5,707 results match your criteria: "School of Computer Science and Engineering[Affiliation]"

The most prevalent form of malignant tumors that originate in the brain are known as gliomas. In order to diagnose, treat, and identify risk factors, it is crucial to have precise and resilient segmentation of the tumors, along with an estimation of the patients' overall survival rate. Therefore, we have introduced a deep learning approach that employs a combination of MRI scans to accurately segment brain tumors and predict survival in patients with gliomas.

View Article and Find Full Text PDF

The accurate identification of protein-nucleotide binding residues is crucial for protein function annotation and drug discovery. Numerous computational methods have been proposed to predict these binding residues, achieving remarkable performance. However, due to the limited availability and high variability of nucleotides, predicting binding residues for diverse nucleotides remains a significant challenge.

View Article and Find Full Text PDF

In recent years, the healthcare data system has expanded rapidly, allowing for the identification of important health trends and facilitating targeted preventative care. Heart disease remains a leading cause of death in developed countries, often leading to consequential outcomes such as dementia, which can be mitigated through early detection and treatment of cardiovascular issues. Continued research into preventing strokes and heart attacks is crucial.

View Article and Find Full Text PDF

Artificial intelligence (AI) is a subfield of computer science with the goal of creating intelligent machines (1) Machine learning is a branch of artificial intelligence. In machine learning a datasets are used for training diagnostic algorithms. This review comprehensively explains the applications of AI in the diagnosis in paediatric dentistry.

View Article and Find Full Text PDF

Improving Generalizability of Drug-Target Binding Prediction by Pre-trained Multi-view Molecular Representations.

Bioinformatics

January 2025

School of Information Science and Technology, Institute of Computational Biology, Northeast Normal University, Changchun, 130117, Jilin China.

Motivation: Most drugs start on their journey inside the body by binding the right target proteins. This is the reason that numerous efforts have been devoted to predicting the drug-target binding during drug development. However, the inherent diversity among molecular properties, coupled with limited training data availability, poses challenges to the accuracy and generalizability of these methods beyond their training domain.

View Article and Find Full Text PDF

The 3D structure of RNA critically influences its functionality, and understanding this structure is vital for deciphering RNA biology. Experimental methods for determining RNA structures are labour-intensive, expensive, and time-consuming. Computational approaches have emerged as valuable tools, leveraging physics-based-principles and machine learning to predict RNA structures rapidly.

View Article and Find Full Text PDF

The rapid urbanization has led to the loss of natural spaces and a subsequent disconnection between humans and nature, negatively affecting residents' well-being and environmental awareness. There is a a growing interest in leveraging technology to address this gap in Human-Computer Interaction. This article introduces GoChirp, an AI-powered wearable device for enhancing nature relatedness within urban landscapes.

View Article and Find Full Text PDF

Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET.

Sensors (Basel)

December 2024

Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea.

In this paper, we propose a Proof-of-Location (PoL)-based location verification scheme for mitigating Sybil attacks in vehicular ad hoc networks (VANETs). For this purpose, we employ smart contracts for storing the location information of the vehicles. This smart contract is maintained by Road Side Units (RSUs) and acts as a ground truth for verifying the position information of the neighboring vehicles.

View Article and Find Full Text PDF

Frequent user data breaches and misuse incidents highlight the flaws in current identity management systems. This study proposes a blockchain-based, peer-supervised self-sovereign identity (SSI) generation and privacy protection technology. Our approach creates unique digital identities on the blockchain, enabling secure cross-domain recognition and data sharing and satisfying the essential users' requirements for SSI.

View Article and Find Full Text PDF

Cloud-edge-end computing architecture is crucial for large-scale edge data processing and analysis. However, the diversity of terminal nodes and task complexity in this architecture often result in non-independent and identically distributed (non-IID) data, making it challenging to balance data heterogeneity and privacy protection. To address this, we propose a privacy-preserving federated learning method based on cloud-edge-end collaboration.

View Article and Find Full Text PDF

Natural disasters cause significant losses. Unmanned aerial vehicles (UAVs) are valuable in rescue missions but need to offload tasks to edge servers due to their limited computing power and battery life. This study proposes a task offloading decision algorithm called the multi-agent deep deterministic policy gradient with cooperation and experience replay (CER-MADDPG), which is based on multi-agent reinforcement learning for UAV computation offloading.

View Article and Find Full Text PDF

This study presents a novel algorithm for protocol reverse analysis of EtherCAT. The algorithm combines sequence alignment and the Pearson correlation coefficient. We utilize value distribution statistics and the bit flip rate algorithm to effectively partition the protocol fields.

View Article and Find Full Text PDF

Enhanced Localization in Wireless Sensor Networks Using a Bat-Optimized Malicious Anchor Node Prediction Algorithm.

Sensors (Basel)

December 2024

Power Electronics, Machines and Control (PEMC) Research Institute, University of Nottingham, 15 Triumph Rd, Lenton, Nottingham NG7 2GT, UK.

The accuracy of node localization plays a crucial role in the performance and reliability of wireless sensor networks (WSNs), which are widely utilized in fields like security systems and environmental monitoring. The integrity of these networks is often threatened by the presence of malicious nodes that can disrupt the localization process, leading to erroneous positioning and degraded network functionality. To address this challenge, we propose the security-aware localization using bat-optimized malicious anchor prediction (BO-MAP) algorithm.

View Article and Find Full Text PDF

This study proposes a new hybrid machine learning (ML) model for the early and accurate diagnosis of heart disease. The proposed model is a combination of two powerful ensemble ML models, namely ExtraTreeClassifier (ETC) and XGBoost (XGB), resulting in a hybrid model named ETCXGB. At first, all the features of the utilized heart disease dataset were given as input to the ETC model, which processed it by extracting the predicted probabilities and produced an output.

View Article and Find Full Text PDF

Introduction: Cotton, being a crucial cash crop globally, faces significant challenges due to multiple diseases that adversely affect its quality and yield. To identify such diseases is very important for the implementation of effective management strategies for sustainable agriculture. Image recognition plays an important role for the timely and accurate identification of diseases in cotton plants as it allows farmers to implement effective interventions and optimize resource allocation.

View Article and Find Full Text PDF

SegRap2023: A benchmark of organs-at-risk and gross tumor volume Segmentation for Radiotherapy Planning of Nasopharyngeal Carcinoma.

Med Image Anal

January 2025

School of Mechanical and Electrical Engineering, University of Electronic Science and Technology of China, Chengdu, China; Shanghai Artificial Intelligence Laboratory, Shanghai, China. Electronic address:

Radiation therapy is a primary and effective treatment strategy for NasoPharyngeal Carcinoma (NPC). The precise delineation of Gross Tumor Volumes (GTVs) and Organs-At-Risk (OARs) is crucial in radiation treatment, directly impacting patient prognosis. Despite that deep learning has achieved remarkable performance on various medical image segmentation tasks, its performance on OARs and GTVs of NPC is still limited, and high-quality benchmark datasets on this task are highly desirable for model development and evaluation.

View Article and Find Full Text PDF

Motif-aware curriculum learning for node classification.

Neural Netw

December 2024

School of Mathematics (Zhuhai), Sun Yat-sen University, Zhuhai 519082, China. Electronic address:

Node classification, seeking to predict the categories of unlabeled nodes, is a crucial task in graph learning. One of the most popular methods for node classification is currently Graph Neural Networks (GNNs). However, conventional GNNs assign equal importance to all training nodes, which can lead to a reduction in accuracy and robustness due to the influence of complex nodes information.

View Article and Find Full Text PDF

Cognitive load stimulates neural activity, essential for understanding the brain's response to stress-inducing stimuli or mental strain. This study examines the feasibility of evaluating cognitive load by extracting, selection, and classifying features from electroencephalogram (EEG) signals. We employed robust local mean decomposition (R-LMD) to decompose EEG data from each channel, recorded over a four-second period, into five modes.

View Article and Find Full Text PDF

Mobile Ad Hoc Networks (MANETs) are increasingly replacing conventional communication systems due to their decentralized and dynamic nature. However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. This study presents a novel hybrid deep learning approach integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) architectures to effectively detect and mitigate flooding attacks in MANETs.

View Article and Find Full Text PDF

Steganography is used to hide sensitive types of data including images, audio, text, and videos in an invisible way so that no one can detect it. Image-based steganography is a technique that uses images as a cover media for hiding and transmitting sensitive information over the internet. However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc.

View Article and Find Full Text PDF

Wireless sensor networks (WSNs) are imperative to a huge range of packages, along with environmental monitoring, healthcare structures, army surveillance, and smart infrastructure, however they're faced with numerous demanding situations that impede their functionality, including confined strength sources, routing inefficiencies, security vulnerabilities, excessive latency, and the important requirement to keep Quality of Service (QoS). Conventional strategies generally goal particular troubles, like strength optimization or improving QoS, frequently failing to provide a holistic answer that effectively balances more than one crucial elements concurrently. To deal with those challenges, we advocate a novel routing framework that is both steady and power-efficient, leveraging an Improved Type-2 Fuzzy Logic System (IT2FLS) optimized by means of the Reptile Search Algorithm (RSA).

View Article and Find Full Text PDF

Enhancing IoT security in smart grids with quantum-resistant hybrid encryption.

Sci Rep

January 2025

Faculty of Mechanical and Electrical Engineering, Quzhou College of Technology, Quzhou, 324000, Zhejiang, China.

Integrating the Internet of Things (IoT) in smart grids has revolutionized the energy sector, enabling real-time data collection and efficient energy distribution. However, this integration also introduces significant security challenges, particularly data encryption. Traditional encryption algorithms used in IoT are vulnerable to various attacks, and the advent of quantum computing exacerbates these vulnerabilities.

View Article and Find Full Text PDF
Article Synopsis
  • This study introduces a new Bayesian method for identifying structural damage using a technique called Improved Elemental Modal Strain Energy Ratio (IEMSER) to create a more focused prior distribution.
  • The approach uses measured frequencies and mode shapes to develop the IEMSER indicator, which informs damage assessment and guides the Markov Chain Monte Carlo (MCMC) sampling to find accurate damage estimates.
  • Results from numerical tests on a steel truss bridge and modal data from an 18-story frame structure demonstrate that this method enhances the accuracy of damage identification by effectively utilizing prior information.
View Article and Find Full Text PDF

Machine learning offers a promising avenue for expediting the discovery of new compounds by accurately predicting their thermodynamic stability. This approach provides significant advantages in terms of time and resource efficiency compared to traditional experimental and modeling methods. However, most existing models are constructed based on specific domain knowledge, potentially introducing biases that impact their performance.

View Article and Find Full Text PDF

Computational methods for predicting protein function are of great significance in understanding biological mechanisms and treating complex diseases. However, existing computational approaches of protein function prediction lack interpretability, making it difficult to understand the relations between protein structures and functions. In this study, we propose a deep learning-based solution, named DPFunc, for accurate protein function prediction with domain-guided structure information.

View Article and Find Full Text PDF