Early detection of Autism Spectrum Disorder (ASD) needs to be increased to prevent further adverse impacts. Thus, the classifi-cation between ASD and Typically Development (TD) individuals is an intriguing task. This ...
详细信息
Early detection of Autism Spectrum Disorder (ASD) needs to be increased to prevent further adverse impacts. Thus, the classifi-cation between ASD and Typically Development (TD) individuals is an intriguing task. This review study has collected 26 related papers to answer four research questions, i.e., what are the most used data inputs, brain atlases, and machine learning models for ASD classification, as also to discover the significant parts of the brain correlated with the ASD. It was eventually found that functional connectivity matrix, Support Vector Machine, and CC200 are the most frequently used data input, model, and brain atlas, respectively. Researchers also concluded that the posterior temporal fusiform cortex, intracalcarine cortex, cuneal cortex, subcallosal cortex, occipital pole, and lateral occipital cortex are the brain regions highly correlated with ASD.
A vast number of spatiotemporal datasets collected from a wide range of sources has motivated scientists to develop effective approaches to identify interesting patterns hidden in these datasets. In this respect, kern...
详细信息
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me...
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a means to automate and disintermediate business processes, their security vulnerabilities can be critical. The main issue discussed in this paper is the lack of a holistic approach to risk management smart contracts. The resulting framework consists of six steps: Risk identification, assessment, prioritization, mitigation, testing, and continuous monitoring (and was developed through reviewing existing literature on smart contract security and the NIST RMF). It is recommended that a case study be performed to prove the proposed model's effectiveness in managing the risks of smart contracts and minimizing financial losses and reputational harm. The paper presents a risk management framework for smart contracts to increase trust and adoption to enhance security while reducing financial losses and reputation damage. This has wider implications for the security of smart contracts and can be used as a starting point for future work. This study is expected to significantly contribute to smart contract security by introducing an organized way to address these contracts' risks using the NIST RMF.
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their ability to withstand these malicious threats. This study examines the impact and importance of organizational security culture in ransomware threat mitigation. We have surveyed five organizations, giving points from 1 to 5 for each question on cultural factors, leadership support, employee awareness and involvement (compliance), communication, behavior change or BBS practice incorporation, learning/training delivery methodology, and Size and industry impact on their security culture. The results indicate that a robust security culture, with leadership and effective communication, builds stronger resilience to ransomware. Organizations with jointly accountable cybersecurity and training practices are highly efficient. Suggestions range from establishing a secure environment to increasing management buy-in and integrating compliance. This work helps advance our understanding of ransomware resilience and highlights the key role of organizational security culture. The resulting learnings can help to inform organizations' security posture, ultimately helping them better protect their defenses against ransomware threats.
Nowadays, the use of accelerators in high performance computing has become more common than ever before. The most used accelerators must be the Graphics Processing Unit (GPU). It has emerged as an important component ...
详细信息
ISBN:
(数字)9798350383454
ISBN:
(纸本)9798350383461
Nowadays, the use of accelerators in high performance computing has become more common than ever before. The most used accelerators must be the Graphics Processing Unit (GPU). It has emerged as an important component in most of the parallel computing scenarios, surpassing the capabilities of the traditional Central Processing Unit (CPU) in perspective of both performance and energy efficiency.
As one of the cancer types with the highest incidence rates, colorectal cancer (CRC) would benefit from treatments with fewer side effects and reduced treatment-resistant potential. One of the options is to harness th...
详细信息
As one of the cancer types with the highest incidence rates, colorectal cancer (CRC) would benefit from treatments with fewer side effects and reduced treatment-resistant potential. One of the options is to harness the anti-CRC potential of natural products. Previous studies have shown that Calamus draco exudate, dragon's blood, has anticancer activity in liver cancer and acute myeloid leukemia, but its bioactivity has not been studied in CRC. Here we conduct a bioinformatics study based on network pharmacology to explore the anti-CRC potential and mechanism of C. draco -derived compounds. The bioinformatics pipeline is composed of compound and target collection, biological network evaluation, and enrichment analysis. We found that there are 43 bioactive compounds from C. draco targeting 91 CRC-related targets, of which most compounds target MEN1, PTGS2, and IDH1. Further analyses show that the targets of C. draco are involved in the cellular response to hypoxia. By inhibiting those targets, C. draco bioactive compounds can potentially hinder angiogenesis and increase treatment response efficacy.
With advancements in artificial intelligence, computer vision technologies have seen significant progress, enabling applications like facial recognition, autonomous driving, and medical imaging. This study leverages t...
详细信息
The problems that exist in the field of art and culture preservation experienced by the arts and culture community side are the limitations on physical facilities for disseminating works, exchanging information betwee...
详细信息
One application that can be utilized in finding the latest news is by utilizing the development of information and communication technology such as seeing the delivery of public information through social media such a...
详细信息
Depressive Disorders (DD) is one of the most prevalent mental disorders in the world that may lead to suicide cases. To prevent the latter, ubiquitous early detection systems may be effective. Recent studies have sinc...
详细信息
暂无评论