首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India 在集成物联网网络中实施区块链技术,在印度构建可扩展的智能交通系统
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2024.100188
Arya Kharche, Sanskar Badholia, Ram Krishna Upadhyay

The implementation of blockchain technology in integrated IoT networks for constructing scalable Intelligent Transportation Systems (ITSs) in India has the potential to revolutionize the way we approach transportation. By leveraging the power of IoT and blockchain, we can create a highly secure, transparent, and efficient system that can transform the way we move people and goods. India, one of the world’s most populous countries, has a highly congested and inefficient transportation system that often leads to delays, accidents, and waste of time and resources. The integration of IoT and blockchain can help address these issues by enabling real-time monitoring, tracking, and optimization of traffic flows, thereby reducing congestion, improving safety, and increasing the overall efficiency of the transportation system. This paper explores the potential of blockchain technology in the context of integrated IoT networks for constructing scalable ITS systems in India. The methodology followed is to develop a proof-of-concept blockchain-based application for ITS, implement the blockchain solution into the existing ITS infrastructure, and ensure proper integration and compatibility with other systems. Conduct thorough research and maintenance to ensure the reliability and sustainability of such blockchain-based systems. This research discusses the various benefits and challenges of this approach and the various applications of this technology in the transportation sector, including the green sustainability concept. The results find various ways in which such implementations of blockchain and IoT-Machine Learning (IoT-ML) can revolutionize transportation systems.

在印度,为构建可扩展的智能交通系统(ITS)而在集成物联网网络中实施区块链技术,有可能彻底改变我们的交通方式。通过利用物联网和区块链的力量,我们可以创建一个高度安全、透明和高效的系统,从而改变我们运送人员和货物的方式。印度是世界上人口最多的国家之一,其交通系统高度拥堵且效率低下,经常导致延误、事故以及时间和资源的浪费。物联网和区块链的整合有助于解决这些问题,实现对交通流的实时监控、跟踪和优化,从而减少拥堵、提高安全性并提高交通系统的整体效率。本文探讨了区块链技术在集成物联网网络方面的潜力,以便在印度构建可扩展的智能交通系统。所采用的方法是为智能交通系统开发基于区块链的概念验证应用程序,将区块链解决方案实施到现有的智能交通系统基础设施中,并确保与其他系统的适当集成和兼容性。进行彻底的研究和维护,以确保这种基于区块链的系统的可靠性和可持续性。本研究讨论了这种方法的各种优势和挑战,以及该技术在交通领域的各种应用,包括绿色可持续发展理念。研究结果发现了区块链和物联网-机器学习(IoT-ML)的各种实现方式,可以彻底改变交通系统。
{"title":"Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India","authors":"Arya Kharche,&nbsp;Sanskar Badholia,&nbsp;Ram Krishna Upadhyay","doi":"10.1016/j.bcra.2024.100188","DOIUrl":"10.1016/j.bcra.2024.100188","url":null,"abstract":"<div><p>The implementation of blockchain technology in integrated IoT networks for constructing scalable Intelligent Transportation Systems (ITSs) in India has the potential to revolutionize the way we approach transportation. By leveraging the power of IoT and blockchain, we can create a highly secure, transparent, and efficient system that can transform the way we move people and goods. India, one of the world’s most populous countries, has a highly congested and inefficient transportation system that often leads to delays, accidents, and waste of time and resources. The integration of IoT and blockchain can help address these issues by enabling real-time monitoring, tracking, and optimization of traffic flows, thereby reducing congestion, improving safety, and increasing the overall efficiency of the transportation system. This paper explores the potential of blockchain technology in the context of integrated IoT networks for constructing scalable ITS systems in India. The methodology followed is to develop a proof-of-concept blockchain-based application for ITS, implement the blockchain solution into the existing ITS infrastructure, and ensure proper integration and compatibility with other systems. Conduct thorough research and maintenance to ensure the reliability and sustainability of such blockchain-based systems. This research discusses the various benefits and challenges of this approach and the various applications of this technology in the transportation sector, including the green sustainability concept. The results find various ways in which such implementations of blockchain and IoT-Machine Learning (IoT-ML) can revolutionize transportation systems.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000010/pdfft?md5=f0df3bf2f2a306097761b6d525acf13d&pid=1-s2.0-S2096720924000010-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers 利用多头二维变换器可解释地检测 Windows 可移植可执行文件中的恶意行为
IF 13.6 1区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020025
Sohail Khan, Mohammad Nauman
: Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems. One of the major challenges in tackling this problem is the complexity of malware analysis, which requires expertise from human analysts. Recent developments in machine learning have led to the creation of deep models for malware detection. However, these models often lack transparency, making it difficult to understand the reasoning behind the model’s decisions, otherwise known as the black-box problem. To address these limitations, this paper presents a novel model for malware detection, utilizing vision transformers to analyze the opcode sequences of more than 350,000 Windows portable executable malware samples from real-world datasets. The model achieved a high accuracy of 0.9864, not only surpassing previous results but also providing valuable insights into the reasoning behind the classification. Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples, aiding human experts in their analysis and driving further advancements in the field. We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model thus opening up this black-box problem for deeper analysis.
:随着恶意软件数量的不断增加以及系统中存储的敏感信息越来越多,Windows 恶意软件正成为一个日益紧迫的问题。解决这一问题的主要挑战之一是恶意软件分析的复杂性,这需要人类分析师的专业知识。机器学习的最新发展促使人们创建了用于恶意软件检测的深度模型。然而,这些模型往往缺乏透明度,因此很难理解模型决策背后的推理,也就是所谓的黑箱问题。为了解决这些局限性,本文提出了一种新型恶意软件检测模型,利用视觉转换器分析了来自真实世界数据集的 350,000 多个 Windows 可移植可执行恶意软件样本的操作码序列。该模型的准确率高达 0.9864,不仅超越了之前的结果,还为分类背后的推理提供了宝贵的见解。我们的模型能够精确定位导致恶意软件样本中恶意行为的特定指令,从而帮助人类专家进行分析,并推动该领域的进一步发展。我们报告了我们的发现,并展示了如何通过深度学习模型在恶意代码和实际分类之间建立因果关系,从而为更深入的分析打开这个黑箱问题。
{"title":"Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers","authors":"Sohail Khan, Mohammad Nauman","doi":"10.26599/bdma.2023.9020025","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020025","url":null,"abstract":": Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on systems. One of the major challenges in tackling this problem is the complexity of malware analysis, which requires expertise from human analysts. Recent developments in machine learning have led to the creation of deep models for malware detection. However, these models often lack transparency, making it difficult to understand the reasoning behind the model’s decisions, otherwise known as the black-box problem. To address these limitations, this paper presents a novel model for malware detection, utilizing vision transformers to analyze the opcode sequences of more than 350,000 Windows portable executable malware samples from real-world datasets. The model achieved a high accuracy of 0.9864, not only surpassing previous results but also providing valuable insights into the reasoning behind the classification. Our model is able to pinpoint specific instructions that lead to malicious behavior in malware samples, aiding human experts in their analysis and driving further advancements in the field. We report our findings and show how causality can be established between malicious code and actual classification by a deep learning model thus opening up this black-box problem for deeper analysis.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based engine data trustworthy swarm learning management method 基于区块链的引擎数据可信蜂群学习管理方法
IF 6.9 3区 计算机科学 Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100185
Zhenjie Luo, Hui Zhang

Engine data management is of great significance for ensuring data security and sharing, as well as facilitating multi-party collaborative learning. Traditional data management approaches often involve decentralized data storage that is vulnerable to tampering, making it challenging to conduct multi-party collaborative learning under privacy protection conditions and fully leverage the value of data. Moreover, data with compromised integrity can lead to incorrect results if used for model training. Therefore, this paper aims to break down data sharing barriers and fully utilize decentralized data for multi-party collaborative learning under privacy protection conditions. We propose a trustworthy engine data management method based on blockchain technology to ensure data immutability and non-repudiation. To address the issue of limited data samples for some users resulting in poor model performance, we introduce swarm learning techniques based on centralized machine learning and design a trustworthy data management method for swarm learning, achieving trustworthy regulation of the entire process. We conduct research on engine models under swarm learning based on the NASA open dataset, effectively organizing decentralized data samples for collaborative training while ensuring data privacy and fully leveraging the value of data.

引擎数据管理对于确保数据安全和共享以及促进多方协作学习具有重要意义。传统的数据管理方法通常涉及分散的数据存储,容易被篡改,这使得在隐私保护条件下进行多方协作学习和充分发挥数据价值面临挑战。此外,如果将完整性受损的数据用于模型训练,可能会导致错误的结果。因此,本文旨在打破数据共享壁垒,在隐私保护条件下充分利用分散数据进行多方协作学习。我们提出了一种基于区块链技术的可信引擎数据管理方法,以确保数据的不变性和不可抵赖性。针对部分用户数据样本有限导致模型性能不佳的问题,我们引入了基于中心化机器学习的蜂群学习技术,并设计了蜂群学习的可信数据管理方法,实现了全过程的可信监管。我们基于 NASA 开放数据集开展了蜂群学习下的引擎模型研究,在确保数据隐私、充分发挥数据价值的同时,有效组织分散的数据样本进行协同训练。
{"title":"Blockchain-based engine data trustworthy swarm learning management method","authors":"Zhenjie Luo,&nbsp;Hui Zhang","doi":"10.1016/j.bcra.2023.100185","DOIUrl":"10.1016/j.bcra.2023.100185","url":null,"abstract":"<div><p>Engine data management is of great significance for ensuring data security and sharing, as well as facilitating multi-party collaborative learning. Traditional data management approaches often involve decentralized data storage that is vulnerable to tampering, making it challenging to conduct multi-party collaborative learning under privacy protection conditions and fully leverage the value of data. Moreover, data with compromised integrity can lead to incorrect results if used for model training. Therefore, this paper aims to break down data sharing barriers and fully utilize decentralized data for multi-party collaborative learning under privacy protection conditions. We propose a trustworthy engine data management method based on blockchain technology to ensure data immutability and non-repudiation. To address the issue of limited data samples for some users resulting in poor model performance, we introduce swarm learning techniques based on centralized machine learning and design a trustworthy data management method for swarm learning, achieving trustworthy regulation of the entire process. We conduct research on engine models under swarm learning based on the NASA open dataset, effectively organizing decentralized data samples for collaborative training while ensuring data privacy and fully leveraging the value of data.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209672092300060X/pdfft?md5=3cecec9b4347c0153afcf9159a3b9bdc&pid=1-s2.0-S209672092300060X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions 关于采用物联网和区块链的智能家居医疗保健计划中的安全和隐私问题的重要文献综述:问题、挑战和解决方案
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100178
Olusogo Popoola , Marcos Rodrigues , Jims Marchang , Alex Shenfield , Augustine Ikpehai , Jumoke Popoola

Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, proof-of-authority (PoA)-based blockchain distributed ledger technology (DLT) has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provides recommendations that could facilitate the continuous growth of blockchain applications in healthcare. Lastly, the study explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks.

智能家居是一种流行的物联网(IoT)应用,由于物联网网络的大规模开发和分布式特性,保护智能家居中的私人数据仍然是数据安全和隐私方面的重大挑战。最近,智能医疗利用了智能家居系统,从而加剧了对敏感数据和私人数据保密性以及数据所有者隐私的安全担忧。不过,基于授权证明(PoA)的区块链分布式账本技术(DLT)已成为一种很有前途的解决方案,可保护私人数据不被滥用,从而保护居住在物联网智能家居中的个人隐私。本综述引出了一些阻碍区块链和物联网(BCoT)在某些领域应用的担忧、问题和难题,并提出了利用就地养老场景的必要解决方案。研究还探讨了区块链和物联网的实施问题,以及在利用区块链和物联网提高安全性时可能带来的综合挑战。研究讨论了最新发现、机遇和障碍,并提出了可促进医疗保健领域区块链应用持续增长的建议。最后,研究探讨了在信息披露过程中使用基于 PoA 的许可区块链和适用的基于同意的隐私模型进行决策的潜力,包括使用发布者-订阅者合约进行细粒度访问控制,以确保数据处理和共享的安全性,以及个人信息披露中的道德信任,以此作为解决方案的一个方向。拟议的授权框架可确保数据所有权、有条件的访问管理、可扩展和防篡改的数据存储,以及针对截获和内部攻击等威胁模式的更具弹性的系统。
{"title":"A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: Problems, challenges and solutions","authors":"Olusogo Popoola ,&nbsp;Marcos Rodrigues ,&nbsp;Jims Marchang ,&nbsp;Alex Shenfield ,&nbsp;Augustine Ikpehai ,&nbsp;Jumoke Popoola","doi":"10.1016/j.bcra.2023.100178","DOIUrl":"10.1016/j.bcra.2023.100178","url":null,"abstract":"<div><p>Protecting private data in smart homes, a popular Internet-of-Things (IoT) application, remains a significant data security and privacy challenge due to the large-scale development and distributed nature of IoT networks. Recently, smart healthcare has leveraged smart home systems, thereby compounding security concerns in terms of the confidentiality of sensitive and private data and by extension the privacy of the data owner. However, proof-of-authority (PoA)-based blockchain distributed ledger technology (DLT) has emerged as a promising solution for protecting private data from indiscriminate use and thereby preserving the privacy of individuals residing in IoT-enabled smart homes. This review elicits some concerns, issues, and problems that have hindered the adoption of blockchain and IoT (BCoT) in some domains and suggests requisite solutions using the aging-in-place scenario. Implementation issues with BCoT were examined as well as the combined challenges BCoT can pose when utilised for security gains. The study discusses recent findings, opportunities, and barriers, and provides recommendations that could facilitate the continuous growth of blockchain applications in healthcare. Lastly, the study explored the potential of using a PoA-based permission blockchain with an applicable consent-based privacy model for decision-making in the information disclosure process, including the use of publisher-subscriber contracts for fine-grained access control to ensure secure data processing and sharing, as well as ethical trust in personal information disclosure, as a solution direction. The proposed authorisation framework could guarantee data ownership, conditional access management, scalable and tamper-proof data storage, and a more resilient system against threat models such as interception and insider attacks.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000532/pdfft?md5=430c94e12710b1fc82ce9b0e78f3eb2a&pid=1-s2.0-S2096720923000532-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning 利用跨器官迁移学习在自动三维乳腺超声中自动检测乳腺病变
Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.vrih.2024.02.001
B.A.O. Lingyun , Zhengrui HUANG , Zehui LIN , Yue SUN , Hui CHEN , You LI , Zhang LI , Xiaochen YUAN , Lin XU , Tao TAN

Background

Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications, particularly in visual recognition tasks such as image and video analyses. There is a growing interest in applying this technology to diverse applications in medical image analysis. Automated three-dimensional Breast Ultrasound is a vital tool for detecting breast cancer, and computer-assisted diagnosis software, developed based on deep learning, can effectively assist radiologists in diagnosis. However, the network model is prone to overfitting during training, owing to challenges such as insufficient training data. This study attempts to solve the problem caused by small datasets and improve model detection performance.

Methods

We propose a breast cancer detection framework based on deep learning (a transfer learning method based on cross-organ cancer detection) and a contrastive learning method based on breast imaging reporting and data systems (BI-RADS).

Results

When using cross organ transfer learning and BIRADS based contrastive learning, the average sensitivity of the model increased by a maximum of 16.05%.

Conclusion

Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced, and contrastive learning method based on BI-RADS can improve the detection performance of the model.

背景深层卷积神经网络在众多机器学习应用中,尤其是在图像和视频分析等视觉识别任务中,已经引起了广泛关注。人们对将这一技术应用于医学图像分析的各种应用越来越感兴趣。自动三维乳腺超声波检查是检测乳腺癌的重要工具,基于深度学习开发的计算机辅助诊断软件可以有效地协助放射科医生进行诊断。然而,由于训练数据不足等难题,网络模型在训练过程中容易出现过拟合。方法我们提出了一种基于深度学习的乳腺癌检测框架(一种基于跨器官癌症检测的迁移学习方法)和一种基于乳腺成像报告和数据系统(BI-RADS)的对比学习方法。结果当使用跨器官转移学习和基于 BIRADS 的对比学习时,模型的平均灵敏度最高提高了 16.05%。结论我们的实验证明,跨器官癌症检测的参数和经验可以相互参考,而基于 BI-RADS 的对比学习方法可以提高模型的检测性能。
{"title":"Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning","authors":"B.A.O. Lingyun ,&nbsp;Zhengrui HUANG ,&nbsp;Zehui LIN ,&nbsp;Yue SUN ,&nbsp;Hui CHEN ,&nbsp;You LI ,&nbsp;Zhang LI ,&nbsp;Xiaochen YUAN ,&nbsp;Lin XU ,&nbsp;Tao TAN","doi":"10.1016/j.vrih.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.vrih.2024.02.001","url":null,"abstract":"<div><h3>Background</h3><p>Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications, particularly in visual recognition tasks such as image and video analyses. There is a growing interest in applying this technology to diverse applications in medical image analysis. Automated three-dimensional Breast Ultrasound is a vital tool for detecting breast cancer, and computer-assisted diagnosis software, developed based on deep learning, can effectively assist radiologists in diagnosis. However, the network model is prone to overfitting during training, owing to challenges such as insufficient training data. This study attempts to solve the problem caused by small datasets and improve model detection performance.</p></div><div><h3>Methods</h3><p>We propose a breast cancer detection framework based on deep learning (a transfer learning method based on cross-organ cancer detection) and a contrastive learning method based on breast imaging reporting and data systems (BI-RADS).</p></div><div><h3>Results</h3><p>When using cross organ transfer learning and BIRADS based contrastive learning, the average sensitivity of the model increased by a maximum of 16.05%.</p></div><div><h3>Conclusion</h3><p>Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced, and contrastive learning method based on BI-RADS can improve the detection performance of the model.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S209657962400007X/pdfft?md5=a1bdf0d74f499e2548f6f5735dd9b5bf&pid=1-s2.0-S209657962400007X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Based Advanced Approaches and Dry Eye Disease Detection Based on Multi-Source Evidence: Cases, Applications, Issues, and Future Directions 基于人工智能的先进方法和基于多源证据的干眼症检测:案例、应用、问题和未来方向
IF 13.6 1区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020024
M. Wang, Lumin Xing, Yi Pan, Feng Gu, Junbin Fang, Xiangrong Yu, C. Pang, Kelvin Kam-Lung Chong, Carol Yim-Lui Cheung, Xulin Liao, Xiaoxiao Fang, Jie Yang, Ruoyu Zhou, Xiaoshu Zhou, Fengling Wang, Wenjian Liu
{"title":"AI-Based Advanced Approaches and Dry Eye Disease Detection Based on Multi-Source Evidence: Cases, Applications, Issues, and Future Directions","authors":"M. Wang, Lumin Xing, Yi Pan, Feng Gu, Junbin Fang, Xiangrong Yu, C. Pang, Kelvin Kam-Lung Chong, Carol Yim-Lui Cheung, Xulin Liao, Xiaoxiao Fang, Jie Yang, Ruoyu Zhou, Xiaoshu Zhou, Fengling Wang, Wenjian Liu","doi":"10.26599/bdma.2023.9020024","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020024","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Predicting Energy Consumption Using Stacked LSTM Snapshot Ensemble 使用堆叠 LSTM 快照集合预测能耗
IF 13.6 1区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020030
Mona Ahamd Alghamdi, Abdullah S. Al-Malaise Al-Ghamdi, Mahmoud Ragab
{"title":"Predicting Energy Consumption Using Stacked LSTM Snapshot Ensemble","authors":"Mona Ahamd Alghamdi, Abdullah S. Al-Malaise Al-Ghamdi, Mahmoud Ragab","doi":"10.26599/bdma.2023.9020030","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020030","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based secure dining: Enhancing safety, transparency, and traceability in food consumption environment 基于区块链的安全餐饮:提高食品消费环境的安全性、透明度和可追溯性
IF 6.9 3区 计算机科学 Pub Date : 2024-06-01 DOI: 10.1016/j.bcra.2023.100187
Sachin Yele, Ratnesh Litoriya

This research paper seeks to examine the possibilities of blockchain technology. For use in the field of restaurant food tracking and safety. Public health risks and economic costs are at stake when foodborne illness outbreaks occur, making food safety a top priority in the food industry. It can be difficult to quickly identify and address possible concerns about using traditional food traceability systems due to inefficiencies, data discrepancies, and a lack of transparency. In this study, we introduce a novel blockchain-based system developed especially for the purpose of tracking restaurant food. Blockchain decentralised consensus, immutability, and smart contracts are put to use in this system to provide trustworthy and transparent traceable infrastructure. Real-time monitoring and data collection along the food supply chain become possible when the blockchain architecture is combined with the Internet of Things (IoT) devices and RFID technology. We show that our proposed blockchain-based traceability solution is practical and efficient through a thorough assessment and validation procedure. The outcomes show that the system not only improves data quality and reliability but also drastically decreases the time and resources needed for food traceability. In addition, patrons are more likely to return to eateries that place a premium on food safety when they are given more information about the establishment’s practises. Additionally, we discuss scalability, data privacy, and interoperability concerns that may arise in future implementations and provide some initial ideas for overcoming these issues.

本研究论文旨在探讨区块链技术的可能性。用于餐厅食品跟踪和安全领域。食源性疾病爆发时,公共卫生风险和经济成本岌岌可危,因此食品安全成为食品行业的重中之重。由于效率低下、数据不一致和缺乏透明度等原因,使用传统的食品追溯系统很难快速识别和解决可能存在的问题。在本研究中,我们介绍了一种基于区块链的新型系统,该系统是专门为追踪餐厅食品而开发的。该系统采用了区块链去中心化共识、不可篡改性和智能合约,以提供可信、透明的可追溯基础设施。当区块链架构与物联网(IoT)设备和射频识别(RFID)技术相结合时,食品供应链上的实时监控和数据收集就成为可能。通过全面的评估和验证程序,我们证明了我们提出的基于区块链的可追溯解决方案是实用和高效的。结果表明,该系统不仅提高了数据质量和可靠性,还大大减少了食品溯源所需的时间和资源。此外,如果食客能获得更多有关餐厅做法的信息,他们就更有可能再次光顾注重食品安全的餐厅。此外,我们还讨论了在未来实施过程中可能出现的可扩展性、数据隐私和互操作性问题,并提出了一些克服这些问题的初步想法。
{"title":"Blockchain-based secure dining: Enhancing safety, transparency, and traceability in food consumption environment","authors":"Sachin Yele,&nbsp;Ratnesh Litoriya","doi":"10.1016/j.bcra.2023.100187","DOIUrl":"10.1016/j.bcra.2023.100187","url":null,"abstract":"<div><p>This research paper seeks to examine the possibilities of blockchain technology. For use in the field of restaurant food tracking and safety. Public health risks and economic costs are at stake when foodborne illness outbreaks occur, making food safety a top priority in the food industry. It can be difficult to quickly identify and address possible concerns about using traditional food traceability systems due to inefficiencies, data discrepancies, and a lack of transparency. In this study, we introduce a novel blockchain-based system developed especially for the purpose of tracking restaurant food. Blockchain decentralised consensus, immutability, and smart contracts are put to use in this system to provide trustworthy and transparent traceable infrastructure. Real-time monitoring and data collection along the food supply chain become possible when the blockchain architecture is combined with the Internet of Things (IoT) devices and RFID technology. We show that our proposed blockchain-based traceability solution is practical and efficient through a thorough assessment and validation procedure. The outcomes show that the system not only improves data quality and reliability but also drastically decreases the time and resources needed for food traceability. In addition, patrons are more likely to return to eateries that place a premium on food safety when they are given more information about the establishment’s practises. Additionally, we discuss scalability, data privacy, and interoperability concerns that may arise in future implementations and provide some initial ideas for overcoming these issues.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000623/pdfft?md5=b81f2fd6ad7c0182a78d05469e8ac252&pid=1-s2.0-S2096720923000623-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139127783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining machine and deep transfer learning for mediastinal lymph node evaluation in patients with lung cancer 结合机器学习和深度传输学习评估肺癌患者的纵隔淋巴结
Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.vrih.2023.08.002
Hui XIE , Jianfang ZHANG , Lijuan DING , Tao TAN , Qing LI

Background

The prognosis and survival of patients with lung cancer are likely to deteriorate with metastasis. Using deep-learning in the detection of lymph node metastasis can facilitate the noninvasive calculation of the likelihood of such metastasis, thereby providing clinicians with crucial information to enhance diagnostic precision and ultimately improve patient survival and prognosis

Methods

In total, 623 eligible patients were recruited from two medical institutions. Seven deep learning models, namely Alex, GoogLeNet, Resnet18, Resnet101, Vgg16, Vgg19, and MobileNetv3 (small), were utilized to extract deep image histological features. The dimensionality of the extracted features was then reduced using the Spearman correlation coefficient (r ≥ 0.9) and Least Absolute Shrinkage and Selection Operator. Eleven machine learning methods, namely Support Vector Machine, K-nearest neighbor, Random Forest, Extra Trees, XGBoost, LightGBM, Naive Bayes, AdaBoost, Gradient Boosting Decision Tree, Linear Regression, and Multilayer Perceptron, were employed to construct classification prediction models for the filtered final features. The diagnostic performances of the models were assessed using various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value. Calibration and decision-curve analyses were also performed.

Results

The present study demonstrated that using deep radiomic features extracted from Vgg16, in conjunction with a prediction model constructed via a linear regression algorithm, effectively distinguished the status of mediastinal lymph nodes in patients with lung cancer. The performance of the model was evaluated based on various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value, which yielded values of 0.808, 0.834, 0.851, 0.745, 0.829, and 0.776, respectively. The validation set of the model was assessed using clinical decision curves, calibration curves, and confusion matrices, which collectively demonstrated the model's stability and accuracy

Conclusion

In this study, information on the deep radiomics of Vgg16 was obtained from computed tomography images, and the linear regression method was able to accurately diagnose mediastinal lymph node metastases in patients with lung cancer.

背景肺癌患者的预后和生存率很可能随着转移而恶化。利用深度学习检测淋巴结转移可以无创计算淋巴结转移的可能性,从而为临床医生提供关键信息,提高诊断精度,最终改善患者的生存和预后。利用七个深度学习模型,即 Alex、GoogLeNet、Resnet18、Resnet101、Vgg16、Vgg19 和 MobileNetv3(小型),提取深度图像组织学特征。然后使用斯皮尔曼相关系数(r ≥ 0.9)和最小绝对收缩与选择操作符对提取的特征进行降维。采用了 11 种机器学习方法,即支持向量机、K-近邻、随机森林、额外树、XGBoost、LightGBM、Naive Bayes、AdaBoost、梯度提升决策树、线性回归和多层感知器,为过滤后的最终特征构建分类预测模型。使用各种指标评估了模型的诊断性能,包括准确率、接收者操作特征曲线下面积、灵敏度、特异性、阳性预测值和阴性预测值。结果本研究表明,使用从 Vgg16 提取的深度放射学特征,结合通过线性回归算法构建的预测模型,可以有效区分肺癌患者纵隔淋巴结的状态。该模型的性能评估基于各种指标,包括准确率、接收者工作特征曲线下面积、灵敏度、特异性、阳性预测值和阴性预测值,其值分别为 0.808、0.834、0.851、0.745、0.829 和 0.776。结论本研究从计算机断层扫描图像中获取了 Vgg16 的深部放射组学信息,并利用线性回归方法准确诊断了肺癌患者的纵隔淋巴结转移。
{"title":"Combining machine and deep transfer learning for mediastinal lymph node evaluation in patients with lung cancer","authors":"Hui XIE ,&nbsp;Jianfang ZHANG ,&nbsp;Lijuan DING ,&nbsp;Tao TAN ,&nbsp;Qing LI","doi":"10.1016/j.vrih.2023.08.002","DOIUrl":"https://doi.org/10.1016/j.vrih.2023.08.002","url":null,"abstract":"<div><h3>Background</h3><p>The prognosis and survival of patients with lung cancer are likely to deteriorate with metastasis. Using deep-learning in the detection of lymph node metastasis can facilitate the noninvasive calculation of the likelihood of such metastasis, thereby providing clinicians with crucial information to enhance diagnostic precision and ultimately improve patient survival and prognosis</p></div><div><h3>Methods</h3><p>In total, 623 eligible patients were recruited from two medical institutions. Seven deep learning models, namely Alex, GoogLeNet, Resnet18, Resnet101, Vgg16, Vgg19, and MobileNetv3 (small), were utilized to extract deep image histological features. The dimensionality of the extracted features was then reduced using the Spearman correlation coefficient (r ≥ 0.9) and Least Absolute Shrinkage and Selection Operator. Eleven machine learning methods, namely Support Vector Machine, K-nearest neighbor, Random Forest, Extra Trees, XGBoost, LightGBM, Naive Bayes, AdaBoost, Gradient Boosting Decision Tree, Linear Regression, and Multilayer Perceptron, were employed to construct classification prediction models for the filtered final features. The diagnostic performances of the models were assessed using various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value. Calibration and decision-curve analyses were also performed.</p></div><div><h3>Results</h3><p>The present study demonstrated that using deep radiomic features extracted from Vgg16, in conjunction with a prediction model constructed via a linear regression algorithm, effectively distinguished the status of mediastinal lymph nodes in patients with lung cancer. The performance of the model was evaluated based on various metrics, including accuracy, area under the receiver operating characteristic curve, sensitivity, specificity, positive predictive value, and negative predictive value, which yielded values of 0.808, 0.834, 0.851, 0.745, 0.829, and 0.776, respectively. The validation set of the model was assessed using clinical decision curves, calibration curves, and confusion matrices, which collectively demonstrated the model's stability and accuracy</p></div><div><h3>Conclusion</h3><p>In this study, information on the deep radiomics of Vgg16 was obtained from computed tomography images, and the linear regression method was able to accurately diagnose mediastinal lymph node metastases in patients with lung cancer.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000463/pdfft?md5=d355b811e3e99356748d10c345ee1b33&pid=1-s2.0-S2096579623000463-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141484841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Recommendation Algorithm Integrates Resource Allocation and Resource Transfer in Weighted Bipartite Network 加权双向网络中整合资源分配和资源转移的新型推荐算法
IF 13.6 1区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020029
Qiang Sun, Leilei Shi, Lu Liu, Zi-xuan Han, Liang Jiang, Yan Wu, Yeling Zhao
{"title":"A Novel Recommendation Algorithm Integrates Resource Allocation and Resource Transfer in Weighted Bipartite Network","authors":"Qiang Sun, Leilei Shi, Lu Liu, Zi-xuan Han, Liang Jiang, Yan Wu, Yeling Zhao","doi":"10.26599/bdma.2023.9020029","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020029","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 Bulletin of Science and Technology Computers and Applied Chemistry Equipment for Electronic Products Manufacturing Hebei Journal of Industrial Science and Technology Journal of Applied Sciences Journal of University of Science and Technology of China Printed Circuit Information Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) 中国图象图形学报 Journal of Radars 信息与控制 数据采集与处理 Jiqiren/Robot 西北工业大学学报 High Technology Letters Journal of Cybersecurity Scientia Sinica Informationis Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art Qinghua Daxue Xuebao/Journal of Tsinghua University 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1