-
5401
Impact of Hypoglycemia on Glucose Variability over Time for Individuals with Open-Source Automated Insulin Delivery Systems
Published 2024-10-01“…The experimental results are further validated on T1DEXI data (n = 222), originating from commercial AID systems. Different hypoglycemia categorization approaches did not show significant differences in glycemic variability outcomes. …”
Get full text
Article -
5402
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
5403
Debris Flow Susceptibility Prediction Using Transfer Learning: A Case Study in Western Sichuan, China
Published 2025-07-01“…In this study, debris flow susceptibility models were developed using three machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), and Extreme Gradient Boosting (XGBoost). …”
Get full text
Article -
5404
Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM.
Published 2025-01-01“…Nowadays, AI is significantly employed for evaluations in cybersecurity that find it challenging to justify their proceedings; this absence of accountability is alarming. …”
Get full text
Article -
5405
Inversion model of stress state reconstruction for geological hazard pipelines based on digital twin
Published 2025-07-01“…The results indicate that the research model has high prediction accuracy and efficiency and can effectively handle the problem of predicting pipeline stress states under different geological disasters, providing a reliable method for evaluating pipeline stress states in geological disasters.…”
Get full text
Article -
5406
Deep-Learning-Based Solar Flare Prediction Model: The Influence of the Magnetic Field Height
Published 2025-04-01“…This paper investigates how different magnetic field heights affect solar flare prediction performance. …”
Get full text
Article -
5407
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
Published 2025-06-01“…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
Get full text
Article -
5408
Optimizing Semantic-Aware Video Compression Using Particle Swarm Optimization Technique for Automotive Applications
Published 2025-01-01“…This popular and fast-developing technology aims to increase vehicle safety through various sensors and advanced-level Artificial Intelligence (AI)- based algorithms. The camera is one of the vital components of AM systems, which captures real-time videos, processes, encodes, packetizes and transfers them to different processing units for further applications. …”
Get full text
Article -
5409
Human-in-the-loop control strategy for IoT-based smart thermostats with Deep Reinforcement Learning
Published 2025-05-01“…The study explores the challenges of transferring control behaviors from simulation environments to real-world settings, examining the performance across different thermal zones and evaluating the integration flexibility of the control strategy within building systems. …”
Get full text
Article -
5410
Development of Cyber Security Platform for Experiential Learning
Published 2024-06-01“…The present research proposes a comprehensive web-based platform that can be used to communicate, collaborate and practice various use cases in the domain of network intrusion detection tools using machine learning algorithms and to evaluate user experience. The proposed platform CySecLearn is a collection of various functionalities and features that ensures experiential learning, will help the learner to develop critical thinking and expertise in network security and promote digital literacy in the domain of cyber security.…”
Get full text
Article -
5411
MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion
Published 2025-01-01“…Due to the advancement of computing technologies and the Internet of Things, there has been a notable rise in image data in different sectors. Having safety mechanisms in place is crucial to protect image data from unauthorised access. …”
Get full text
Article -
5412
Identification of reference genes for RT-qPCR in the Antarctic moss Sanionia uncinata under abiotic stress conditions.
Published 2018-01-01“…In this report, 11 traditionally used and 6 novel candidate reference genes were selected from transcriptome data of S. uncinata and the expression stability of these genes was evaluated under various abiotic stress conditions using three statistical algorithms; geNorm, NormFinder, and BestKeeper. …”
Get full text
Article -
5413
State of Charge Estimation in Li-Ion Batteries Using a Parallel LSTM-Based Approach: The Impact of Modeling Based on Operating States
Published 2025-01-01“…To address this, deep learning algorithms such as long short-term memory (LSTM) have been focused on for SOC prediction. …”
Get full text
Article -
5414
Research on recycling value grading and real-time perception of rock debris from TBM tunneling
Published 2025-04-01“…Leveraging a comprehensive database that encompasses both tunnel rock debris performance indicators and TBM tunneling parameters, perception models are constructed using different machine learning algorithms. After Bayesian hyperparameter optimization, the perception models based on CART, SVM, KNN, and ANN demonstrate accuracies of 67.5%, 80.0%, 82.5%, and 83.8% respectively. …”
Get full text
Article -
5415
Challenges of Water Resources Governance under the Impact of Climate Change and Water Transfer
Published 2025-06-01“…Research Topic: The water resources management approach should be based on a water governance framework in different dimensions for optimal allocation in terms of time and space with a view to future conditions. …”
Get full text
Article -
5416
Joint User Association and Resource Allocation for Hierarchical Federated Learning Based on Games in Satisfaction Form
Published 2024-01-01“…Algorithms based on Reinforcement Learning (RL) and Best Response Dynamics (BRD) are, then, devised to conclude the SE and MESE points. …”
Get full text
Article -
5417
A Federated Learning-Based Framework for Accurately Identifying Human Activity in the Environment
Published 2025-01-01“…Analysis of the data generated by HAR devices may involve deep learning models and algorithms of different kinds. These data are personal and may include some sensitive data. …”
Get full text
Article -
5418
A comprehensive approach to Queue Waiting Time Prediction using Tree-Based Ensembles with Data Balancing and Explainable AI
Published 2025-07-01“…Principal Component Analysis (PCA), t-distributed Stochastic Neighbor Embedding (t-SNE), and Autoencoders have been evaluated to compare the effectiveness of different dimensionality reduction techniques. …”
Get full text
Article -
5419
Rethinking Technological Investment and Cost-Benefit: A Software Requirements Dependency Extraction Case Study
Published 2025-01-01“…Machine Learning (ML) is widely used for different purposes within Software Engineering. It can substantially improve the efficiency and effectiveness of organizations. …”
Get full text
Article -
5420
AI-Driven Optimization of Breakwater Design: Predicting Wave Reflection and Structural Dimensions
Published 2025-01-01“…Two datasets of 32,000 data points were generated for underwater and free-surface breakwaters, with an additional 10,000 data points for validation, totaling 42,000 data points per case. Five ML algorithms—Random Forest, Support Vector Regression, Artificial Neural Network, Decision Tree, and Gaussian Process—were applied and evaluated. …”
Get full text
Article