High-intensity earthquakes can cause severe damage to bridges,buildings,and ground surfaces,as well as disrupt human activities.Such earthquakes can create long-distance,high-intensity surface movements that negativel...High-intensity earthquakes can cause severe damage to bridges,buildings,and ground surfaces,as well as disrupt human activities.Such earthquakes can create long-distance,high-intensity surface movements that negatively impact bridge structures.This article delves into the seismic reduction and isolation design strategies for bridges in high-intensity earthquake areas.It analyzes various seismic reduction and isolation technologies and provides case studies to help relevant units understand the design strategies of these technologies.The results of this article can be used as a guideline to effectively enhance the seismic performance of bridges in high-intensity earthquake areas.展开更多
In order to clarify the danger of water breakout in the bottom plate of extra-thick coal seam mining, 2202 working face of a mine in the west is taken as the research object, and it is proposed to use the on-site moni...In order to clarify the danger of water breakout in the bottom plate of extra-thick coal seam mining, 2202 working face of a mine in the west is taken as the research object, and it is proposed to use the on-site monitoring means combining borehole peeping and microseismic monitoring, combined with the theoretical analysis to analyze the danger of water breakout in the bottom plate. The results show that: 1) the theoretically calculated maximum damage depth of the bottom plate is 27.5 m, and its layer is located above the Austrian ash aquifer, which has the danger of water breakout;2) the drill hole peeping at the bottom plate of the working face shows that the depth of the bottom plate fissure development reaches 26 m, and the integrity of the water barrier layer has been damaged, so there is the risk of water breakout;3) for the microseismic monitoring of the anomalous area, the bottom plate of the return air downstream channel occurs in the field with a one-week lag, which shows that microseismic monitoring events may reflect the water breakout of the underground. This shows that the microseismic monitoring events can reflect the changes of the underground flow field, which can provide a reference basis for the early warning of water breakout. The research results can provide reference for the prediction of sudden water hazard.展开更多
A simulation code,GOAT,is developed to simulate single-bunch intensity-dependent effects and their interplay in the proton ring of the Electron-Ion Collider in China(EicC)project.GOAT is a scalable and portable macrop...A simulation code,GOAT,is developed to simulate single-bunch intensity-dependent effects and their interplay in the proton ring of the Electron-Ion Collider in China(EicC)project.GOAT is a scalable and portable macroparticle tracking code written in Python and coded by object-oriented programming technology.It allows for transverse and longitudinal tracking,including impedance,space charge effect,electron cloud effect,and beam-beam interaction.In this paper,physical models and numerical approaches for the four types of high-intensity effects,together with the benchmark results obtained through other simulation codes or theories,are presented and discussed.In addition,a numerical application of the cross-talk simulation between the beam-beam interaction and transverse impedance is shown,and a dipole instability is observed below the respective instability threshold.Different mitigation measures implemented in the code are used to suppress the instability.The flexibility,completeness,and advancement demonstrate that GOAT is a powerful tool for beam dynamics studies in the EicC project or other high-intensity accelerators.展开更多
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series data.Due to the challenges associated with annotating anomaly events,time series reconst...Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series data.Due to the challenges associated with annotating anomaly events,time series reconstruction has become a prevalent approach for unsupervised anomaly detection.However,effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time series.In this paper,we propose a cross-dimension attentive feature fusion network for time series anomaly detection,referred to as CAFFN.Specifically,a series and feature mixing block is introduced to learn representations in 1D space.Additionally,a fast Fourier transform is employed to convert the time series into 2D space,providing the capability for 2D feature extraction.Finally,a cross-dimension attentive feature fusion mechanism is designed that adaptively integrates features across different dimensions for anomaly detection.Experimental results on real-world time series datasets demonstrate that CAFFN performs better than other competing methods in time series anomaly detection.展开更多
While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),...While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),given that these techniques are increasingly being used by malicious actors to compromise IoT systems.Although an ample body of research focusing on conventional AI methods exists,there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures.To contribute to this nascent research stream,a novel AI-driven security system denoted as“AI2AI”is presented in this work.AI2AI employs AI techniques to enhance the performance and optimize security mechanisms within the IoT framework.We also introduce the Genetic Algorithm Anomaly Detection and Prevention Deep Neural Networks(GAADPSDNN)sys-tem that can be implemented to effectively identify,detect,and prevent cyberattacks targeting IoT devices.Notably,this system demonstrates adaptability to both federated and centralized learning environments,accommodating a wide array of IoT devices.Our evaluation of the GAADPSDNN system using the recently complied WUSTL-IIoT and Edge-IIoT datasets underscores its efficacy.Achieving an impressive overall accuracy of 98.18%on the Edge-IIoT dataset,the GAADPSDNN outperforms the standard deep neural network(DNN)classifier with 94.11%accuracy.Furthermore,with the proposed enhancements,the accuracy of the unoptimized random forest classifier(80.89%)is improved to 93.51%,while the overall accuracy(98.18%)surpasses the results(93.91%,94.67%,94.94%,and 94.96%)achieved when alternative systems based on diverse optimization techniques and the same dataset are employed.The proposed optimization techniques increase the effectiveness of the anomaly detection system by efficiently achieving high accuracy and reducing the computational load on IoT devices through the adaptive selection of active features.展开更多
El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been develope...El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been developed to simulate and predict it.In some simplified coupled ocean-atmosphere models,the relationship between sea surface temperature(SST)anomalies and wind stress(τ)anomalies can be constructed by statistical methods,such as singular value decomposition(SVD).In recent years,the applications of artificial intelligence(AI)to climate modeling have shown promising prospects,and the integrations of AI-based models with dynamical models are active areas of research.This study constructs U-Net models for representing the relationship between SSTAs andτanomalies in the tropical Pacific;the UNet-derivedτmodel,denoted asτUNet,is then used to replace the original SVD-basedτmodel of an intermediate coupled model(ICM),forming a newly AI-integrated ICM,referred to as ICM-UNet.The simulation results obtained from ICM-UNet demonstrate their ability to represent the spatiotemporal variability of oceanic and atmospheric anomaly fields in the equatorial Pacific.In the ocean-only case study,theτUNet-derived wind stress anomaly fields are used to force the ocean component of the ICM,the results of which also indicate reasonable simulations of typical ENSO events.These results demonstrate the feasibility of integrating an AI-derived model with a physics-based dynamical model for ENSO modeling studies.Furthermore,the successful integration of the dynamical ocean models with the AI-based atmospheric wind model provides a novel approach to ocean-atmosphere interaction modeling studies.展开更多
BACKGROUND Undifferentiated pleomorphic sarcomas,also known as spindle cell sarcomas,are a relatively uncommon subtype of soft tissue sarcomas in clinical practice.CASE SUMMARY We present a case report of a 69-year-ol...BACKGROUND Undifferentiated pleomorphic sarcomas,also known as spindle cell sarcomas,are a relatively uncommon subtype of soft tissue sarcomas in clinical practice.CASE SUMMARY We present a case report of a 69-year-old female patient who was diagnosed with undifferentiated spindle cell soft tissue sarcoma on her left thigh.Surgical excision was initially performed,but the patient experienced a local recurrence following multiple surgeries and radioactive particle implantations.High-intensity focused ultrasound(HIFU)was subsequently administered,resulting in complete ablation of the sarcoma without any significant complications other than bone damage at the treated site.However,approximately four months later,the patient experienced a broken lesion at the original location.After further diagnostic workup,the patient underwent additional surgery and is currently stable with a good quality of life.CONCLUSION HIFU has shown positive outcomes in achieving local control of limb spindle cell sarcoma,making it an effective non-invasive treatment option.展开更多
Neuropathy is nerve damage that can cause chronic neuropathic pain, which is challenging to cure and has a significant financial burden. Exercise therapies, including High-Intensity Interval Training (HIIT) and steady...Neuropathy is nerve damage that can cause chronic neuropathic pain, which is challenging to cure and has a significant financial burden. Exercise therapies, including High-Intensity Interval Training (HIIT) and steady-state cardio, are being explored as potential treatments for neuropathic pain. This systematic review compares the effectiveness of HIIT and steady-state cardio for improving function in neurological patients. This article provides an overview of the systematic review conducted on the effects of exercise on neuropathic patients, with a focus on high-intensity interval training (HIIT) and steady-state cardio. The authors conducted a comprehensive search of various databases, identified relevant studies based on predetermined inclusion criteria, and used the EPPI automation application to process the data. The final selection of studies was based on validity and relevance, with redundant articles removed. The article reviews four studies that compare high-intensity interval training (HIIT) to moderate-intensity continuous training (MICT) on various health outcomes. The studies found that HIIT can improve aerobic fitness, cerebral blood flow, and brain function in stroke patients;lower diastolic blood pressure more than MICT and improve insulin sensitivity and skeletal muscle mitochondrial content in obese individuals, potentially helping with the prevention and management of type 2 diabetes. In people with multiple sclerosis, acute exercise can decrease the plasma neurofilament light chain while increasing the flow of the kynurenine pathway. The available clinical and preclinical data suggest that further study on high-intensity interval training (HIIT) and its potential to alleviate neuropathic pain is justified. Randomized controlled trials are needed to investigate the type, intensity, frequency, and duration of exercise, which could lead to consensus and specific HIIT-based advice for patients with neuropathies.展开更多
The identification and mitigation of anomaly data,characterized by deviations from normal patterns or singularities,stand as critical endeavors in modern technological landscapes,spanning domains such as Non-Fungible ...The identification and mitigation of anomaly data,characterized by deviations from normal patterns or singularities,stand as critical endeavors in modern technological landscapes,spanning domains such as Non-Fungible Tokens(NFTs),cyber-security,and the burgeoning metaverse.This paper presents a novel proposal aimed at refining anomaly detection methodologies,with a particular focus on continuous data streams.The essence of the proposed approach lies in analyzing the rate of change within such data streams,leveraging this dynamic aspect to discern anomalies with heightened precision and efficacy.Through empirical evaluation,our method demonstrates a marked improvement over existing techniques,showcasing more nuanced and sophisticated result values.Moreover,we envision a trajectory of continuous research and development,wherein iterative refinement and supplementation will tailor our approach to various anomaly detection scenarios,ensuring adaptability and robustness in real-world applications.展开更多
Background: High-intensity focused ultrasound (HIFU) has been introduced to improve skin laxity in recent years. However, very few studies have evaluated the safety and effectiveness of HIFU in Chinese populations. Me...Background: High-intensity focused ultrasound (HIFU) has been introduced to improve skin laxity in recent years. However, very few studies have evaluated the safety and effectiveness of HIFU in Chinese populations. Methods: In the study, 30 Chinese participants underwent HIFU (Bolida, Inc., Changsha, China) rejuvenation between February 1, 2022, and September 30, 2022. There were three different focal depths used depending on the area where shots were captured (4.5 mm, 4 MHz;3 mm, 7 MHz;1.5 mm, 7 MHz). After 3 months and 6 months of treatment, efficacy and safety were assessed by quantitative analysis. Results: Patients were satisfied with the clinical effects of HIFU rejuvenation after one session. In terms of effectiveness, HIFU was most successful in areas around the jawline, cheek, and perioral. In four cases, erythema was observed, in two cases, swollen gums were seen, but all of these effects were transient and mild. Conclusion: Bolida system can be safe and effective for facial tightening, additionally, they are most effective for jawline, cheek, and perioral improvements. In clinical practice, the Bolida system can be recommended as a reliable treatment option. .展开更多
Long-wavelength(>500 km)magnetic anomalies originating in the lithosphere were first found in satellite magnetic surveys.Compared to the striking magnetic anomalies around the world,the long-wavelength magnetic ano...Long-wavelength(>500 km)magnetic anomalies originating in the lithosphere were first found in satellite magnetic surveys.Compared to the striking magnetic anomalies around the world,the long-wavelength magnetic anomalies in China and surrounding regions are relatively weak.Specialized research on each of these anomalies has been quite inadequate;their geological origins remain unclear,in particular their connection to tectonic activity in the Chinese and surrounding regions.We focus on six magnetic high anomalies over the(1)Tarim Basin,(2)Sichuan Basin(3)Great Xing’an Range,(4)Barmer Basin,(5)Central Myanmar Basin,and(6)Sunda and Banda Arcs,and a striking magnetic low anomaly along the southern part of the Himalayan-Tibetan Plateau.We have analyzed their geological origins by reviewing related research and by detailed comparison with geological results.The tectonic backgrounds for these anomalies belong to two cases:either ancient basin basement,or subduction-collision zone.However,the geological origins of large-scale regional magnetic anomalies are always subject to dispute,mainly because of limited surface exposure of sources,later tectonic destruction,and superposition of multi-phase events.展开更多
Based on the understanding that the seismic fault system is a nonlinear complex system,Rundle(1995)introduced the nonlinear threshold system used in meteorology to analyze the ocean-atmosphere interface and the El Ni?...Based on the understanding that the seismic fault system is a nonlinear complex system,Rundle(1995)introduced the nonlinear threshold system used in meteorology to analyze the ocean-atmosphere interface and the El Ni?o Southern Oscillation into the study of seismic activity changes,and then proposed the PI method(Rundle et al.,2000a,b).Wu et al.(2011)modified the Pattern Informatics Method named MPI to extract the ionospheric anomaly by using data from DEMETER satellites which is suitable for 1–3 months short-term prediction.展开更多
In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower s...In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection.展开更多
Understanding the topographic patterns of the seafloor is a very important part of understanding our planet.Although the science involved in bathymetric surveying has advanced much over the decades,less than 20%of the...Understanding the topographic patterns of the seafloor is a very important part of understanding our planet.Although the science involved in bathymetric surveying has advanced much over the decades,less than 20%of the seafloor has been precisely modeled to date,and there is an urgent need to improve the accuracy and reduce the uncertainty of underwater survey data.In this study,we introduce a pretrained visual geometry group network(VGGNet)method based on deep learning.To apply this method,we input gravity anomaly data derived from ship measurements and satellite altimetry into the model and correct the latter,which has a larger spatial coverage,based on the former,which is considered the true value and is more accurate.After obtaining the corrected high-precision gravity model,it is inverted to the corresponding bathymetric model by applying the gravity-depth correlation.We choose four data pairs collected from different environments,i.e.,the Southern Ocean,Pacific Ocean,Atlantic Ocean and Caribbean Sea,to evaluate the topographic correction results of the model.The experiments show that the coefficient of determination(R~2)reaches 0.834 among the results of the four experimental groups,signifying a high correlation.The standard deviation and normalized root mean square error are also evaluated,and the accuracy of their performance improved by up to 24.2%compared with similar research done in recent years.The evaluation of the R^(2) values at different water depths shows that our model can achieve performance results above 0.90 at certain water depths and can also significantly improve results from mid-water depths when compared to previous research.Finally,the bathymetry corrected by our model is able to show an accuracy improvement level of more than 21%within 1%of the total water depths,which is sufficient to prove that the VGGNet-based method has the ability to perform a gravity-bathymetry correction and achieve outstanding results.展开更多
BACKGROUND: Dental anomalies are variations from the established well-known general anatomy and morphology of the tooth as a result of disturbances during tooth formation. They can be developmental, congenital, or acq...BACKGROUND: Dental anomalies are variations from the established well-known general anatomy and morphology of the tooth as a result of disturbances during tooth formation. They can be developmental, congenital, or acquired and may be localized to a single tooth or involve systemic conditions. AIM: To evaluate the prevalence of dental anomalies in patients who report to the Komfo Anokye Teaching Hospital (KATH) dental clinics. METHOD: A descriptive cross-sectional design was used with a sample size of 92 patients aged 18 or older, obtained through convenience sampling. Data analysis was performed using SPSS version 26.0. RESULTS: The study included 92 patients aged 18 to 72 years, with 47.8% males and 52.2% females. Dental anomalies were observed in 51.1% of participants, with a higher prevalence in females (55.3%). The most common anomalies were diastema (48.3%), impacted teeth (22.0%), dilaceration (11.9%), and peg-shaped lateral teeth (6.8%). CONCLUSION: This study highlights the importance of conducting thorough dental examinations to identify and address dental anomalies, which may have implications for treatment. Early detection and correction of these anomalies are crucial to prevent future complications.展开更多
Recently,anomaly detection(AD)in streaming data gained significant attention among research communities due to its applicability in finance,business,healthcare,education,etc.The recent developments of deep learning(DL...Recently,anomaly detection(AD)in streaming data gained significant attention among research communities due to its applicability in finance,business,healthcare,education,etc.The recent developments of deep learning(DL)models find helpful in the detection and classification of anomalies.This article designs an oversampling with an optimal deep learning-based streaming data classification(OS-ODLSDC)model.The aim of the OSODLSDC model is to recognize and classify the presence of anomalies in the streaming data.The proposed OS-ODLSDC model initially undergoes preprocessing step.Since streaming data is unbalanced,support vector machine(SVM)-Synthetic Minority Over-sampling Technique(SVM-SMOTE)is applied for oversampling process.Besides,the OS-ODLSDC model employs bidirectional long short-term memory(Bi LSTM)for AD and classification.Finally,the root means square propagation(RMSProp)optimizer is applied for optimal hyperparameter tuning of the Bi LSTM model.For ensuring the promising performance of the OS-ODLSDC model,a wide-ranging experimental analysis is performed using three benchmark datasets such as CICIDS 2018,KDD-Cup 1999,and NSL-KDD datasets.展开更多
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A...In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.展开更多
The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the reali...The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence(AI)-based analytics,empowering seamless integration across the entire Continuum(Edge,Fog,Core,Cloud).This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning(FL)-based anomaly detection in B5Gnetworks.By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm,which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize normal behavior,the systemorchestrates network intelligence to detect and prevent cyber-attacks.Integrated into a B5G Zero-touch Service Management(ZSM)aligned Security Framework,the proposal utilizes multi-domain and multi-tenant orchestration to automate and scale the deployment of FL-agents and AI-based anomaly detectors,enhancing reaction capabilities against cyber-attacks.The proposed FL architecture can be dynamically deployed across the B5G Continuum,utilizing a hierarchy of Network Intelligence orchestrators for real-time anomaly and security threat handling.Implementation includes FL enforcement operations for interoperability and extensibility,enabling dynamic deployment,configuration,and reconfiguration on demand.Performance validation of the proposed solution was conducted through dynamic orchestration,FL,and real-time anomaly detection processes using a practical test environment.Analysis of key performance metrics,leveraging the 5G-NIDD dataset,demonstrates the system’s capability for automatic and near real-time handling of anomalies and attacks,including real-time network monitoring and countermeasure implementation for mitigation.展开更多
Coronary artery anomaly is known as one of the causes of angina pectoris and sudden death and is an important clinical entity that cannot be overlooked.The incidence of coronary artery anomalies is as low as 1%-2%of t...Coronary artery anomaly is known as one of the causes of angina pectoris and sudden death and is an important clinical entity that cannot be overlooked.The incidence of coronary artery anomalies is as low as 1%-2%of the general population,even when the various types are combined.Coronary anomalies are practically challenging when the left and right coronary ostium are not found around their normal positions during coronary angiography with a catheter.If there is atherosclerotic stenosis of the coronary artery with an anomaly and percutaneous coronary intervention(PCI)is required,the suitability of the guiding catheter at the entrance and the adequate back up force of the guiding catheter are issues.The level of PCI risk itself should also be considered on a caseby-case basis.In this case,emission computed tomography in the R-1 subtype single coronary artery proved that ischemia occurred in an area where the coronary artery was not visible to the naked eye.Meticulous follow-up would be crucial,because sudden death may occur in single coronary arteries.To prevent atherosclerosis with full efforts is also important,as the authors indicated admirably.展开更多
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly d...In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly detection using AI(Artificial Intelligence)is actively progressing,the encrypted nature of the data poses challenges for labeling,resulting in data imbalance and biased feature extraction toward specific nodes.This study proposes a reconstruction error-based anomaly detection method using an autoencoder(AE)that utilizes packet metadata excluding specific node information.The proposed method omits biased packet metadata such as IP and Port and trains the detection model using only normal data,leveraging a small amount of packet metadata.This makes it well-suited for direct application in IoT environments due to its low resource consumption.In experiments comparing feature extraction methods for AE-based anomaly detection,we found that using flowbased features significantly improves accuracy,precision,F1 score,and AUC(Area Under the Receiver Operating Characteristic Curve)score compared to packet-based features.Additionally,for flow-based features,the proposed method showed a 30.17%increase in F1 score and improved false positive rates compared to Isolation Forest and OneClassSVM.Furthermore,the proposedmethod demonstrated a 32.43%higherAUCwhen using packet features and a 111.39%higher AUC when using flow features,compared to previously proposed oversampling methods.This study highlights the impact of feature extraction methods on attack detection in imbalanced,encrypted traffic environments and emphasizes that the one-class method using AE is more effective for attack detection and reducing false positives compared to traditional oversampling methods.展开更多
文摘High-intensity earthquakes can cause severe damage to bridges,buildings,and ground surfaces,as well as disrupt human activities.Such earthquakes can create long-distance,high-intensity surface movements that negatively impact bridge structures.This article delves into the seismic reduction and isolation design strategies for bridges in high-intensity earthquake areas.It analyzes various seismic reduction and isolation technologies and provides case studies to help relevant units understand the design strategies of these technologies.The results of this article can be used as a guideline to effectively enhance the seismic performance of bridges in high-intensity earthquake areas.
文摘In order to clarify the danger of water breakout in the bottom plate of extra-thick coal seam mining, 2202 working face of a mine in the west is taken as the research object, and it is proposed to use the on-site monitoring means combining borehole peeping and microseismic monitoring, combined with the theoretical analysis to analyze the danger of water breakout in the bottom plate. The results show that: 1) the theoretically calculated maximum damage depth of the bottom plate is 27.5 m, and its layer is located above the Austrian ash aquifer, which has the danger of water breakout;2) the drill hole peeping at the bottom plate of the working face shows that the depth of the bottom plate fissure development reaches 26 m, and the integrity of the water barrier layer has been damaged, so there is the risk of water breakout;3) for the microseismic monitoring of the anomalous area, the bottom plate of the return air downstream channel occurs in the field with a one-week lag, which shows that microseismic monitoring events may reflect the water breakout of the underground. This shows that the microseismic monitoring events can reflect the changes of the underground flow field, which can provide a reference basis for the early warning of water breakout. The research results can provide reference for the prediction of sudden water hazard.
基金supported by the National Science Fund for Distinguished Young Scholars (No.11825505)the National Key R&D Program of China (No.2019YFA0405400)。
文摘A simulation code,GOAT,is developed to simulate single-bunch intensity-dependent effects and their interplay in the proton ring of the Electron-Ion Collider in China(EicC)project.GOAT is a scalable and portable macroparticle tracking code written in Python and coded by object-oriented programming technology.It allows for transverse and longitudinal tracking,including impedance,space charge effect,electron cloud effect,and beam-beam interaction.In this paper,physical models and numerical approaches for the four types of high-intensity effects,together with the benchmark results obtained through other simulation codes or theories,are presented and discussed.In addition,a numerical application of the cross-talk simulation between the beam-beam interaction and transverse impedance is shown,and a dipole instability is observed below the respective instability threshold.Different mitigation measures implemented in the code are used to suppress the instability.The flexibility,completeness,and advancement demonstrate that GOAT is a powerful tool for beam dynamics studies in the EicC project or other high-intensity accelerators.
基金supported in part by the National Natural Science Foundation of China(Grants 62376172,62006163,62376043)in part by the National Postdoctoral Program for Innovative Talents(Grant BX20200226)in part by Sichuan Science and Technology Planning Project(Grants 2022YFSY0047,2022YFQ0014,2023ZYD0143,2022YFH0021,2023YFQ0020,24QYCX0354,24NSFTD0025).
文摘Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series data.Due to the challenges associated with annotating anomaly events,time series reconstruction has become a prevalent approach for unsupervised anomaly detection.However,effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time series.In this paper,we propose a cross-dimension attentive feature fusion network for time series anomaly detection,referred to as CAFFN.Specifically,a series and feature mixing block is introduced to learn representations in 1D space.Additionally,a fast Fourier transform is employed to convert the time series into 2D space,providing the capability for 2D feature extraction.Finally,a cross-dimension attentive feature fusion mechanism is designed that adaptively integrates features across different dimensions for anomaly detection.Experimental results on real-world time series datasets demonstrate that CAFFN performs better than other competing methods in time series anomaly detection.
文摘While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),given that these techniques are increasingly being used by malicious actors to compromise IoT systems.Although an ample body of research focusing on conventional AI methods exists,there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures.To contribute to this nascent research stream,a novel AI-driven security system denoted as“AI2AI”is presented in this work.AI2AI employs AI techniques to enhance the performance and optimize security mechanisms within the IoT framework.We also introduce the Genetic Algorithm Anomaly Detection and Prevention Deep Neural Networks(GAADPSDNN)sys-tem that can be implemented to effectively identify,detect,and prevent cyberattacks targeting IoT devices.Notably,this system demonstrates adaptability to both federated and centralized learning environments,accommodating a wide array of IoT devices.Our evaluation of the GAADPSDNN system using the recently complied WUSTL-IIoT and Edge-IIoT datasets underscores its efficacy.Achieving an impressive overall accuracy of 98.18%on the Edge-IIoT dataset,the GAADPSDNN outperforms the standard deep neural network(DNN)classifier with 94.11%accuracy.Furthermore,with the proposed enhancements,the accuracy of the unoptimized random forest classifier(80.89%)is improved to 93.51%,while the overall accuracy(98.18%)surpasses the results(93.91%,94.67%,94.94%,and 94.96%)achieved when alternative systems based on diverse optimization techniques and the same dataset are employed.The proposed optimization techniques increase the effectiveness of the anomaly detection system by efficiently achieving high accuracy and reducing the computational load on IoT devices through the adaptive selection of active features.
基金supported by the National Natural Science Foundation of China(NFSCGrant No.42030410)+2 种基金Laoshan Laboratory(No.LSKJ202202402)the Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDB40000000)the Startup Foundation for Introducing Talent of NUIST.
文摘El Niño-Southern Oscillation(ENSO)is the strongest interannual climate mode influencing the coupled ocean-atmosphere system in the tropical Pacific,and numerous dynamical and statistical models have been developed to simulate and predict it.In some simplified coupled ocean-atmosphere models,the relationship between sea surface temperature(SST)anomalies and wind stress(τ)anomalies can be constructed by statistical methods,such as singular value decomposition(SVD).In recent years,the applications of artificial intelligence(AI)to climate modeling have shown promising prospects,and the integrations of AI-based models with dynamical models are active areas of research.This study constructs U-Net models for representing the relationship between SSTAs andτanomalies in the tropical Pacific;the UNet-derivedτmodel,denoted asτUNet,is then used to replace the original SVD-basedτmodel of an intermediate coupled model(ICM),forming a newly AI-integrated ICM,referred to as ICM-UNet.The simulation results obtained from ICM-UNet demonstrate their ability to represent the spatiotemporal variability of oceanic and atmospheric anomaly fields in the equatorial Pacific.In the ocean-only case study,theτUNet-derived wind stress anomaly fields are used to force the ocean component of the ICM,the results of which also indicate reasonable simulations of typical ENSO events.These results demonstrate the feasibility of integrating an AI-derived model with a physics-based dynamical model for ENSO modeling studies.Furthermore,the successful integration of the dynamical ocean models with the AI-based atmospheric wind model provides a novel approach to ocean-atmosphere interaction modeling studies.
文摘BACKGROUND Undifferentiated pleomorphic sarcomas,also known as spindle cell sarcomas,are a relatively uncommon subtype of soft tissue sarcomas in clinical practice.CASE SUMMARY We present a case report of a 69-year-old female patient who was diagnosed with undifferentiated spindle cell soft tissue sarcoma on her left thigh.Surgical excision was initially performed,but the patient experienced a local recurrence following multiple surgeries and radioactive particle implantations.High-intensity focused ultrasound(HIFU)was subsequently administered,resulting in complete ablation of the sarcoma without any significant complications other than bone damage at the treated site.However,approximately four months later,the patient experienced a broken lesion at the original location.After further diagnostic workup,the patient underwent additional surgery and is currently stable with a good quality of life.CONCLUSION HIFU has shown positive outcomes in achieving local control of limb spindle cell sarcoma,making it an effective non-invasive treatment option.
文摘Neuropathy is nerve damage that can cause chronic neuropathic pain, which is challenging to cure and has a significant financial burden. Exercise therapies, including High-Intensity Interval Training (HIIT) and steady-state cardio, are being explored as potential treatments for neuropathic pain. This systematic review compares the effectiveness of HIIT and steady-state cardio for improving function in neurological patients. This article provides an overview of the systematic review conducted on the effects of exercise on neuropathic patients, with a focus on high-intensity interval training (HIIT) and steady-state cardio. The authors conducted a comprehensive search of various databases, identified relevant studies based on predetermined inclusion criteria, and used the EPPI automation application to process the data. The final selection of studies was based on validity and relevance, with redundant articles removed. The article reviews four studies that compare high-intensity interval training (HIIT) to moderate-intensity continuous training (MICT) on various health outcomes. The studies found that HIIT can improve aerobic fitness, cerebral blood flow, and brain function in stroke patients;lower diastolic blood pressure more than MICT and improve insulin sensitivity and skeletal muscle mitochondrial content in obese individuals, potentially helping with the prevention and management of type 2 diabetes. In people with multiple sclerosis, acute exercise can decrease the plasma neurofilament light chain while increasing the flow of the kynurenine pathway. The available clinical and preclinical data suggest that further study on high-intensity interval training (HIIT) and its potential to alleviate neuropathic pain is justified. Randomized controlled trials are needed to investigate the type, intensity, frequency, and duration of exercise, which could lead to consensus and specific HIIT-based advice for patients with neuropathies.
基金supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea(NRF-2019S1A5B5A02041334).
文摘The identification and mitigation of anomaly data,characterized by deviations from normal patterns or singularities,stand as critical endeavors in modern technological landscapes,spanning domains such as Non-Fungible Tokens(NFTs),cyber-security,and the burgeoning metaverse.This paper presents a novel proposal aimed at refining anomaly detection methodologies,with a particular focus on continuous data streams.The essence of the proposed approach lies in analyzing the rate of change within such data streams,leveraging this dynamic aspect to discern anomalies with heightened precision and efficacy.Through empirical evaluation,our method demonstrates a marked improvement over existing techniques,showcasing more nuanced and sophisticated result values.Moreover,we envision a trajectory of continuous research and development,wherein iterative refinement and supplementation will tailor our approach to various anomaly detection scenarios,ensuring adaptability and robustness in real-world applications.
文摘Background: High-intensity focused ultrasound (HIFU) has been introduced to improve skin laxity in recent years. However, very few studies have evaluated the safety and effectiveness of HIFU in Chinese populations. Methods: In the study, 30 Chinese participants underwent HIFU (Bolida, Inc., Changsha, China) rejuvenation between February 1, 2022, and September 30, 2022. There were three different focal depths used depending on the area where shots were captured (4.5 mm, 4 MHz;3 mm, 7 MHz;1.5 mm, 7 MHz). After 3 months and 6 months of treatment, efficacy and safety were assessed by quantitative analysis. Results: Patients were satisfied with the clinical effects of HIFU rejuvenation after one session. In terms of effectiveness, HIFU was most successful in areas around the jawline, cheek, and perioral. In four cases, erythema was observed, in two cases, swollen gums were seen, but all of these effects were transient and mild. Conclusion: Bolida system can be safe and effective for facial tightening, additionally, they are most effective for jawline, cheek, and perioral improvements. In clinical practice, the Bolida system can be recommended as a reliable treatment option. .
基金the National Natural Science Foundation of China(grant numbers 42004051,42274214,41904134).
文摘Long-wavelength(>500 km)magnetic anomalies originating in the lithosphere were first found in satellite magnetic surveys.Compared to the striking magnetic anomalies around the world,the long-wavelength magnetic anomalies in China and surrounding regions are relatively weak.Specialized research on each of these anomalies has been quite inadequate;their geological origins remain unclear,in particular their connection to tectonic activity in the Chinese and surrounding regions.We focus on six magnetic high anomalies over the(1)Tarim Basin,(2)Sichuan Basin(3)Great Xing’an Range,(4)Barmer Basin,(5)Central Myanmar Basin,and(6)Sunda and Banda Arcs,and a striking magnetic low anomaly along the southern part of the Himalayan-Tibetan Plateau.We have analyzed their geological origins by reviewing related research and by detailed comparison with geological results.The tectonic backgrounds for these anomalies belong to two cases:either ancient basin basement,or subduction-collision zone.However,the geological origins of large-scale regional magnetic anomalies are always subject to dispute,mainly because of limited surface exposure of sources,later tectonic destruction,and superposition of multi-phase events.
基金supported by the Joint Funds of the National Natural Science Foundation of China(Grant No.U2039207)。
文摘Based on the understanding that the seismic fault system is a nonlinear complex system,Rundle(1995)introduced the nonlinear threshold system used in meteorology to analyze the ocean-atmosphere interface and the El Ni?o Southern Oscillation into the study of seismic activity changes,and then proposed the PI method(Rundle et al.,2000a,b).Wu et al.(2011)modified the Pattern Informatics Method named MPI to extract the ionospheric anomaly by using data from DEMETER satellites which is suitable for 1–3 months short-term prediction.
基金the Science and Technology Project of China Southern Power Grid Company,Ltd.(031200KK52200003)the National Natural Science Foundation of China(Nos.62371253,52278119).
文摘In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection.
基金The National Key R&D Program of China under contract Nos 2022YFC3003800,2020YFC1521700 and 2020YFC1521705the National Natural Science Foundation of China under contract No.41830540+3 种基金the Open Fund of the East China Coastal Field Scientific Observation and Research Station of the Ministry of Natural Resources under contract No.OR-SECCZ2022104the Deep Blue Project of Shanghai Jiao Tong University under contract No.SL2020ZD204the Special Funding Project for the Basic Scientific Research Operation Expenses of the Central Government-Level Research Institutes of Public Interest of China under contract No.SZ2102the Zhejiang Provincial Project under contract No.330000210130313013006。
文摘Understanding the topographic patterns of the seafloor is a very important part of understanding our planet.Although the science involved in bathymetric surveying has advanced much over the decades,less than 20%of the seafloor has been precisely modeled to date,and there is an urgent need to improve the accuracy and reduce the uncertainty of underwater survey data.In this study,we introduce a pretrained visual geometry group network(VGGNet)method based on deep learning.To apply this method,we input gravity anomaly data derived from ship measurements and satellite altimetry into the model and correct the latter,which has a larger spatial coverage,based on the former,which is considered the true value and is more accurate.After obtaining the corrected high-precision gravity model,it is inverted to the corresponding bathymetric model by applying the gravity-depth correlation.We choose four data pairs collected from different environments,i.e.,the Southern Ocean,Pacific Ocean,Atlantic Ocean and Caribbean Sea,to evaluate the topographic correction results of the model.The experiments show that the coefficient of determination(R~2)reaches 0.834 among the results of the four experimental groups,signifying a high correlation.The standard deviation and normalized root mean square error are also evaluated,and the accuracy of their performance improved by up to 24.2%compared with similar research done in recent years.The evaluation of the R^(2) values at different water depths shows that our model can achieve performance results above 0.90 at certain water depths and can also significantly improve results from mid-water depths when compared to previous research.Finally,the bathymetry corrected by our model is able to show an accuracy improvement level of more than 21%within 1%of the total water depths,which is sufficient to prove that the VGGNet-based method has the ability to perform a gravity-bathymetry correction and achieve outstanding results.
文摘BACKGROUND: Dental anomalies are variations from the established well-known general anatomy and morphology of the tooth as a result of disturbances during tooth formation. They can be developmental, congenital, or acquired and may be localized to a single tooth or involve systemic conditions. AIM: To evaluate the prevalence of dental anomalies in patients who report to the Komfo Anokye Teaching Hospital (KATH) dental clinics. METHOD: A descriptive cross-sectional design was used with a sample size of 92 patients aged 18 or older, obtained through convenience sampling. Data analysis was performed using SPSS version 26.0. RESULTS: The study included 92 patients aged 18 to 72 years, with 47.8% males and 52.2% females. Dental anomalies were observed in 51.1% of participants, with a higher prevalence in females (55.3%). The most common anomalies were diastema (48.3%), impacted teeth (22.0%), dilaceration (11.9%), and peg-shaped lateral teeth (6.8%). CONCLUSION: This study highlights the importance of conducting thorough dental examinations to identify and address dental anomalies, which may have implications for treatment. Early detection and correction of these anomalies are crucial to prevent future complications.
文摘Recently,anomaly detection(AD)in streaming data gained significant attention among research communities due to its applicability in finance,business,healthcare,education,etc.The recent developments of deep learning(DL)models find helpful in the detection and classification of anomalies.This article designs an oversampling with an optimal deep learning-based streaming data classification(OS-ODLSDC)model.The aim of the OSODLSDC model is to recognize and classify the presence of anomalies in the streaming data.The proposed OS-ODLSDC model initially undergoes preprocessing step.Since streaming data is unbalanced,support vector machine(SVM)-Synthetic Minority Over-sampling Technique(SVM-SMOTE)is applied for oversampling process.Besides,the OS-ODLSDC model employs bidirectional long short-term memory(Bi LSTM)for AD and classification.Finally,the root means square propagation(RMSProp)optimizer is applied for optimal hyperparameter tuning of the Bi LSTM model.For ensuring the promising performance of the OS-ODLSDC model,a wide-ranging experimental analysis is performed using three benchmark datasets such as CICIDS 2018,KDD-Cup 1999,and NSL-KDD datasets.
基金This work is partly supported by the National Key Research and Development Program of China(Grant No.2020YFB1805403)the National Natural Science Foundation of China(Grant No.62032002)the 111 Project(Grant No.B21049).
文摘In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.
基金supported by the grants:PID2020-112675RBC44(ONOFRE-3),funded by MCIN/AEI/10.13039/501100011033Horizon Project RIGOUROUS funded by European Commission,GA:101095933TSI-063000-2021-{36,44,45,62}(Cerberus)funded by MAETD’s 2021 UNICO I+D Program.
文摘The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence(AI)-based analytics,empowering seamless integration across the entire Continuum(Edge,Fog,Core,Cloud).This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning(FL)-based anomaly detection in B5Gnetworks.By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm,which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize normal behavior,the systemorchestrates network intelligence to detect and prevent cyber-attacks.Integrated into a B5G Zero-touch Service Management(ZSM)aligned Security Framework,the proposal utilizes multi-domain and multi-tenant orchestration to automate and scale the deployment of FL-agents and AI-based anomaly detectors,enhancing reaction capabilities against cyber-attacks.The proposed FL architecture can be dynamically deployed across the B5G Continuum,utilizing a hierarchy of Network Intelligence orchestrators for real-time anomaly and security threat handling.Implementation includes FL enforcement operations for interoperability and extensibility,enabling dynamic deployment,configuration,and reconfiguration on demand.Performance validation of the proposed solution was conducted through dynamic orchestration,FL,and real-time anomaly detection processes using a practical test environment.Analysis of key performance metrics,leveraging the 5G-NIDD dataset,demonstrates the system’s capability for automatic and near real-time handling of anomalies and attacks,including real-time network monitoring and countermeasure implementation for mitigation.
文摘Coronary artery anomaly is known as one of the causes of angina pectoris and sudden death and is an important clinical entity that cannot be overlooked.The incidence of coronary artery anomalies is as low as 1%-2%of the general population,even when the various types are combined.Coronary anomalies are practically challenging when the left and right coronary ostium are not found around their normal positions during coronary angiography with a catheter.If there is atherosclerotic stenosis of the coronary artery with an anomaly and percutaneous coronary intervention(PCI)is required,the suitability of the guiding catheter at the entrance and the adequate back up force of the guiding catheter are issues.The level of PCI risk itself should also be considered on a caseby-case basis.In this case,emission computed tomography in the R-1 subtype single coronary artery proved that ischemia occurred in an area where the coronary artery was not visible to the naked eye.Meticulous follow-up would be crucial,because sudden death may occur in single coronary arteries.To prevent atherosclerosis with full efforts is also important,as the authors indicated admirably.
基金supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509,Development of Security Monitoring Technology Based Network Behavior against Encrypted Cyber Threats in ICT Convergence Environment).
文摘In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly detection using AI(Artificial Intelligence)is actively progressing,the encrypted nature of the data poses challenges for labeling,resulting in data imbalance and biased feature extraction toward specific nodes.This study proposes a reconstruction error-based anomaly detection method using an autoencoder(AE)that utilizes packet metadata excluding specific node information.The proposed method omits biased packet metadata such as IP and Port and trains the detection model using only normal data,leveraging a small amount of packet metadata.This makes it well-suited for direct application in IoT environments due to its low resource consumption.In experiments comparing feature extraction methods for AE-based anomaly detection,we found that using flowbased features significantly improves accuracy,precision,F1 score,and AUC(Area Under the Receiver Operating Characteristic Curve)score compared to packet-based features.Additionally,for flow-based features,the proposed method showed a 30.17%increase in F1 score and improved false positive rates compared to Isolation Forest and OneClassSVM.Furthermore,the proposedmethod demonstrated a 32.43%higherAUCwhen using packet features and a 111.39%higher AUC when using flow features,compared to previously proposed oversampling methods.This study highlights the impact of feature extraction methods on attack detection in imbalanced,encrypted traffic environments and emphasizes that the one-class method using AE is more effective for attack detection and reducing false positives compared to traditional oversampling methods.