Cancer diseases are remaining a leading cause of death in all over the world, this is encouraging the development of advanced diagnostic systems for reliable and accurate detection. The current study investigates the ...
详细信息
Photodynamic therapy (PDT) is a clinically approved cancer treatment that uses energy of light to generate active substances that cause damage to the cancer. Photosensitizers are employed to absorb light and generate ...
详细信息
Photodynamic therapy (PDT) is a clinically approved cancer treatment that uses energy of light to generate active substances that cause damage to the cancer. Photosensitizers are employed to absorb light and generate toxic reactive oxygen species (ROS) to damage biomolecules like DNA. At the same time, some chemotherapy drugs like nucleotide analogues can provide mechanism-guided promotion in the treatment efficacy of PDT. However, the photosensitizer and chemotherapy drugs used in PDT is usually organic molecules, which suffers from bad solubility, fast clearance, and acute toxicity. To achieve targeted treatment, a reasonable delivery system is necessary. Therefore, we reported a metal-phenolic network where IR780 and gemcitabine were coupled chemically to overcome these shortcomings. The enhanced PDT effects can be realized by the promoted cell death both in vitro and in vivo. Moreover, the synergistic therapy also induced T-cell mediated anti-tumor immune response, which was significant for the inhibition of distant tumor growth. This work expanded the biomedical application of metal-phenolic materials and contribute to the wider application of photodynamic cancer therapy.
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision tree models (C5, CHAID, and Random Forest) and two additional models (Logistic Regression and Bayesian Network) for comparison purposes. The IoT botnet attack dataset comprised various devices, mainly two types of attacks (Gafgyt and Mirai) and 23 feature engineering variables. Simulation results from all models showed that Accuracy, Precision, Recall, and False Omission Rate (FOR) values are approximately one, with an F1 score of around 0.5. CHAID and C5 models outperform other models in predicting IoT botnet attacks, as they are developed using only four and two variables, respectively. These results demonstrated that decision tree models with fewer variables can perform better than models that utilize all predictors.
Today's highly competitive and dynamic business environment has forced horticultural food commodity farmers to implement better supply chain management (SCM) strategies. An essential aspect of SCM is how farmers a...
详细信息
Stuttering or stammering is a common neurogenic, psychogenic fluency disorder wherein people have uncontrolled blocks on the natural flow of speech. Automatic Stuttering Event Detection (SED) is a widely recognised ch...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
Stuttering or stammering is a common neurogenic, psychogenic fluency disorder wherein people have uncontrolled blocks on the natural flow of speech. Automatic Stuttering Event Detection (SED) is a widely recognised challenge due to the heterogenic and overlapped nature of stuttering speech. Therefore, this comparative study investigates the impact of stuttering event representation on detection performance. The paper evaluates the performance of SED and shows the impact of employing ASR pre-trained feature extractions on each stuttering event. Moreover, the paper provides different groups of experiments that evaluate the impact of three acoustic features, the Zero Crossing Rate (ZCR), the Spectral Flux Onset Strength Envelope (SFO), and Fundamental Frequency (FF) features, on SED performance. The paper demonstrates that the fusion of spectral and ASR features improves SED performance across all stuttering events by 8%. The F1 score of the Block class increased by approximately 10%, from 15% to 25%, while the word repetition and interjection increased by 8%. In addition, our experiments proved that the fusion of temporal features increased the average F1 score of SED by 2% across all stuttering events. The F1 score of the prolongation and sound repetition classes increased by 6% and 3%, respectively.
With the advancement of Artificial Intelligence, facial recognition has become a crucial biometric feature. Deepfake technology leverages AI and can create hyper-realistic digitally manipulated videos of people appear...
详细信息
With the advancement of Artificial Intelligence, facial recognition has become a crucial biometric feature. Deepfake technology leverages AI and can create hyper-realistic digitally manipulated videos of people appearing to say or do things that never occurred. The emergence of Generative Adversarial Networks (GANs) has further enabled the creation of fake visual content with astonishing realism. This technology has diverse applications, such as in the film industry, where it allows for video recreation without reshooting, creating awareness videos, restoring the voices of those who have lost them, and updating movie scenes at low cost. However, this rapid advancement also presents significant challenges. The proliferation of synthetic images raises severe concerns about their societal impact, particularly in terms of potential misuse for harassment and blackmail. Therefore, developing robust deepfake detection models is imperative. This study evaluates the performance of a proposed ResNet34 model in deepfake detection. We utilize the FaceForensics++ dataset to train and assess the model, incorporating images generated by four popular deepfake techniques. Our experimental results demonstrate that integrating linear ternary patterns (LTP) and edge detection-based features with the modified ResNet34 model achieves superior performance, attaining 97.5% accuracy and surpassing other approaches.
The gait, as a kind of soft biometric characteristic, can reflect the distinct walking patterns of individuals at a distance, exhibiting a promising technique for unrestrained human identification. With largely exclud...
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection system(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features wit...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection system(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired *** survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis *** paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific ***,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement *** main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless *** detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural *** this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless *** main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these *** it is very crucial to design an IDS specifically to target on the wireless networks.
Now a days, more existing techniques are available to found tumours on brain from MR images. But still the researchers are concentrated on to detect the brain tumour accurately with less time. So, this work proposed t...
详细信息
Using blockchain technology to build strong digital asset management tools for financial operations is a revolutionary way to bring financial systems up to date. Blockchain technology is changing the way money works b...
详细信息
暂无评论