchain technology in the context of integrated IoT networks for constructing scalable ITS systems in India. The methodology followed is to develop a proof-of-concept blockchain-based application for ITS, implement the blockchain solution into the existing ITS infrastructure, and ensure proper integration and compatibility with other systems. Conduct thorough research and maintenance to ensure the reliability and sustainability of such blockchain-based systems. This research discusses the various benefits and challenges of this approach and the various applications of this technology in the transportation sector, including the green sustainability concept. The results find various ways in which such implementations of blockchain and IoT-Machine Learning (IoT-ML) can revolutionize transportation systems.
{"title":"Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India","authors":"Arya Kharche, Sanskar Badholia, Ram Krishna Upadhyay","doi":"10.1016/j.bcra.2024.100188","DOIUrl":"10.1016/j.bcra.2024.100188","url":null,"abstract":"<div><p>The implementation of blockchain technology in integrated IoT networks for constructing scalable Intelligent Transportation Systems (ITSs) in India has the potential to revolutionize the way we approach transportation. By leveraging the power of IoT and blockchain, we can create a highly secure, transparent, and efficient system that can transform the way we move people and goods. India, one of the world’s most populous countries, has a highly congested and inefficient transportation system that often leads to delays, accidents, and waste of time and resources. The integration of IoT and blockchain can help address these issues by enabling real-time monitoring, tracking, and optimization of traffic flows, thereby reducing congestion, improving safety, and increasing the overall efficiency of the transportation system. This paper explores the potential of blockchain technology in the context of integrated IoT networks for constructing scalable ITS systems in India. The methodology followed is to develop a proof-of-concept blockchain-based application for ITS, implement the blockchain solution into the existing ITS infrastructure, and ensure proper integration and compatibility with other systems. Conduct thorough research and maintenance to ensure the reliability and sustainability of such blockchain-based systems. This research discusses the various benefits and challenges of this approach and the various applications of this technology in the transportation sector, including the green sustainability concept. The results find various ways in which such implementations of blockchain and IoT-Machine Learning (IoT-ML) can revolutionize transportation systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000010/pdfft?md5=f0df3bf2f2a306097761b6d525acf13d&pid=1-s2.0-S2096720924000010-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.26599/bdma.2023.9020025
Sohail Khan, Mohammad Nauman
: Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems. One of the major challenges in tackling this problem is the complexity of malware analysis, which requires expertise from human analysts. Recent developments in machine learning have led to the creation of deep models for malware detection. However, these models often lack transparency, making it difficult to understand the reasoning behind the model’s decisions, otherwise known as the black-box problem. To address these limitations, this paper presents a novel model for malware detection, utilizing vision transformers to analyze the opcode sequences of more than 350,000 Windows portable executable malware samples from real-world datasets. The model achieved a high accuracy of 0.9864, not only surpassing previous results but also providing valuable insights into the reasoning behind the classification. Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples, aiding human experts in their analysis and driving further advancements in the field. We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model thus opening up this black-box problem for deeper analysis.
:随着恶意软件数量的不断增加以及系统中存储的敏感信息越来越多,Windows 恶意软件正成为一个日益紧迫的问题。解决这一问题的主要挑战之一是恶意软件分析的复杂性,这需要人类分析师的专业知识。机器学习的最新发展促使人们创建了用于恶意软件检测的深度模型。然而,这些模型往往缺乏透明度,因此很难理解模型决策背后的推理,也就是所谓的黑箱问题。为了解决这些局限性,本文提出了一种新型恶意软件检测模型,利用视觉转换器分析了来自真实世界数据集的 350,000 多个 Windows 可移植可执行恶意软件样本的操作码序列。该模型的准确率高达 0.9864,不仅超越了之前的结果,还为分类背后的推理提供了宝贵的见解。我们的模型能够精确定位导致恶意软件样本中恶意行为的特定指令,从而帮助人类专家进行分析,并推动该领域的进一步发展。我们报告了我们的发现,并展示了如何通过深度学习模型在恶意代码和实际分类之间建立因果关系,从而为更深入的分析打开这个黑箱问题。
{"title":"Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers","authors":"Sohail Khan, Mohammad Nauman","doi":"10.26599/bdma.2023.9020025","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020025","url":null,"abstract":": Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems. One of the major challenges in tackling this problem is the complexity of malware analysis, which requires expertise from human analysts. Recent developments in machine learning have led to the creation of deep models for malware detection. However, these models often lack transparency, making it difficult to understand the reasoning behind the model’s decisions, otherwise known as the black-box problem. To address these limitations, this paper presents a novel model for malware detection, utilizing vision transformers to analyze the opcode sequences of more than 350,000 Windows portable executable malware samples from real-world datasets. The model achieved a high accuracy of 0.9864, not only surpassing previous results but also providing valuable insights into the reasoning behind the classification. Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples, aiding human experts in their analysis and driving further advancements in the field. We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model thus opening up this black-box problem for deeper analysis.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.bcra.2023.100185
Zhenjie Luo, Hui Zhang
Engine data management is of great significance for ensuring data security and sharing, as well as facilitating multi-party collaborative learning. Traditional data management approaches often involve decentralized data storage that is vulnerable to tampering, making it challenging to conduct multi-party collaborative learning under privacy protection conditions and fully leverage the value of data. Moreover, data with compromised integrity can lead to incorrect results if used for model training. Therefore, this paper aims to break down data sharing barriers and fully utilize decentralized data for multi-party collaborative learning under privacy protection conditions. We propose a trustworthy engine data management method based on blockchain technology to ensure data immutability and non-repudiation. To address the issue of limited data samples for some users resulting in poor model performance, we introduce swarm learning techniques based on centralized machine learning and design a trustworthy data management method for swarm learning, achieving trustworthy regulation of the entire process. We conduct research on engine models under swarm learning based on the NASA open dataset, effectively organizing decentralized data samples for collaborative training while ensuring data privacy and fully leveraging the value of data.
引擎数据管理对于确保数据安全和共享以及促进多方协作学习具有重要意义。传统的数据管理方法通常涉及分散的数据存储,容易被篡改,这使得在隐私保护条件下进行多方协作学习和充分发挥数据价值面临挑战。此外,如果将完整性受损的数据用于模型训练,可能会导致错误的结果。因此,本文旨在打破数据共享壁垒,在隐私保护条件下充分利用分散数据进行多方协作学习。我们提出了一种基于区块链技术的可信引擎数据管理方法,以确保数据的不变性和不可抵赖性。针对部分用户数据样本有限导致模型性能不佳的问题,我们引入了基于中心化机器学习的蜂群学习技术,并设计了蜂群学习的可信数据管理方法,实现了全过程的可信监管。我们基于 NASA 开放数据集开展了蜂群学习下的引擎模型研究,在确保数据隐私、充分发挥数据价值的同时,有效组织分散的数据样本进行协同训练。
{"title":"Blockchain-based engine data trustworthy swarm learning management method","authors":"Zhenjie Luo, Hui Zhang","doi":"10.1016/j.bcra.2023.100185","DOIUrl":"10.1016/j.bcra.2023.100185","url":null,"abstract":"<div><p>Engine data management is of great significance for ensuring data security and sharing, as well as facilitating multi-party collaborative learning. Traditional data management approaches often involve decentralized data storage that is vulnerable to tampering, making it challenging to conduct multi-party collaborative learning under privacy protection conditions and fully leverage the value of data. Moreover, data with compromised integrity can lead to incorrect results if used for model training. Therefore, this paper aims to break down data sharing barriers and fully utilize decentralized data for multi-party collaborative learning under privacy protection conditions. We propose a trustworthy engine data management method based on blockchain technology to ensure data immutability and non-repudiation. To address the issue of limited data samples for some users resulting in poor model performance, we introduce swarm learning techniques based on centralized machine learning and design a trustworthy data management method for swarm learning, achieving trustworthy regulation of the entire process. We conduct research on engine models under swarm learning based on the NASA open dataset, effectively organizing decentralized data samples for collaborative training while ensuring data privacy and fully leveraging the value of data.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092300060X/pdfft?md5=3cecec9b4347c0153afcf9159a3b9bdc&pid=1-s2.0-S209672092300060X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, proof-of-authority (PoA)-based blockchain distributed ledger technology (DLT) has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provides recommendations that could facilitate the continuous growth of blockchain applications in healthcare. Lastly, the study explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks.
{"title":"A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions","authors":"Olusogo Popoola , Marcos Rodrigues , Jims Marchang , Alex Shenfield , Augustine Ikpehai , Jumoke Popoola","doi":"10.1016/j.bcra.2023.100178","DOIUrl":"10.1016/j.bcra.2023.100178","url":null,"abstract":"<div><p>Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, proof-of-authority (PoA)-based blockchain distributed ledger technology (DLT) has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provides recommendations that could facilitate the continuous growth of blockchain applications in healthcare. Lastly, the study explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000532/pdfft?md5=430c94e12710b1fc82ce9b0e78f3eb2a&pid=1-s2.0-S2096720923000532-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.vrih.2024.02.001
B.A.O. Lingyun , Zhengrui HUANG , Zehui LIN , Yue SUN , Hui CHEN , You LI , Zhang LI , Xiaochen YUAN , Lin XU , Tao TAN
Background
Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications, particularly in visual recognition tasks such as image and video analyses. There is a growing interest in applying this technology to diverse applications in medical image analysis. Automated three-dimensional Breast Ultrasound is a vital tool for detecting breast cancer, and computer-assisted diagnosis software, developed based on deep learning, can effectively assist radiologists in diagnosis. However, the network model is prone to overfitting during training, owing to challenges such as insufficient training data. This study attempts to solve the problem caused by small datasets and improve model detection performance.
Methods
We propose a breast cancer detection framework based on deep learning (a transfer learning method based on cross-organ cancer detection) and a contrastive learning method based on breast imaging reporting and data systems (BI-RADS).
Results
When using cross organ transfer learning and BIRADS based contrastive learning, the average sensitivity of the model increased by a maximum of 16.05%.
Conclusion
Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced, and contrastive learning method based on BI-RADS can improve the detection performance of the model.
{"title":"Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning","authors":"B.A.O. Lingyun , Zhengrui HUANG , Zehui LIN , Yue SUN , Hui CHEN , You LI , Zhang LI , Xiaochen YUAN , Lin XU , Tao TAN","doi":"10.1016/j.vrih.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.vrih.2024.02.001","url":null,"abstract":"<div><h3>Background</h3><p>Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications, particularly in visual recognition tasks such as image and video analyses. There is a growing interest in applying this technology to diverse applications in medical image analysis. Automated three-dimensional Breast Ultrasound is a vital tool for detecting breast cancer, and computer-assisted diagnosis software, developed based on deep learning, can effectively assist radiologists in diagnosis. However, the network model is prone to overfitting during training, owing to challenges such as insufficient training data. This study attempts to solve the problem caused by small datasets and improve model detection performance.</p></div><div><h3>Methods</h3><p>We propose a breast cancer detection framework based on deep learning (a transfer learning method based on cross-organ cancer detection) and a contrastive learning method based on breast imaging reporting and data systems (BI-RADS).</p></div><div><h3>Results</h3><p>When using cross organ transfer learning and BIRADS based contrastive learning, the average sensitivity of the model increased by a maximum of 16.05%.</p></div><div><h3>Conclusion</h3><p>Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced, and contrastive learning method based on BI-RADS can improve the detection performance of the model.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209657962400007X/pdfft?md5=a1bdf0d74f499e2548f6f5735dd9b5bf&pid=1-s2.0-S209657962400007X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.26599/bdma.2023.9020030
Mona Ahamd Alghamdi, Abdullah S. Al-Malaise Al-Ghamdi, Mahmoud Ragab
{"title":"Predicting Energy Consumption Using Stacked LSTM Snapshot Ensemble","authors":"Mona Ahamd Alghamdi, Abdullah S. Al-Malaise Al-Ghamdi, Mahmoud Ragab","doi":"10.26599/bdma.2023.9020030","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020030","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.bcra.2023.100187
Sachin Yele, Ratnesh Litoriya
This research paper seeks to examine the possibilities of blockchain technology. For use in the field of restaurant food tracking and safety. Public health risks and economic costs are at stake when foodborne illness outbreaks occur, making food safety a top priority in the food industry. It can be difficult to quickly identify and address possible concerns about using traditional food traceability systems due to inefficiencies, data discrepancies, and a lack of transparency. In this study, we introduce a novel blockchain-based system developed especially for the purpose of tracking restaurant food. Blockchain decentralised consensus, immutability, and smart contracts are put to use in this system to provide trustworthy and transparent traceable infrastructure. Real-time monitoring and data collection along the food supply chain become possible when the blockchain architecture is combined with the Internet of Things (IoT) devices and RFID technology. We show that our proposed blockchain-based traceability solution is practical and efficient through a thorough assessment and validation procedure. The outcomes show that the system not only improves data quality and reliability but also drastically decreases the time and resources needed for food traceability. In addition, patrons are more likely to return to eateries that place a premium on food safety when they are given more information about the establishment’s practises. Additionally, we discuss scalability, data privacy, and interoperability concerns that may arise in future implementations and provide some initial ideas for overcoming these issues.
{"title":"Blockchain-based secure dining: Enhancing safety, transparency, and traceability in food consumption environment","authors":"Sachin Yele, Ratnesh Litoriya","doi":"10.1016/j.bcra.2023.100187","DOIUrl":"10.1016/j.bcra.2023.100187","url":null,"abstract":"<div><p>This research paper seeks to examine the possibilities of blockchain technology. For use in the field of restaurant food tracking and safety. Public health risks and economic costs are at stake when foodborne illness outbreaks occur, making food safety a top priority in the food industry. It can be difficult to quickly identify and address possible concerns about using traditional food traceability systems due to inefficiencies, data discrepancies, and a lack of transparency. In this study, we introduce a novel blockchain-based system developed especially for the purpose of tracking restaurant food. Blockchain decentralised consensus, immutability, and smart contracts are put to use in this system to provide trustworthy and transparent traceable infrastructure. Real-time monitoring and data collection along the food supply chain become possible when the blockchain architecture is combined with the Internet of Things (IoT) devices and RFID technology. We show that our proposed blockchain-based traceability solution is practical and efficient through a thorough assessment and validation procedure. The outcomes show that the system not only improves data quality and reliability but also drastically decreases the time and resources needed for food traceability. In addition, patrons are more likely to return to eateries that place a premium on food safety when they are given more information about the establishment’s practises. Additionally, we discuss scalability, data privacy, and interoperability concerns that may arise in future implementations and provide some initial ideas for overcoming these issues.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000623/pdfft?md5=b81f2fd6ad7c0182a78d05469e8ac252&pid=1-s2.0-S2096720923000623-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139127783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.vrih.2023.08.002
Hui XIE , Jianfang ZHANG , Lijuan DING , Tao TAN , Qing LI
Background
The prognosis and survival of patients with lung cancer are likely to deteriorate with metastasis. Using deep-learning in the detection of lymph node metastasis can facilitate the noninvasive calculation of the likelihood of such metastasis, thereby providing clinicians with crucial information to enhance diagnostic precision and ultimately improve patient survival and prognosis
Methods
In total, 623 eligible patients were recruited from two medical institutions. Seven deep learning models, namely Alex, GoogLeNet, Resnet18, Resnet101, Vgg16, Vgg19, and MobileNetv3 (small), were utilized to extract deep image histological features. The dimensionality of the extracted features was then reduced using the Spearman correlation coefficient (r ≥ 0.9) and Least Absolute Shrinkage and Selection Operator. Eleven machine learning methods, namely Support Vector Machine, K-nearest neighbor, Random Forest, Extra Trees, XGBoost, LightGBM, Naive Bayes, AdaBoost, Gradient Boosting Decision Tree, Linear Regression, and Multilayer Perceptron, were employed to construct classification prediction models for the filtered final features. The diagnostic performances of the models were assessed using various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value. Calibration and decision-curve analyses were also performed.
Results
The present study demonstrated that using deep radiomic features extracted from Vgg16, in conjunction with a prediction model constructed via a linear regression algorithm, effectively distinguished the status of mediastinal lymph nodes in patients with lung cancer. The performance of the model was evaluated based on various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value, which yielded values of 0.808, 0.834, 0.851, 0.745, 0.829, and 0.776, respectively. The validation set of the model was assessed using clinical decision curves, calibration curves, and confusion matrices, which collectively demonstrated the model's stability and accuracy
Conclusion
In this study, information on the deep radiomics of Vgg16 was obtained from computed tomography images, and the linear regression method was able to accurately diagnose mediastinal lymph node metastases in patients with lung cancer.
{"title":"Combining machine and deep transfer learning for mediastinal lymph node evaluation in patients with lung cancer","authors":"Hui XIE , Jianfang ZHANG , Lijuan DING , Tao TAN , Qing LI","doi":"10.1016/j.vrih.2023.08.002","DOIUrl":"https://doi.org/10.1016/j.vrih.2023.08.002","url":null,"abstract":"<div><h3>Background</h3><p>The prognosis and survival of patients with lung cancer are likely to deteriorate with metastasis. Using deep-learning in the detection of lymph node metastasis can facilitate the noninvasive calculation of the likelihood of such metastasis, thereby providing clinicians with crucial information to enhance diagnostic precision and ultimately improve patient survival and prognosis</p></div><div><h3>Methods</h3><p>In total, 623 eligible patients were recruited from two medical institutions. Seven deep learning models, namely Alex, GoogLeNet, Resnet18, Resnet101, Vgg16, Vgg19, and MobileNetv3 (small), were utilized to extract deep image histological features. The dimensionality of the extracted features was then reduced using the Spearman correlation coefficient (r ≥ 0.9) and Least Absolute Shrinkage and Selection Operator. Eleven machine learning methods, namely Support Vector Machine, K-nearest neighbor, Random Forest, Extra Trees, XGBoost, LightGBM, Naive Bayes, AdaBoost, Gradient Boosting Decision Tree, Linear Regression, and Multilayer Perceptron, were employed to construct classification prediction models for the filtered final features. The diagnostic performances of the models were assessed using various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value. Calibration and decision-curve analyses were also performed.</p></div><div><h3>Results</h3><p>The present study demonstrated that using deep radiomic features extracted from Vgg16, in conjunction with a prediction model constructed via a linear regression algorithm, effectively distinguished the status of mediastinal lymph nodes in patients with lung cancer. The performance of the model was evaluated based on various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value, which yielded values of 0.808, 0.834, 0.851, 0.745, 0.829, and 0.776, respectively. The validation set of the model was assessed using clinical decision curves, calibration curves, and confusion matrices, which collectively demonstrated the model's stability and accuracy</p></div><div><h3>Conclusion</h3><p>In this study, information on the deep radiomics of Vgg16 was obtained from computed tomography images, and the linear regression method was able to accurately diagnose mediastinal lymph node metastases in patients with lung cancer.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000463/pdfft?md5=d355b811e3e99356748d10c345ee1b33&pid=1-s2.0-S2096579623000463-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.26599/bdma.2023.9020029
Qiang Sun, Leilei Shi, Lu Liu, Zi-xuan Han, Liang Jiang, Yan Wu, Yeling Zhao
{"title":"A Novel Recommendation Algorithm Integrates Resource Allocation and Resource Transfer in Weighted Bipartite Network","authors":"Qiang Sun, Leilei Shi, Lu Liu, Zi-xuan Han, Liang Jiang, Yan Wu, Yeling Zhao","doi":"10.26599/bdma.2023.9020029","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020029","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}