首页 > 最新文献

Mathematical Biosciences and Engineering最新文献

英文 中文
Optimal vaccine allocation strategy: Theory and application to the early stage of COVID-19 in Japan. 最佳疫苗分配策略:日本 COVID-19 早期阶段的理论与应用。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-19 DOI: 10.3934/mbe.2024277
Toshikazu Kuniya, Taisuke Nakata, Daisuke Fujii

In this paper, we construct an age-structured epidemic model to analyze the optimal vaccine allocation strategy in an epidemic. We focus on two topics: the first one is the optimal vaccination interval between the first and second doses, and the second one is the optimal vaccine allocation ratio between young and elderly people. On the first topic, we show that the optimal interval tends to become longer as the relative efficacy of the first dose to the second dose (RE) increases. On the second topic, we show that the heterogeneity in the age-dependent susceptibility (HS) affects the optimal allocation ratio between young and elderly people, whereas the heterogeneity in the contact frequency among different age groups (HC) tends to affect the effectiveness of the vaccination campaign. A counterfactual simulation suggests that the epidemic wave in the summer of 2021 in Japan could have been greatly mitigated if the optimal vaccine allocation strategy had been taken.

本文构建了一个年龄结构流行病模型,以分析流行病中的最佳疫苗分配策略。我们重点研究了两个问题:第一个问题是第一剂和第二剂之间的最佳接种间隔,第二个问题是年轻人和老年人之间的最佳疫苗分配比例。关于第一个问题,我们的研究表明,随着第一剂疫苗与第二剂疫苗的相对效力(RE)的增加,最佳接种间隔趋于变长。关于第二个问题,我们的研究表明,与年龄相关的易感性的异质性(HS)会影响年轻人和老年人之间的最佳分配比例,而不同年龄组之间接触频率的异质性(HC)往往会影响疫苗接种活动的效果。反事实模拟表明,如果采取了最佳疫苗分配策略,2021 年夏季日本的流行病浪潮可能会大大缓解。
{"title":"Optimal vaccine allocation strategy: Theory and application to the early stage of COVID-19 in Japan.","authors":"Toshikazu Kuniya, Taisuke Nakata, Daisuke Fujii","doi":"10.3934/mbe.2024277","DOIUrl":"https://doi.org/10.3934/mbe.2024277","url":null,"abstract":"<p><p>In this paper, we construct an age-structured epidemic model to analyze the optimal vaccine allocation strategy in an epidemic. We focus on two topics: the first one is the optimal vaccination interval between the first and second doses, and the second one is the optimal vaccine allocation ratio between young and elderly people. On the first topic, we show that the optimal interval tends to become longer as the relative efficacy of the first dose to the second dose (RE) increases. On the second topic, we show that the heterogeneity in the age-dependent susceptibility (HS) affects the optimal allocation ratio between young and elderly people, whereas the heterogeneity in the contact frequency among different age groups (HC) tends to affect the effectiveness of the vaccination campaign. A counterfactual simulation suggests that the epidemic wave in the summer of 2021 in Japan could have been greatly mitigated if the optimal vaccine allocation strategy had been taken.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6359-6371"},"PeriodicalIF":2.6,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on MEC computing offload strategy for joint optimization of delay and energy consumption. 联合优化延迟和能耗的 MEC 计算卸载策略研究。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-17 DOI: 10.3934/mbe.2024276
Mingchang Ni, Guo Zhang, Qi Yang, Liqiong Yin

The decision-making process for computational offloading is a critical aspect of mobile edge computing, and various offloading decision strategies are strongly linked to the calculated latency and energy consumption of the mobile edge computing system. This paper proposes an offloading scheme based on an enhanced sine-cosine optimization algorithm (SCAGA) designed for the "edge-end" architecture scenario within edge computing. The research presented in this paper covers the following aspects: (1) Establishment of computational resource allocation models and computational cost models for edge computing scenarios; (2) Introduction of an enhanced sine and cosine optimization algorithm built upon the principles of Levy flight strategy sine and cosine optimization algorithms, incorporating concepts from roulette wheel selection and gene mutation commonly found in genetic algorithms; (3) Execution of simulation experiments to evaluate the SCAGA-based offloading scheme, demonstrating its ability to effectively reduce system latency and optimize offloading utility. Comparative experiments also highlight improvements in system latency, mobile user energy consumption, and offloading utility when compared to alternative offloading schemes.

计算卸载的决策过程是移动边缘计算的一个关键方面,各种卸载决策策略与移动边缘计算系统的计算延迟和能耗密切相关。本文针对边缘计算中的 "边缘端 "架构场景,提出了一种基于增强型正余弦优化算法(SCAGA)的卸载方案。本文的研究内容包括以下几个方面:(1)建立边缘计算场景的计算资源分配模型和计算成本模型;(2)基于常春藤飞行策略正余弦优化算法的原理,结合遗传算法中常见的轮盘选择和基因突变的概念,引入增强型正余弦优化算法;(3)执行仿真实验来评估基于 SCAGA 的卸载方案,证明该方案能够有效降低系统延迟并优化卸载效用。与其他卸载方案相比,对比实验还凸显了系统延迟、移动用户能耗和卸载效用方面的改进。
{"title":"Research on MEC computing offload strategy for joint optimization of delay and energy consumption.","authors":"Mingchang Ni, Guo Zhang, Qi Yang, Liqiong Yin","doi":"10.3934/mbe.2024276","DOIUrl":"https://doi.org/10.3934/mbe.2024276","url":null,"abstract":"<p><p>The decision-making process for computational offloading is a critical aspect of mobile edge computing, and various offloading decision strategies are strongly linked to the calculated latency and energy consumption of the mobile edge computing system. This paper proposes an offloading scheme based on an enhanced sine-cosine optimization algorithm (SCAGA) designed for the \"edge-end\" architecture scenario within edge computing. The research presented in this paper covers the following aspects: (1) Establishment of computational resource allocation models and computational cost models for edge computing scenarios; (2) Introduction of an enhanced sine and cosine optimization algorithm built upon the principles of Levy flight strategy sine and cosine optimization algorithms, incorporating concepts from roulette wheel selection and gene mutation commonly found in genetic algorithms; (3) Execution of simulation experiments to evaluate the SCAGA-based offloading scheme, demonstrating its ability to effectively reduce system latency and optimize offloading utility. Comparative experiments also highlight improvements in system latency, mobile user energy consumption, and offloading utility when compared to alternative offloading schemes.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6336-6358"},"PeriodicalIF":2.6,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperparameter optimization: Classics, acceleration, online, multi-objective, and tools. 超参数优化:经典、加速、在线、多目标和工具。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-14 DOI: 10.3934/mbe.2024275
Jia Mian Tan, Haoran Liao, Wei Liu, Changjun Fan, Jincai Huang, Zhong Liu, Junchi Yan

Hyperparameter optimization (HPO) has been well-developed and evolved into a well-established research topic over the decades. With the success and wide application of deep learning, HPO has garnered increased attention, particularly within the realm of machine learning model training and inference. The primary objective is to mitigate the challenges associated with manual hyperparameter tuning, which can be ad-hoc, reliant on human expertise, and consequently hinders reproducibility while inflating deployment costs. Recognizing the growing significance of HPO, this paper surveyed classical HPO methods, approaches for accelerating the optimization process, HPO in an online setting (dynamic algorithm configuration, DAC), and when there is more than one objective to optimize (multi-objective HPO). Acceleration strategies were categorized into multi-fidelity, bandit-based, and early stopping; DAC algorithms encompassed gradient-based, population-based, and reinforcement learning-based methods; multi-objective HPO can be approached via scalarization, metaheuristics, and model-based algorithms tailored for multi-objective situation. A tabulated overview of popular frameworks and tools for HPO was provided, catering to the interests of practitioners.

几十年来,超参数优化(HPO)得到了很好的发展,并逐渐成为一个成熟的研究课题。随着深度学习的成功和广泛应用,HPO 赢得了越来越多的关注,特别是在机器学习模型训练和推理领域。其主要目的是减轻与人工超参数调整相关的挑战,因为人工超参数调整可能是临时性的,依赖于人类的专业知识,因此会阻碍可重复性,同时增加部署成本。认识到 HPO 的重要性与日俱增,本文研究了经典 HPO 方法、加速优化过程的方法、在线环境下的 HPO(动态算法配置,DAC),以及有多个目标需要优化时的 HPO(多目标 HPO)。加速策略分为多保真、基于强盗和早期停止;DAC 算法包括基于梯度、基于群体和基于强化学习的方法;多目标 HPO 可以通过标量化、元启发式和基于模型的算法来实现,这些算法都是为多目标情况量身定制的。针对实践者的兴趣,以表格形式概述了 HPO 的流行框架和工具。
{"title":"Hyperparameter optimization: Classics, acceleration, online, multi-objective, and tools.","authors":"Jia Mian Tan, Haoran Liao, Wei Liu, Changjun Fan, Jincai Huang, Zhong Liu, Junchi Yan","doi":"10.3934/mbe.2024275","DOIUrl":"https://doi.org/10.3934/mbe.2024275","url":null,"abstract":"<p><p>Hyperparameter optimization (HPO) has been well-developed and evolved into a well-established research topic over the decades. With the success and wide application of deep learning, HPO has garnered increased attention, particularly within the realm of machine learning model training and inference. The primary objective is to mitigate the challenges associated with manual hyperparameter tuning, which can be ad-hoc, reliant on human expertise, and consequently hinders reproducibility while inflating deployment costs. Recognizing the growing significance of HPO, this paper surveyed classical HPO methods, approaches for accelerating the optimization process, HPO in an online setting (dynamic algorithm configuration, DAC), and when there is more than one objective to optimize (multi-objective HPO). Acceleration strategies were categorized into multi-fidelity, bandit-based, and early stopping; DAC algorithms encompassed gradient-based, population-based, and reinforcement learning-based methods; multi-objective HPO can be approached via scalarization, metaheuristics, and model-based algorithms tailored for multi-objective situation. A tabulated overview of popular frameworks and tools for HPO was provided, catering to the interests of practitioners.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6289-6335"},"PeriodicalIF":2.6,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytic delay distributions for a family of gene transcription models. 基因转录模型系列的分析延迟分布。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-13 DOI: 10.3934/mbe.2024273
S Hossein Hosseini, Marc R Roussel

Models intended to describe the time evolution of a gene network must somehow include transcription, the DNA-templated synthesis of RNA, and translation, the RNA-templated synthesis of proteins. In eukaryotes, the DNA template for transcription can be very long, often consisting of tens of thousands of nucleotides, and lengthy pauses may punctuate this process. Accordingly, transcription can last for many minutes, in some cases hours. There is a long history of introducing delays in gene expression models to take the transcription and translation times into account. Here we study a family of detailed transcription models that includes initiation, elongation, and termination reactions. We establish a framework for computing the distribution of transcription times, and work out these distributions for some typical cases. For elongation, a fixed delay is a good model provided elongation is fast compared to initiation and termination, and there are no sites where long pauses occur. The initiation and termination phases of the model then generate a nontrivial delay distribution, and elongation shifts this distribution by an amount corresponding to the elongation delay. When initiation and termination are relatively fast, the distribution of elongation times can be approximated by a Gaussian. A convolution of this Gaussian with the initiation and termination time distributions gives another analytic approximation to the transcription time distribution. If there are long pauses during elongation, because of the modularity of the family of models considered, the elongation phase can be partitioned into reactions generating a simple delay (elongation through regions where there are no long pauses), and reactions whose distribution of waiting times must be considered explicitly (initiation, termination, and motion through regions where long pauses are likely). In these cases, the distribution of transcription times again involves a nontrivial part and a shift due to fast elongation processes.

旨在描述基因网络时间演化的模型必须以某种方式包括转录(以 DNA 为模板合成 RNA)和翻译(以 RNA 为模板合成蛋白质)。在真核生物中,用于转录的 DNA 模板可能很长,通常由数以万计的核苷酸组成,转录过程中可能会出现长时间的停顿。因此,转录可以持续许多分钟,有时甚至长达数小时。在基因表达模型中引入延迟以考虑转录和翻译时间的做法由来已久。在这里,我们研究了一系列详细的转录模型,其中包括起始、延伸和终止反应。我们建立了一个计算转录时间分布的框架,并在一些典型情况下计算出了这些分布。对于伸长反应,固定延迟是一个很好的模型,条件是伸长反应与起始和终止反应相比速度很快,而且没有出现长时间停顿的位点。然后,模型中的起始和终止阶段会产生一个非对称的延迟分布,而伸长会使这一分布发生移动,移动量与伸长延迟相应。当启动和终止相对较快时,伸长时间的分布可以用高斯分布来近似。将该高斯与起始和终止时间分布卷积,可得到转录时间分布的另一个解析近似值。如果在伸长过程中存在长时间的停顿,由于所考虑的模型系列具有模块性,伸长阶段可以划分为产生简单延迟的反应(通过没有长时间停顿区域的伸长)和必须明确考虑等待时间分布的反应(起始、终止和通过可能出现长时间停顿区域的运动)。在这些情况下,转录时间的分布再次涉及一个非简单的部分,以及由于快速伸长过程而产生的偏移。
{"title":"Analytic delay distributions for a family of gene transcription models.","authors":"S Hossein Hosseini, Marc R Roussel","doi":"10.3934/mbe.2024273","DOIUrl":"https://doi.org/10.3934/mbe.2024273","url":null,"abstract":"<p><p>Models intended to describe the time evolution of a gene network must somehow include transcription, the DNA-templated synthesis of RNA, and translation, the RNA-templated synthesis of proteins. In eukaryotes, the DNA template for transcription can be very long, often consisting of tens of thousands of nucleotides, and lengthy pauses may punctuate this process. Accordingly, transcription can last for many minutes, in some cases hours. There is a long history of introducing delays in gene expression models to take the transcription and translation times into account. Here we study a family of detailed transcription models that includes initiation, elongation, and termination reactions. We establish a framework for computing the distribution of transcription times, and work out these distributions for some typical cases. For elongation, a fixed delay is a good model provided elongation is fast compared to initiation and termination, and there are no sites where long pauses occur. The initiation and termination phases of the model then generate a nontrivial delay distribution, and elongation shifts this distribution by an amount corresponding to the elongation delay. When initiation and termination are relatively fast, the distribution of elongation times can be approximated by a Gaussian. A convolution of this Gaussian with the initiation and termination time distributions gives another analytic approximation to the transcription time distribution. If there are long pauses during elongation, because of the modularity of the family of models considered, the elongation phase can be partitioned into reactions generating a simple delay (elongation through regions where there are no long pauses), and reactions whose distribution of waiting times must be considered explicitly (initiation, termination, and motion through regions where long pauses are likely). In these cases, the distribution of transcription times again involves a nontrivial part and a shift due to fast elongation processes.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6225-6262"},"PeriodicalIF":2.6,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feedback stabilization and observer design for sterile insect technique models. 昆虫不育技术模型的反馈稳定和观测器设计
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-13 DOI: 10.3934/mbe.2024274
Kala Agbo Bidi

This paper focuses on the feedback global stabilization and observer construction for a sterile insect technique model. The sterile insect technique (SIT) is one of the most ecological methods for controlling insect pests responsible for worldwide crop destruction and disease transmission. In this work, we construct a feedback law that globally asymptotically stabilizes an SIT model at extinction equilibrium. Since the application of this type of control requires the measurement of different states of the target insect population, and, in practice, some states are more difficult or more expensive to measure than others, it is important to know how to construct a state estimator, which from a few well-chosen measured states, estimates the other ones, as the one we build in the second part of our work. In the last part of our work, we show that we can apply the feedback control with estimated states to stabilize the full system.

本文重点研究昆虫不育技术模型的反馈全局稳定和观测器构建。昆虫不育技术(SIT)是控制造成全球作物破坏和疾病传播的害虫的最生态方法之一。在这项研究中,我们构建了一种反馈定律,它能使昆虫不育技术模型在全局上渐近地稳定在灭绝平衡状态。由于应用这种控制方法需要测量目标昆虫种群的不同状态,而在实践中,有些状态比其他状态更难测量或测量成本更高,因此了解如何构建一种状态估计器非常重要,这种估计器可以从少数几个精心选择的测量状态中估计出其他状态,正如我们在工作的第二部分中所构建的那样。在工作的最后一部分,我们将展示如何利用估计状态的反馈控制来稳定整个系统。
{"title":"Feedback stabilization and observer design for sterile insect technique models.","authors":"Kala Agbo Bidi","doi":"10.3934/mbe.2024274","DOIUrl":"https://doi.org/10.3934/mbe.2024274","url":null,"abstract":"<p><p>This paper focuses on the feedback global stabilization and observer construction for a sterile insect technique model. The sterile insect technique (SIT) is one of the most ecological methods for controlling insect pests responsible for worldwide crop destruction and disease transmission. In this work, we construct a feedback law that globally asymptotically stabilizes an SIT model at extinction equilibrium. Since the application of this type of control requires the measurement of different states of the target insect population, and, in practice, some states are more difficult or more expensive to measure than others, it is important to know how to construct a state estimator, which from a few well-chosen measured states, estimates the other ones, as the one we build in the second part of our work. In the last part of our work, we show that we can apply the feedback control with estimated states to stabilize the full system.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6263-6288"},"PeriodicalIF":2.6,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image data augmentation techniques based on deep learning: A survey. 基于深度学习的图像数据增强技术:调查。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-12 DOI: 10.3934/mbe.2024272
Wu Zeng

In recent years, deep learning (DL) techniques have achieved remarkable success in various fields of computer vision. This progress was attributed to the vast amounts of data utilized to train these models, as they facilitated the learning of more intricate and detailed feature information about target objects, leading to improved model performance. However, in most real-world tasks, it was challenging to gather sufficient data for model training. Insufficient datasets often resulted in models prone to overfitting. To address this issue and enhance model performance, generalization ability, and mitigate overfitting in data-limited scenarios, image data augmentation methods have been proposed. These methods generated synthetic samples to augment the original dataset, emerging as a preferred strategy to boost model performance when data was scarce. This review first introduced commonly used and highly effective image data augmentation techniques, along with a detailed analysis of their advantages and disadvantages. Second, this review presented several datasets frequently employed for evaluating the performance of image data augmentation methods and examined how advanced augmentation techniques can enhance model performance. Third, this review discussed the applications and performance of data augmentation techniques in various computer vision domains. Finally, this review provided an outlook on potential future research directions for image data augmentation methods.

近年来,深度学习(DL)技术在计算机视觉的各个领域都取得了令人瞩目的成就。这一进步归功于用于训练这些模型的海量数据,因为它们有助于学习目标对象更复杂、更详细的特征信息,从而提高模型性能。然而,在现实世界的大多数任务中,收集足够的数据进行模型训练是一项挑战。数据集不足往往导致模型容易出现过拟合。为了解决这一问题,并在数据有限的情况下提高模型性能、泛化能力和减轻过拟合,人们提出了图像数据增强方法。这些方法生成合成样本来增强原始数据集,成为数据稀缺时提高模型性能的首选策略。本综述首先介绍了常用的高效图像数据增强技术,并详细分析了这些技术的优缺点。其次,本综述介绍了常用于评估图像数据增强方法性能的几个数据集,并探讨了先进的增强技术如何提高模型性能。第三,本综述讨论了数据增强技术在不同计算机视觉领域的应用和性能。最后,本综述对图像数据增强方法未来的潜在研究方向进行了展望。
{"title":"Image data augmentation techniques based on deep learning: A survey.","authors":"Wu Zeng","doi":"10.3934/mbe.2024272","DOIUrl":"https://doi.org/10.3934/mbe.2024272","url":null,"abstract":"<p><p>In recent years, deep learning (DL) techniques have achieved remarkable success in various fields of computer vision. This progress was attributed to the vast amounts of data utilized to train these models, as they facilitated the learning of more intricate and detailed feature information about target objects, leading to improved model performance. However, in most real-world tasks, it was challenging to gather sufficient data for model training. Insufficient datasets often resulted in models prone to overfitting. To address this issue and enhance model performance, generalization ability, and mitigate overfitting in data-limited scenarios, image data augmentation methods have been proposed. These methods generated synthetic samples to augment the original dataset, emerging as a preferred strategy to boost model performance when data was scarce. This review first introduced commonly used and highly effective image data augmentation techniques, along with a detailed analysis of their advantages and disadvantages. Second, this review presented several datasets frequently employed for evaluating the performance of image data augmentation methods and examined how advanced augmentation techniques can enhance model performance. Third, this review discussed the applications and performance of data augmentation techniques in various computer vision domains. Finally, this review provided an outlook on potential future research directions for image data augmentation methods.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6190-6224"},"PeriodicalIF":2.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain. 基于代理重加密和区块链的防冒名攻击电子健康记录共享方案。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-03 DOI: 10.3934/mbe.2024271
Jiayuan Zhang, Rongxin Guo, Yifan Shi, Wanting Tang

Many current electronic medical record (EMR) sharing schemes that use proxy re-encryption and blockchain do not fully consider the potential threat of malicious node impersonation attacks. This oversight could lead to data leakage as attackers masquerade as legitimate users or proxy nodes during the sharing process. To deal with this problem, we propose an EMR sharing scheme based on proxy re-encryption and blockchain to protect against impersonation attacks. First, we prevent the potential threat of impersonation attacks by generating a shared temporary key and assigning tasks to multiple proxy nodes. Second, we use a random function to ensure that the selection of encrypted proxy nodes is fair. Third, we use a combination of blockchain and the InterPlanetary File System to solve the problem of insufficient storage capacity of shared processes and ensure the storage security of EMRs. Through the security proof, our scheme guarantees anti-impersonation, anti-collusion, and anti-chosen plaintext attack capability in the sharing process of EMRs. Additionally, experiments on the blockchain platform, namely Chain33, show that our scheme significantly increases efficiency.

目前许多使用代理重加密和区块链的电子病历(EMR)共享方案都没有充分考虑恶意节点冒充攻击的潜在威胁。这种疏忽可能会导致数据泄漏,因为攻击者会在共享过程中伪装成合法用户或代理节点。针对这一问题,我们提出了一种基于代理重加密和区块链的 EMR 共享方案,以防范冒充攻击。首先,我们通过生成共享临时密钥并将任务分配给多个代理节点来防止潜在的冒充攻击威胁。其次,我们使用随机函数确保加密代理节点的选择是公平的。第三,我们采用区块链和星际文件系统(InterPlanetary File System)相结合的方式,解决共享进程存储容量不足的问题,确保 EMR 的存储安全。通过安全证明,我们的方案保证了 EMR 共享过程中的反冒名、反串联和反选择明文攻击能力。此外,在区块链平台(即 Chain33)上的实验表明,我们的方案显著提高了效率。
{"title":"An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain.","authors":"Jiayuan Zhang, Rongxin Guo, Yifan Shi, Wanting Tang","doi":"10.3934/mbe.2024271","DOIUrl":"https://doi.org/10.3934/mbe.2024271","url":null,"abstract":"<p><p>Many current electronic medical record (EMR) sharing schemes that use proxy re-encryption and blockchain do not fully consider the potential threat of malicious node impersonation attacks. This oversight could lead to data leakage as attackers masquerade as legitimate users or proxy nodes during the sharing process. To deal with this problem, we propose an EMR sharing scheme based on proxy re-encryption and blockchain to protect against impersonation attacks. First, we prevent the potential threat of impersonation attacks by generating a shared temporary key and assigning tasks to multiple proxy nodes. Second, we use a random function to ensure that the selection of encrypted proxy nodes is fair. Third, we use a combination of blockchain and the InterPlanetary File System to solve the problem of insufficient storage capacity of shared processes and ensure the storage security of EMRs. Through the security proof, our scheme guarantees anti-impersonation, anti-collusion, and anti-chosen plaintext attack capability in the sharing process of EMRs. Additionally, experiments on the blockchain platform, namely Chain33, show that our scheme significantly increases efficiency.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 6","pages":"6167-6189"},"PeriodicalIF":2.6,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142037541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the transmission trends of COVID-19: an interpretable machine learning approach based on daily, death, and imported cases. 预测 COVID-19 的传播趋势:基于日常病例、死亡病例和输入病例的可解释机器学习方法。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-06-03 DOI: 10.3934/mbe.2024270
Hyeonjeong Ahn, Hyojung Lee

COVID-19 is caused by the SARS-CoV-2 virus, which has produced variants and increasing concerns about a potential resurgence since the pandemic outbreak in 2019. Predicting infectious disease outbreaks is crucial for effective prevention and control. This study aims to predict the transmission patterns of COVID-19 using machine learning, such as support vector machine, random forest, and XGBoost, using confirmed cases, death cases, and imported cases, respectively. The study categorizes the transmission trends into the three groups: L0 (decrease), L1 (maintain), and L2 (increase). We develop the risk index function to quantify changes in the transmission trends, which is applied to the classification of machine learning. A high accuracy is achieved when estimating the transmission trends for the confirmed cases (91.5-95.5%), death cases (85.6-91.8%), and imported cases (77.7-89.4%). Notably, the confirmed cases exhibit a higher level of accuracy compared to the data on the deaths and imported cases. L2 predictions outperformed L0 and L1 in all cases. Predicting L2 is important because it can lead to new outbreaks. Thus, this robust L2 prediction is crucial for the timely implementation of control policies for the management of transmission dynamics.

COVID-19 由 SARS-CoV-2 病毒引起,自 2019 年大流行爆发以来,该病毒已产生变种,人们越来越担心它可能卷土重来。预测传染病爆发对于有效防控至关重要。本研究旨在利用支持向量机、随机森林和 XGBoost 等机器学习,分别使用确诊病例、死亡病例和输入病例预测 COVID-19 的传播模式。研究将传播趋势分为三组:L0(减少)、L1(保持)和 L2(增加)。我们开发了风险指数函数来量化传播趋势的变化,并将其应用于机器学习的分类。在估计确诊病例(91.5%-95.5%)、死亡病例(85.6%-91.8%)和输入病例(77.7%-89.4%)的传播趋势时,准确率很高。值得注意的是,与死亡病例和输入病例的数据相比,确诊病例的准确率更高。在所有病例中,L2 的预测结果都优于 L0 和 L1。预测 L2 非常重要,因为它可能导致新的疫情爆发。因此,这种稳健的 L2 预测对于及时实施控制政策以管理传播动态至关重要。
{"title":"Predicting the transmission trends of COVID-19: an interpretable machine learning approach based on daily, death, and imported cases.","authors":"Hyeonjeong Ahn, Hyojung Lee","doi":"10.3934/mbe.2024270","DOIUrl":"https://doi.org/10.3934/mbe.2024270","url":null,"abstract":"<p><p>COVID-19 is caused by the SARS-CoV-2 virus, which has produced variants and increasing concerns about a potential resurgence since the pandemic outbreak in 2019. Predicting infectious disease outbreaks is crucial for effective prevention and control. This study aims to predict the transmission patterns of COVID-19 using machine learning, such as support vector machine, random forest, and XGBoost, using confirmed cases, death cases, and imported cases, respectively. The study categorizes the transmission trends into the three groups: L0 (decrease), L1 (maintain), and L2 (increase). We develop the risk index function to quantify changes in the transmission trends, which is applied to the classification of machine learning. A high accuracy is achieved when estimating the transmission trends for the confirmed cases (91.5-95.5%), death cases (85.6-91.8%), and imported cases (77.7-89.4%). Notably, the confirmed cases exhibit a higher level of accuracy compared to the data on the deaths and imported cases. L2 predictions outperformed L0 and L1 in all cases. Predicting L2 is important because it can lead to new outbreaks. Thus, this robust L2 prediction is crucial for the timely implementation of control policies for the management of transmission dynamics.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 5","pages":"6150-6166"},"PeriodicalIF":2.6,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141318840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The switch point algorithm applied to a harvesting problem. 转换点算法应用于收割问题。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-05-30 DOI: 10.3934/mbe.2024269
Summer Atkins, William W Hager, Maia Martcheva

In this paper, we investigate an optimal harvesting problem of a spatially explicit fishery model that was previously analyzed. On the surface, this problem looks innocent, but if parameters are set to where a singular arc occurs, two complex questions arise. The first question pertains to Fuller's phenomenon (or chattering), a phenomenon in which the optimal control possesses a singular arc that cannot be concatenated with the bang-bang arcs without prompting infinite oscillations over a finite region. 1) How do we numerically assess whether or not a problem chatters in cases when we cannot analytically prove such a phenomenon? The second question focuses on implementation of an optimal control. 2) When an optimal control has regions that are difficult to implement, how can we find alternative strategies that are both suboptimal and realistic to use? Although the former question does not apply to all optimal harvesting problems, most fishery managers should be concerned about the latter. Interestingly, for this specific problem, our techniques for answering the first question results in an answer to the the second. Our methods involve using an extended version of the switch point algorithm (SPA), which handles control problems having initial and terminal conditions on the states. In our numerical experiments, we obtain strong empirical evidence that the harvesting problem chatters, and we find three alternative harvesting strategies with fewer switches that are realistic to implement and near optimal.

在本文中,我们研究了之前分析过的一个空间显式渔业模型的最优捕捞问题。表面上看,这个问题很简单,但如果参数设置到出现奇异弧线的位置,就会出现两个复杂的问题。第一个问题涉及富勒现象(或喋喋不休),在这种现象中,最优控制具有奇异弧线,该弧线不能与砰砰弧线串联,否则会在有限区域内引发无限振荡。1) 在无法用分析方法证明这种现象的情况下,我们如何用数值方法评估问题是否会颤振?第二个问题的重点是最优控制的实现。2) 当最优控制存在难以实施的区域时,我们如何找到既是次优策略又符合实际情况的替代策略?虽然前一个问题并不适用于所有最优捕捞问题,但大多数渔业管理者都应该关注后一个问题。有趣的是,对于这个具体问题,我们回答第一个问题的技术可以回答第二个问题。我们的方法涉及使用扩展版的开关点算法(SPA),该算法可处理对状态具有初始和终端条件的控制问题。在我们的数值实验中,我们获得了收割问题喋喋不休的有力经验证据,并找到了三种开关较少的替代收割策略,这些策略既易于实现,又接近最优。
{"title":"The switch point algorithm applied to a harvesting problem.","authors":"Summer Atkins, William W Hager, Maia Martcheva","doi":"10.3934/mbe.2024269","DOIUrl":"https://doi.org/10.3934/mbe.2024269","url":null,"abstract":"<p><p>In this paper, we investigate an optimal harvesting problem of a spatially explicit fishery model that was previously analyzed. On the surface, this problem looks innocent, but if parameters are set to where a singular arc occurs, two complex questions arise. The first question pertains to Fuller's phenomenon (or chattering), a phenomenon in which the optimal control possesses a singular arc that cannot be concatenated with the bang-bang arcs without prompting infinite oscillations over a finite region. 1) How do we numerically assess whether or not a problem chatters in cases when we cannot analytically prove such a phenomenon? The second question focuses on implementation of an optimal control. 2) When an optimal control has regions that are difficult to implement, how can we find alternative strategies that are both suboptimal and realistic to use? Although the former question does not apply to all optimal harvesting problems, most fishery managers should be concerned about the latter. Interestingly, for this specific problem, our techniques for answering the first question results in an answer to the the second. Our methods involve using an extended version of the switch point algorithm (SPA), which handles control problems having initial and terminal conditions on the states. In our numerical experiments, we obtain strong empirical evidence that the harvesting problem chatters, and we find three alternative harvesting strategies with fewer switches that are realistic to implement and near optimal.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 5","pages":"6123-6149"},"PeriodicalIF":2.6,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141318843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite-time passivity of neutral-type complex-valued neural networks with time-varying delays. 具有时变延迟的中性复值神经网络的有限时间被动性。
IF 2.6 4区 工程技术 Q1 Mathematics Pub Date : 2024-05-28 DOI: 10.3934/mbe.2024268
Haydar Akca, Chaouki Aouiti, Farid Touati, Changjin Xu

In this work, we investigated the finite-time passivity problem of neutral-type complex-valued neural networks with time-varying delays. On the basis of the Lyapunov functional, Wirtinger-type inequality technique, and linear matrix inequalities (LMIs) approach, new sufficient conditions were derived to ensure the finite-time boundedness (FTB) and finite-time passivity (FTP) of the concerned network model. At last, two numerical examples with simulations were presented to demonstrate the validity of our criteria.

在这项工作中,我们研究了具有时变延迟的中性复值神经网络的有限时间被动性问题。在 Lyapunov 函数、Wirtinger 型不等式技术和线性矩阵不等式(LMI)方法的基础上,推导出了新的充分条件,以确保相关网络模型的有限时间约束性(FTB)和有限时间被动性(FTP)。最后,通过两个数值模拟实例证明了我们的标准的有效性。
{"title":"Finite-time passivity of neutral-type complex-valued neural networks with time-varying delays.","authors":"Haydar Akca, Chaouki Aouiti, Farid Touati, Changjin Xu","doi":"10.3934/mbe.2024268","DOIUrl":"https://doi.org/10.3934/mbe.2024268","url":null,"abstract":"<p><p>In this work, we investigated the finite-time passivity problem of neutral-type complex-valued neural networks with time-varying delays. On the basis of the Lyapunov functional, Wirtinger-type inequality technique, and linear matrix inequalities (LMIs) approach, new sufficient conditions were derived to ensure the finite-time boundedness (FTB) and finite-time passivity (FTP) of the concerned network model. At last, two numerical examples with simulations were presented to demonstrate the validity of our criteria.</p>","PeriodicalId":49870,"journal":{"name":"Mathematical Biosciences and Engineering","volume":"21 5","pages":"6097-6122"},"PeriodicalIF":2.6,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141318836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Mathematical Biosciences and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1