查看更多>>摘要:The Dynamic Database of Solid-State Electrolyte (DDSE) is an advanced online platform offering a comprehensive suite of tools for solid-state battery research and development. Its key features include statistical analysis of both experimental and computational solid-state electrolyte (SSE) data, interactive visualization through dynamic charts, user data assessment, and literature analysis powered by a large language model. By facilitating the design and optimization of novel SSEs, DDSE serves as a critical resource for advancing solid-state battery technology. This Technical Report provides detailed tutorials and practical examples to guide users in effectively utilizing the platform.
查看更多>>摘要:Medical blockchain data-sharing is a technique that employs blockchain technology to facilitate the sharing of electronic medical data. The blockchain is a decentralized digital ledger that ensures data-sharing security, transparency, and traceability through cryptographic technology and consensus algorithms. Consequently, medical blockchain data-sharing methods have garnered significant attention and research efforts. Nevertheless, current methods have different storage and transmission measures for original data in the medical blockchain, resulting in large differences in performance and privacy. Therefore, we divide the medical blockchain data-sharing method into on-chain sharing and off-chain sharing according to the original data storage location. Among them, off-chain sharing can be subdivided into on-cloud sharing and local sharing according to whether the data is moved. Subsequently, we provide a detailed analysis of basic processes and research content for each method. Finally, we summarize the challenges posed by the current methods and discuss future research directions.
查看更多>>摘要:The metaverse has emerged as a prominent topic with growing interest fueled by advancements in Web 3.0, blockchain, and immersive technologies. This paper presents a thorough analysis of the metaverse, showcasing its evolution from a conceptual phase rooted in science fiction to a dynamic and transformative digital environment impacting various sectors including gaming, education, healthcare, and entertainment. The paper introduces the metaverse, details its historical development, and introduces key technologies that enable its existence such as virtual and augmented reality, blockchain, and artificial intelligence. Further this work explores diverse application scenarios, future trends, and critical challenges including data privacy, technological limitations, and integration issues that must be addressed for the metaverse to reach its full potential. The significance of this study lies in its comprehensive nature, providing insights not only for researchers and practitioners but also for policymakers aiming to navigate the complexities of the metaverse and leverage its capabilities for societal advancements. Finaly, the paper forecast the future where the metaverse plays an integral role in reshaping human interaction, commerce, and creativity, thus emphasizing the need for ongoing research and collaborative efforts to unlock its vast possibilities.
Ali HassanN. Nizam-UddinAsim QuddusSyed Rizwan Hassan...
3499-3559页
查看更多>>摘要:Enhancing the interconnection of devices and systems, the Internet of Things (IoT) is a paradigm-shifting technology. IoT security concerns are still a substantial concern despite its extraordinary advantages. This paper offers an extensive review of IoT security, emphasizing the technology's architecture, important security elements, and common attacks. It highlights how important artificial intelligence (AI) is to bolstering IoT security, especially when it comes to addressing risks at different IoT architecture layers. We systematically examined current mitigation strategies and their effectiveness, highlighting contemporary challenges with practical solutions and case studies from a range of industries, such as healthcare, smart homes, and industrial IoT. Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability. IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities. This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT, security challenges, and AI-driven solutions.
查看更多>>摘要:Quantifying the number of individuals in images or videos to estimate crowd density is a challenging yet crucial task with significant implications for fields such as urban planning and public safety. Crowd counting has attracted considerable attention in the field of computer vision, leading to the development of numerous advanced models and methodologies. These approaches vary in terms of supervision techniques, network architectures, and model complexity. Currently, most crowd counting methods rely on fully supervised learning, which has proven to be effective. However, this approach presents challenges in real-world scenarios, where labeled data and ground-truth annotations are often scarce. As a result, there is an increasing need to explore unsupervised and semi-supervised methods to effectively address crowd counting tasks in practical applications. This paper offers a comprehensive review of crowd counting models, with a particular focus on semi-supervised and unsupervised approaches based on their supervision paradigms. We summarize and critically analyze the key methods in these two categories, highlighting their strengths and limitations. Furthermore, we provide a comparative analysis of prominent crowd counting methods using widely adopted benchmark datasets. We believe that this survey will offer valuable insights and guide future advancements in crowd counting technology.
查看更多>>摘要:As an advanced data science technology, the knowledge graph systematically integrates and displays the knowledge framework within the field of traditional Chinese medicine (TCM). This not only contributes to a deeper comprehension of traditional Chinese medical theories but also provides robust support for the intelligent decision systems and medical applications of TCM. Against this backdrop, this paper aims to systematically review the current status and development trends of TCM knowledge graphs, offering theoretical and technical foundations to facilitate the inheritance, innovation, and integrated development of TCM. Firstly, we introduce the relevant concepts and research status of TCM knowledge graphs. Secondly, we conduct an in-depth analysis of the challenges and trends faced by key technologies in TCM knowledge graph construction, such as knowledge representation, extraction, fusion, and reasoning, and classifies typical knowledge graphs in various subfields of TCM. Next, we comprehensively outline the current medical applications of TCM knowledge graphs in areas such as information retrieval, diagnosis, question answering, recommendation, and knowledge mining. Finally, the current research status and future directions of TCM knowledge graphs are concluded and discussed. We believe this paper contributes to a deeper understanding of the research dynamics in TCM knowledge graphs and provides essential references for scholars in related fields.
Chiranjeevi KarriJose J. M. MachadoJoao Manuel R. S. TavaresDeepak Kumar Jain...
3617-3663页
查看更多>>摘要:The rapid population growth, insecure lifestyle, wastage of natural resources, indiscipline behavior of human beings, urgency in the medical field, security of patient information, agricultural-related problems, and automation requirements in industries are the reasons for invention of technologies. Smart cities aim to address these challenges through the integration of technology, data, and innovative practices. Building a smart city involves integrating advanced technologies and data-driven solutions to enhance urban living, improve resource efficiency, and create sustainable environments. This review presents five of the most critical technologies for smart and/or safe cities, addressing pertinent topics such as intelligent traffic management systems, information and communications technology, blockchain technology, re-identification, and the Internet of Things. The challenges, observations, and remarks of each technology in solving problems are discussed, and the dependency effects on the technologies' performance are also explored. Especially deep learning models for various applications are analyzed. Different models performance, their dependency on dataset size, type, hyper-parameters, and the non-availability of labels or ground truth are discussed.
查看更多>>摘要:This study explores the mechanical behavior of single-crystal copper with silver inclusions, focusing on the effects of dendritic and spherical geometries using molecular dynamics simulations. Uniaxial tensile tests reveal that dendritic inclusions lead to an earlier onset of plasticity due to the presence of high-strain regions at the complex inclusion/matrix interfaces, whereas spherical inclusions exhibit delayed plasticity associated with their symmetric geometry and homogeneous strain distribution. During the plastic regime, the dislocation density is primarily influenced by the volume fraction of silver inclusions rather than their shape, with spherical inclusions showing the highest densities due to their larger volume and higher silver content. Stacking faults, quantified via hexagonal closed-packed atom populations, are strongly correlated with dislocation activity but exhibit transient behavior, indicating that many faults are swept out or transformed during deformation. This transfient effect is observed in all cases, independently of the inclusion size. These findings highlight the complex interplay between inclusion geometry, dislocation activity, and stacking fault evolution in shaping the mechanical properties of copper. The study underscores the need to account for inclusion morphology and defect dynamics when designing advanced copper-based materials and suggests further investigations into the role of dendrite orientation and distribution to enhance material performance in engineering applications.
Kithmini Godewatte ArachchigeMohsin MurtazaChi-Tsun ChengBader M. Albahlal...
3679-3705页
查看更多>>摘要:Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats, with Internet of Things (IoT) security gaining particular attention due to its role in data communication across various industries. However, IoT devices, typically low-powered, are susceptible to cyber threats. Conversely, blockchain has emerged as a robust solution to secure these devices due to its decentralised nature. Nevertheless, the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks, network scalability limitations, and blockchain-specific security vulnerabilities. Blockchain, on the other hand, is a recently emerged information security solution that has great potential to secure low-powered IoT devices. This study aims to identify blockchain-specific vulnerabilities through changes in network behaviour, addressing a significant research gap and aiming to mitigate future cybersecurity threats. Integrating blockchain and IoT technologies presents challenges, including performance bottlenecks, network scalability issues, and unique security vulnerabilities. This paper analyses potential security weaknesses in blockchain and their impact on network operations. We developed a real IoT test system utilising three prevalent blockchain applications to conduct experiments. The results indicate that Distributed Denial of Service (DDoS) attacks on low-powered, blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance, specifically: (1) an average increase in CPU core usage to 34.32%, (2) a reduction in hash rates by up to 66%, (3) an increase in batch timeout by up to 14.28%, and (4) an increase in block latency by up to 11.1%. These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
Sarfaraz NathaFareed A. JokhioMehwish LaghariMohammad Siraj...
3707-3729页
查看更多>>摘要:Surveillance cameras have been widely used for monitoring in both private and public sectors as a security measure. Close Circuits Television (CCTV) Cameras are used to surveillance and monitor the normal and anomalous incidents. Real-world anomaly detection is a significant challenge due to its complex and diverse nature. It is difficult to manually analyze because vast amounts of video data have been generated through surveillance systems, and the need for automated techniques has been raised to enhance detection accuracy. This paper proposes a novel deep-stacked ensemble model integrated with a data augmentation approach called Stack Ensemble Road Anomaly Detection (SERAD). SERAD is used to detect and classify the four most happening road anomalies, such as accidents, car fires, fighting, and snatching, through road surveillance videos with high accuracy. The SERAD adapted three pre-trained Convolutional Neural Networks (CNNs) models, namely VGG19, ResNet50 and InceptionV3. The stacking technique is employed to incorporate these three models, resulting in much-improved accuracy for classifying road abnormalities compared to individual models. Additionally, it presented a custom real-world Road Anomaly Dataset (RAD) comprising a comprehensive collection of road images and videos. The experimental results demonstrate the strength and reliability of the proposed SERAD model, achieving an impressive classification accuracy of 98.7%. The results indicate that the proposed SERAD model outperforms than the individual CNN base models.