Non-coding RNAs(ncRNAs)participate in multiple biological processes associated with cancers as tumor suppressors or oncogenic *** to their high stability in plasma,urine,and many other fluids,ncRNAs have the potential...
详细信息
Non-coding RNAs(ncRNAs)participate in multiple biological processes associated with cancers as tumor suppressors or oncogenic *** to their high stability in plasma,urine,and many other fluids,ncRNAs have the potential to serve as key biomarkers for early diagnosis and screening of *** cancer progression,tumor heterogeneity plays a crucial role,and it is particularly important to understand the gene expression patterns of individual *** the development of single-cell RNA sequencing(scRNA-seq)technologies,uncovering gene expression in different cell types for human cancers has become feasible by profiling transcriptomes at the cellular ***,a well-organized and comprehensive online resource that provides access to the expression of genes corresponding to ncRNA biomarkers in different cell types at the single-cell level is not available ***,we developed the SCancerRNA database to summarize experimentally supported data on long ncRNA,microRNA,PIWI-interacting RNA,small nucleolar RNA,and circular RNA biomarkers,as well as data on their differential expression at the cellular ***,we collected biological functions and clinical applications of biomarkers to facilitate the application of ncRNA biomarkers to cancer diagnosis,as well as the monitoring of progression and targeted *** also allows users to explore interaction networks of different types of ncRNAs,and build computational models in the *** is freely accessible at http://***/BioMarker.
Fog computing has the capability to perform tasks in the local distributed environment within the expected time period. The approaches used for managing the faults in a fog computing environment are not competent to r...
详细信息
In this day and age of online and digital transactions, credit cards have come up as a popular option of payment. This has led to the increase in the fraudulent credit card transactions and as a result the banks and t...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,*** recent times,these systems have suffered from cyber attacks numer-ous *** have been developing cyber security solutions for Cls to avoid lasting *** to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these *** of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the ***,anomaly detection in physical dynamics proves an effective means to implement *** is one example of anomaly detection in the sensor/actuator data,representing such systems physical *** present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to *** method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions *** validate EPASAD using the dataset produced by the TE-process simulator and the C-town *** results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively.
A trend toward the use of digital platforms for product marketing and profit margin enhancement is evident in the contemporary corporate environment. As a result, using deep learning methods to evaluate consumer senti...
详细信息
In Intelligent Transportation Systems(ITS),controlling the trafficflow of a region in a city is the major ***,allocation of the traffic-free route to the taxi drivers during peak hours is one of the challenges to control...
详细信息
In Intelligent Transportation Systems(ITS),controlling the trafficflow of a region in a city is the major ***,allocation of the traffic-free route to the taxi drivers during peak hours is one of the challenges to control the trafficfl***,in this paper,the route between the taxi driver and pickup location or hotspot with the spatial-temporal dependencies is ***,the hotspots in a region are clustered using the density-based spatial clustering of applications with noise(DBSCAN)algorithm tofind the hot spots at the peak hours in an urban ***,the optimal route is allocated to the taxi driver to pick up the customer in the *** allocating the optimal route,each route between the taxi driver and the hot spot is mapped to the number of taxi *** the map function,the optimal map is selected using the rain opti-mization algorithm(ROA).If more than one map function is obtained as the opti-mal solution,the map between the route and the taxi driver who has done the least number of trips in the day is chosen as thefinal solution This optimal route selec-tion leads to control of the trafficflow at peak *** of the approach depicts that the proposed trafficflow control scheme reduces traveling time,wait-ing time,fuel consumption,and emission.
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specime...
详细信息
The cross-view matching of local image features is a fundamental task in visual localization and 3D *** study proposes FilterGNN,a transformer-based graph neural network(GNN),aiming to improve the matching efficiency ...
详细信息
The cross-view matching of local image features is a fundamental task in visual localization and 3D *** study proposes FilterGNN,a transformer-based graph neural network(GNN),aiming to improve the matching efficiency and accuracy of visual *** on high matching sparseness and coarse-to-fine covisible area detection,FilterGNN utilizes cascaded optimal graph-matching filter modules to dynamically reject outlier ***,we successfully adapted linear attention in FilterGNN with post-instance normalization support,which significantly reduces the complexity of complete graph learning from O(N2)to O(N).Experiments show that FilterGNN requires only 6%of the time cost and 33.3%of the memory cost compared with SuperGlue under a large-scale input size and achieves a competitive performance in various tasks,such as pose estimation,visual localization,and sparse 3D reconstruction.
Fog computing is considered a derivative of cloud computing that aims to reduce the huge transmission latency and CPU time, as well as the overall cost of resource usage in the cloud. The deployment of Internet-o...
详细信息
Fog computing is considered a derivative of cloud computing that aims to reduce the huge transmission latency and CPU time, as well as the overall cost of resource usage in the cloud. The deployment of Internet-of-Things (IoT) enabled smart systems, which frequently demand real-time processing, is rapidly expanding. Following that, the volume of generated data and computation workload dramatically increased. Fog resources are limited and typically resource constrained. Therefore, it is impossible to execute all tasks at the edge network. To support the increasing amounts of data and computation, cloud computing, associated with significant delays in transmission and processing of workload, is used. The distribution of tasks between the cloud and fog layer and the allocation of layer resources to satisfy the users' demands prevents layer oversaturation, service degradation, and resource failure due to excessive workload is challenging. This paper proposes a layer fit algorithm that evenly distributes tasks between the fog and cloud, based on priority levels. Also, a Modified Harris-Hawks Optimization (MHHO) based meta-heuristic approach is proposed to assign the best available resource to a task within a layer. The key intention of this paper is to reduce the makespan time, task execution cost, and power consumption and enhance resource usage in both the fog and cloud layer. The simulations are performed using the iFogSim simulation toolkit. The proposed layer fit algorithm and the Modified Harris-Hawks Optimization (MHHO) are compared with the traditional Harris-Hawks Optimization (HHO), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), and the Firefly Algorithm (FA). Based on the experimental results, the MHHO has improved the performance of the system in terms of makespan time, execution cost, and energy consumption. The ability of the MHHO to balance the load across resources yields a significant improvement when the number of tasks increases as c
Pervasive computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ...
详细信息
Pervasive computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and surroundings leads to Personal IoT(PIoT).PIoT offers users high levels of personalization,automation,and *** proliferation of PIoT technology has extended into society,social engagement,and the interconnectivity of PIoT objects,resulting in the emergence of the Social Internet of Things(SIoT).The combination of PIoT and SIoT has spurred the need for autonomous learning,comprehension,and understanding of both the physical and social *** research on PIoT is dedicated to enabling seamless communication among devices,striking a balance between observation,sensing,and perceiving the extended physical and social environment,and facilitating information ***,the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence(ASI)in PIoT ***,autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful *** paper provides a comprehensive review of the evolving domains of PIoT,SIoT,and ***,the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID *** study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions,paving the way for further advancements in this transformative field.
暂无评论