Earphone-type wearable devices, also known as "hearables,"will have many functions in the future. Some of those functions will require authentication of the wearer for access to the user's privacy inform...
详细信息
Autonomous vehicles increasingly rely on accurate three-dimensional (3D) object detection for safe navigation. While two-dimensional (2D) methods offer computational efficiency, the shift to 3D detection enhances prec...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
With the rapid development of mobile communicationtechnology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communicationtechnology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
Despite the rapid expansion of the ICT sector, there's a disconnect with STEM subjects, leading to high dropout rates in computerscience and engineering programs. This contributes to many unfilled positions in th...
详细信息
To advance the educational quality of C programming, we have proposed and implemented the C Programming Learning Assistant System (CPLAS) as a Web application system. CPLAS offers a Code Writing Problem (CWP) that req...
详细信息
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseas...
详细信息
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseases can have severe consequences and spread,especially among *** detection is crucial to prevent their spread and improve a patient’s chances of ***,the branch of medicine dealing with skin diseases,faces challenges in accurately diagnosing these conditions due to the difficulty in identifying and distinguishing between different diseases based on their appearance,type of skin,and *** study presents a method for detecting skin diseases using Deep Learning(DL),focusing on the most common diseases affecting children in Saudi Arabia due to the high UV value in most of the year,especially in the *** method utilizes various Convolutional Neural Network(CNN)architectures to classify skin conditions such as eczema,psoriasis,and *** proposed method demonstrates high accuracy rates of 99.99%and 97%using famous and effective transfer learning models MobileNet and DenseNet121,*** illustrates the potential of DL in automating the detection of skin diseases and offers a promising approach for early diagnosis and treatment.
Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate *** learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier ...
详细信息
Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate *** learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier algorithms to identify CKD *** study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California,UC Irvine Machine Learning *** research introduces TrioNet,an ensemble model combining extreme gradient boosting,random forest,and extra tree classifier,which excels in providing highly accurate predictions for ***,K nearest neighbor(KNN)imputer is utilized to deal withmissing values while synthetic minority oversampling(SMOTE)is used for class-imbalance *** ascertain the efficacy of the proposed model,a comprehensive comparative analysis is conducted with various machine learning *** proposed TrioNet using KNN imputer and SMOTE outperformed other models with 98.97%accuracy for *** in-depth analysis demonstrates the model’s capabilities and underscores its potential as a valuable tool in the diagnosis of CKD.
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr...
详细信息
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercriminal *** Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid *** when it comes to security,it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better *** applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard(AES)algorithm to construct their main security *** this paper,a new modification for the original Twofish algorithm is proposed to strengthen its security and to take advantage of its fast *** new algorithm has been named Split-n-Swap(SnS).Performance analysis of the new modification algorithm has been performed using different measurement *** experimental results show that the complexity of the SnS algorithm exceeds that of the original Twofish algorithm while maintaining reasonable values for encryption and decryption times as well as memory utilization.A detailed analysis is given with the strength and limitation aspects of the proposed algorithm.
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key...
详细信息
暂无评论