For years,foot ulcers linked with diabetes mellitus and neuropathy have significantly impacted diabetic patients’ health-related quality of life(HRQoL). Diabetes foot ulcers impact15% of all diabetic patients at some...
详细信息
For years,foot ulcers linked with diabetes mellitus and neuropathy have significantly impacted diabetic patients’ health-related quality of life(HRQoL). Diabetes foot ulcers impact15% of all diabetic patients at some point in their lives. The facilities and resources used for DFU detection and treatment are only available at hospitals and clinics,which results in the unavailability of feasible and timely detection at an early stage. This necessitates the development of an at-home DFU detection system that enables timely predictions and seamless communication with users,thereby preventing amputations due to neglect and severity. This paper proposes a feasible system consisting of three major modules:an IoT device that works to sense foot nodes to send vibrations onto a foot sole,a machine learning model based on supervised learning which predicts the level of severity of the DFU using four different classification techniques including XGBoost,K-SVM,Random Forest,and Decision tree,and a mobile application that acts as an interface between the sensors and the patient. Based on the severity levels,necessary steps for prevention,treatment,and medications are recommended via the application.
The advent of autonomous vehicles has revolutionized the automotive industry, offering promising advancements in safety, efficiency, and mobility. To integrate these autonomous vehicles into our society seamlessly, it...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
Oral cancer diagnosis at earlier stage is very crucial to decide the treatment procedure and to avoid mortality due to this malignant disease. Histopathological imaging is one among modalities widely used by the clini...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of Pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
Security and secure routing are important design issues in the design of Wireless Sensor Networks (WSNs). Intrusion Detection Systems (IDSs) are useful for securing the communication in WSNs. An IDS can be developed b...
详细信息
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have...
详细信息
To reduce phase errors caused by nonlinear responses in the measurement system, we propose a non-calibration correction method for nonlinear errors in phase-shifting patterns. First, the captured grating fringes are t...
详细信息
The advent of technologies like Deep Learning has revolutionized human interaction, transcending language and disability barriers. Sign Language Recognition (SLR) systems have emerged as vital tools, facilitating seam...
详细信息
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ...
详细信息
暂无评论