Intrusion detection systems (IDSs) are commonly employed to mitigate network security threats in various fields, including federated learning applications within the Internet of Medical Things (IoMT). However, IDSs fa...
详细信息
作者:
Aqeel, ImraMajid, AbdulBiomedical Informatics Research Lab
Department of Computer & Information Sciences Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan
Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan
SARS-COV-2 is a positive single-strand RNA-based macromolecule that has caused the death of more than 6.3 million people since June 2022. Moreover, by disturbing global supply chains through lockdown, the virus has in...
详细信息
Recent trends point towards communication networks will be multi-path in nature to increase failure resilience, support load-balancing and provide alternate paths for congestion avoidance. We argue that the transition...
详细信息
Recent trends point towards communication networks will be multi-path in nature to increase failure resilience, support load-balancing and provide alternate paths for congestion avoidance. We argue that the transition from single-path to multi-path routing should be as seamless as possible in order to lower the deployability barrier for network operators. Therefore, in this paper we are focusing on the problem of routing along the shortest pairs of disjoint paths between each source-destination pair over the currently deployed link-state routing architecture. We show that the union of disjoint path-pairs towards a given destination has a special structure, and we propose an efficient tag encoding scheme which requires only one extra forwarding table entry per router per destination. Our numerical evaluations demonstrate that in real-world topologies usually only 4 bit tags are sufficient in the packet headers to route on the disjoint path-pairs. Finally, we show that our tags automatically encode additional paths beyond the shortest pair of disjoint paths, including the shortest paths themselves, which enables incremental deployment of the proposed method.
Ontologies are a standard for semantic schemata in many knowledge-intensive domains of human interest. They are now becoming increasingly important also in areas until very recently dominated by subsymbolic representa...
详细信息
Given graphs H and F, ex(n,H,F) denotes the largest number of copies of H in F-free n-vertex graphs. Let χ(H) 0 there exists δ > 0 such that if an n-vertex F-free graph G contains at least ex(n,H,F) − δnh copies...
The coronavirus disease 2019 (COVID-19) has led to a global pandemic of significant severity. In addition to its high level of contagiousness, COVID-19 can have a heterogeneous clinical course, ranging from asymptomat...
详细信息
The coronavirus disease 2019 (COVID-19) has led to a global pandemic of significant severity. In addition to its high level of contagiousness, COVID-19 can have a heterogeneous clinical course, ranging from asymptomatic carriers to severe and potentially life-threatening health complications. Many patients have to revisit the emergency room (ER) within a short time after discharge, which significantly increases the workload for medical staff. Early identification of such patients is crucial for helping physicians focus on treating life-threatening cases. In this study, we obtained Electronic Health Records (EHRs) of 3,210 encounters from 13 affiliated ERs within the University of Pittsburgh Medical Center between March 2020 and January 2021. We leveraged a Natural Language Processing technique, ScispaCy, to extract clinical concepts and used the 1001 most frequent concepts to develop 7-day revisit models for COVID-19 patients in ERs. The research data we collected were obtained from 13 ERs, which may have distributional differences that could affect the model development. To address this issue, we employed a classic deep transfer learning method called the Domain Adversarial Neural Network (DANN) and evaluated different modeling strategies, including the Multi-DANN algorithm (which considers the source differences), the Single-DANN algorithm (which doesn’t consider the source differences), and three baseline methods: using only source data, using only target data, and using a mixture of source and target data. Results showed that the Multi-DANN models outperformed the Single-DANN models and baseline models in predicting revisits of COVID-19 patients to the ER within 7 days after discharge (median AUROC = 0.8 vs. 0.5). Notably, the Multi-DANN strategy effectively addressed the heterogeneity among multiple source domains and improved the adaptation of source data to the target domain. Moreover, the high performance of Multi-DANN models indicates that EHRs are informat
The rapid increase in computing power and the ability to store Big Data in the infrastructure has enabled predictions in a large variety of domains by Machine Learning. However, in many cases, existing Machine Learnin...
详细信息
Although the initial motivations for carrying out cyberattacks stay the same, cybercriminals demonstrated a heightened level of sophistication in their methodologies due to the growing number of people, and deluge of ...
Although the initial motivations for carrying out cyberattacks stay the same, cybercriminals demonstrated a heightened level of sophistication in their methodologies due to the growing number of people, and deluge of data, devices, and programs in the contemporary company. The efficacy of conventional cybersecurity measures in identifying and addressing emerging cyber threats is diminishing. In light of the escalating cyber-threat landscape, there is a pressing need to deploy sophisticated tools and technologies that can effectively identify, examine, and promptly respond to emerging attacks and threats. Artificial intelligence (AI) has become a ground¬breaking technology with enormous promise across various industries. One area where AI has made a considerable influence is cybersecurity. AI, notably Machine learning (ML), enhances cybersecurity against more complex attacks and addresses significant concerns such as real-time attack detection, data leakage prevention, malware protection, vulnerability assessments, and many more. There is a growing interest in ML-based solutions that automate the identification of attacks and address sophisticated cybersecurity challenges. This article examines the advantages of the most promising ML applications now in use while highlighting the drawbacks and factors businesses should carefully consider when using ML- powered tools in cybersecurity and ensuring they are used alongside other security procedures.
Knowledge is an important asset in an organization. Aru Islands District is one of the districts in Maluku Province. The Government of Aru Islands District Maluku has a vision and mission as outlined in the Regional S...
详细信息
In order to save human life and assets, the emergency management system (DMS) requires roving rescue teams to respond promptly and effectively. Installation and restoration of appropriate communication infrastructure ...
详细信息
暂无评论