Breadcrumb
Comparative evaluation of multiomics integration tools for the study of prediabetes: insights into the earliest stages of type 2 diabetes mellitus
Type 2 diabetes mellitus (T2D) remains a critical health concern, particularly in its early disease stages such as prediabetes. Understanding these early stages is paramount for improving patient outcomes. Multiomics data integration tools offer promise in unraveling the underlying mechanisms of T2D. The advent of high-throughput technology and the increasing availability of multiomics data has led to the development of several statistical and network-based integration methods. However, the performance of such methods varies, requiring their output evaluation in an unbiased manner. Here, we
Active Directory Attacks—Steps, Types, and Signatures
Active Directory Domain is a Microsoft service that allows and facilitates the centralized administration of all workstations and servers in any environment. Due to the wide use and adoption of this service, it has become a target for many attackers. Active Directory attacks have evolved through years. The attacks target different functions and features provided by Active Directory. In this paper, we provide insights on the criticality, impact, and detection of Active Directory attacks. We review the different Active Directory attacks. We introduce the steps of the Active Directory attack and
Rough Sets Hybridization with Mayfly Optimization for Dimensionality Reduction
Big data is a vast amount of structured and unstructured data that must be dealt with on a regular basis. Dimensionality reduction is the process of converting a huge set of data into data with tiny dimensions so that equal information may be expressed easily. These tactics are frequently utilized to improve classification or regression challenges while dealing with machine learning issues. To achieve dimensionality reduction for huge data sets, this paper offers a hybrid particle swarm optimization-rough set PSO-RS and Mayfly algorithm-rough set MA-RS. A novel hybrid strategy based on the
Dual-Level Sensor Selection with Adaptive Sensor Recovery to Extend WSNs’ Lifetime
Wireless sensor networks (WSNs) have garnered much attention in the last decades. Nowadays, the network contains sensors that have been expanded into a more extensive network than the internet. Cost is one of the issues of WSNs, and this cost may be in the form of bandwidth, computational cost, deployment cost, or sensors’ battery (sensor life). This paper proposes a dual-level sensor selection (DLSS) model used to reduce the number of sensors forming WSNs. The sensor reduction process is performed at two consecutive levels. First, a combination of the Fisher score method and ANOVA test at the
Oral Dental Diagnosis Using Deep Learning Techniques: A Review
The purpose of this study is to investigate the gradual incorporation of deep learning in the dental healthcare system, offering an easy and efficient diagnosis. For that, an electronic search was conducted in the Institute of Electrical and Electronics Engineers (IEEE) Xplore, ScienceDirect, Journal of Dentistry, Health Informatics Journal, and other credible resources. The studies varied with their tools and techniques used for the diagnosis while coping with the rapid deep-learning evolving base, with different types of conducting tools and analysis for the data. An inclusion criterion was
Generalisability of fetal ultrasound deep learning models to low-resource imaging settings in five African countries
Most artificial intelligence (AI) research and innovations have concentrated in high-income countries, where imaging data, IT infrastructures and clinical expertise are plentiful. However, slower progress has been made in limited-resource environments where medical imaging is needed. For example, in Sub-Saharan Africa, the rate of perinatal mortality is very high due to limited access to antenatal screening. In these countries, AI models could be implemented to help clinicians acquire fetal ultrasound planes for the diagnosis of fetal abnormalities. So far, deep learning models have been
A Machine Learning-Based Intrusion Detection System for IoT Electric Vehicle Charging Stations (EVCSs)
The demand for electric vehicles (EVs) is growing rapidly. This requires an ecosystem that meets the user’s needs while preserving security. The rich data obtained from electric vehicle stations are powered by the Internet of Things (IoT) ecosystem. This is achieved through us of electric vehicle charging station management systems (EVCSMSs). However, the risks associated with cyber-attacks on IoT systems are also increasing at the same pace. To help in finding malicious traffic, intrusion detection systems (IDSs) play a vital role in traditional IT systems. This paper proposes a classifier
Ad-hoc Networks Performance based on Routing Protocol Type
There are many situations where there is a need for certain devices to be connected in a network independently without having a heavy infrastructure or human interventions to configure and connect them. This type of network is called ad-hoc networks. The key concern with such networks is how nodes communicate with each other and exchange information efficiently and securely. The issue with ad hoc networks is that traditional routing protocols are not suitable for such networks. In this paper, the performance of specific routing protocols for ad hoc networks will be evaluated. © 2022 IEEE.
Author Correction: Generalisability of fetal ultrasound deep learning models to low-resource imaging settings in five African countries (Scientific Reports, (2023), 13, 1, (2728), 10.1038/s41598-023-29490-3)
The Funding section in the original version of this Article was incomplete. “This work received funding from the European Union’s 2020 research and innovation programme under Grant Agreement No. 825903 (euCanSHare project), as well as from the Spanish Ministry of Science, Innovation and Universities under grant agreement RTI2018-099898-B-I00. Additionally, the research leading to these results has received funding from Cerebra Foundation for the Brain Injured Child (Carmarthen, Wales, UK).” now reads: “This work received funding from the European Union’s 2020 research and innovation programme
Keyed Watermarks: A Fine-grained Tracking of Event-time in Apache Flink
Big Data Stream processing engines such as Apache Flink use windowing techniques to handle unbounded streams of events. Gathering all pertinent input within a window is crucial for event-time windowing since it affects how accurate results are. A significant part of this process is played by watermarks, which are unique timestamps that show the passage of events in time. However, the current watermark generation method in Apache Flink, which works at the level of the input stream, tends to favor faster sub-streams, resulting in dropped events from slower sub-streams. In our analysis, we found
Pagination
- Previous page ‹‹
- Page 19
- Next page ››