Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 1.199
Filter
1.
BMC Oral Health ; 24(1): 758, 2024 Jul 02.
Article in English | MEDLINE | ID: mdl-38956625

ABSTRACT

BACKGROUND: The intrusion of maxillary anterior teeth is often required and there are various intrusion modes with mini-implants in clear aligner treatment. The objective of this study was to evaluate the effectiveness of maxillary anterior teeth intrusion with different intrusion modes, aiming to provide references for precise and safe intrusion movements in clinical practice. METHODS: Cone-beam computed tomography and intraoral optical scanning data of a patient were collected. Finite element models of the maxilla, maxillary dentition, periodontal ligaments (PDLs), clear aligner (CA), attachments, and mini-implants were established. Different intrusion modes of the maxillary anterior teeth were simulated by changing the mini-implant site (between central incisors, between central and lateral incisor, between lateral incisor and canine), loading site (between central incisors, on central incisor, between central and lateral incisor, between lateral incisor and canine), and loading mode (labial loading and labiolingual loading). Ten conditions were generated and intrusive forces of 100 g were applied totally. Then displacement tendency of the maxillary anterior teeth and CA, and stress of the PDLs were analyzed. RESULTS: For the central incisor under condition L14 and for the canine under conditions L11, L13, L23, and L33, the intrusion amount was negative. Under other conditions, the intrusion amount was positive. The labiolingual angulation of maxillary anterior teeth exhibited positive changes under all conditions, with greater changes under linguoincisal loading. The mesiodistal angulation of canine exhibited positive changes under labial loading, while negative changes under linguoincisal loading except for condition L14. CONCLUSIONS: The intrusion amount, labiolingual and mesiodistal angulations of the maxillary anterior teeth were affected by the mini-implant site, loading site, and loading mode. Labial and linguoincisal loading may have opposite effects on the intrusion amount of maxillary anterior teeth and the mesiodistal angulation of canine. The labiolingual angulation of the maxillary incisors would increase under all intrusion modes, with greater increases under linguoincisal loading.


Subject(s)
Cone-Beam Computed Tomography , Dental Implants , Finite Element Analysis , Incisor , Maxilla , Orthodontic Anchorage Procedures , Periodontal Ligament , Tooth Movement Techniques , Humans , Tooth Movement Techniques/methods , Tooth Movement Techniques/instrumentation , Orthodontic Anchorage Procedures/instrumentation , Orthodontic Anchorage Procedures/methods , Periodontal Ligament/diagnostic imaging , Imaging, Three-Dimensional/methods , Cuspid/diagnostic imaging , Orthodontic Appliance Design , Dental Stress Analysis , Biomechanical Phenomena , Orthodontic Appliances, Removable
2.
PeerJ Comput Sci ; 10: e2152, 2024.
Article in English | MEDLINE | ID: mdl-38983193

ABSTRACT

With the rapid extensive development of the Internet, users not only enjoy great convenience but also face numerous serious security problems. The increasing frequency of data breaches has made it clear that the network security situation is becoming increasingly urgent. In the realm of cybersecurity, intrusion detection plays a pivotal role in monitoring network attacks. However, the efficacy of existing solutions in detecting such intrusions remains suboptimal, perpetuating the security crisis. To address this challenge, we propose a sparse autoencoder-Bayesian optimization-convolutional neural network (SA-BO-CNN) system based on convolutional neural network (CNN). Firstly, to tackle the issue of data imbalance, we employ the SMOTE resampling function during system construction. Secondly, we enhance the system's feature extraction capabilities by incorporating SA. Finally, we leverage BO in conjunction with CNN to enhance system accuracy. Additionally, a multi-round iteration approach is adopted to further refine detection accuracy. Experimental findings demonstrate an impressive system accuracy of 98.36%. Comparative analyses underscore the superior detection rate of the SA-BO-CNN system.

3.
J Environ Manage ; 365: 121589, 2024 Jul 03.
Article in English | MEDLINE | ID: mdl-38963969

ABSTRACT

Subsurface dams have been recognized as one of the most effective measures for preventing saltwater intrusion. However, it may result in large amounts of residual saltwater being trapped upstream of the dam and take years to decades to remove, which may limit the utilization of fresh groundwater in coastal areas. In this study, field-scale numerical simulations were used to investigate the mechanisms of residual saltwater removal from a typical stratified aquifer, where an intermediate low-permeability layer (LPL) exists between two high-permeability layers, under the effect of seasonal sea level fluctuations. The study quantifies and compares the time of residual saltwater removal (Tre) for constant sea level (CSL) and seasonally varying sea level (FSL) scenarios. The modelling results indicate that, in most cases, seasonal fluctuations in sea level facilitate the dilution of residual saltwater and thus accelerate residual saltwater removal compared to a static sea level scenario. However, accounting for seasonal sea level variations may increase the required critical dam height (the minimum dam height required to achieve complete residual saltwater removal). Sensitivity analyses show that Tre decreases with increasing height of subsurface dam (Hd) under CSL or weaker sea level fluctuation scenarios; however, when the magnitude of sea level fluctuation is large, Tre changes non-monotonically with Hd. Tre decreases with increasing distance between subsurface dam and ocean for both CSL and FSL scenarios. We also found that stratification model had a significant effect on Tre. The increase in LPL thickness for both CSL and FSL scenarios leads to a decrease in Tre and critical dam height. Tre generally shows a non-monotonically decreasing trend as LPL elevation increases. These quantitative analyses provide valuable insights into the design of subsurface dams in complex situations.

4.
Ambio ; 2024 Jun 29.
Article in English | MEDLINE | ID: mdl-38951461

ABSTRACT

The interplay of climate change, upstream hydropower development, and local water engineering interventions for agricultural production contributes substantially to the transformation of waterscapes and water scarcity in the Vietnamese Mekong Delta. This paper aims to examine how these dynamics are linked to the paradigm shift in water management in An Giang and Ben Tre, the two ecologically distinct provinces that face serious water scarcity in the delta. We used the adaptive management concept to examine how state-led policy directions from food security towards water security enable change in water management that gives priority to water retention. While policy learning is evident, questions remain about how this ad-hoc solution could help address the presently acute water scarcity and water security over the long term. The paper advocates achieving water security should focus not only on diplomatic interventions into upstream climate-development complexities but also local water-livelihood politics.

5.
Conscious Cogn ; 123: 103725, 2024 Jul 05.
Article in English | MEDLINE | ID: mdl-38970921

ABSTRACT

Research surrounding the attentional blink phenomenon - a deficit in responding to the second of two temporally proximal stimuli when presented 150-500 ms after the first - has used a wide variety of target-defining and response features of stimuli. The typical U-shape curve for absolute performance is robust, surviving across most stimulus features, and therefore changes in performance are discussed as dynamics in an attentional system that are nonspecific a stimulus type. However, the patterns of errors participants make might not show the same robustness, and participants' confidences in these errors might differ - potentially suggesting the involvement of different attentional or perceptual mechanisms. The present research is a comparison of error patterns and confidence in those errors when letter target stimuli are defined by either the color of the letter, the presence of a surrounding annulus, or the color of the annulus. Across three experiments, we show that participants erroneously report stimuli that are further away from T2 and they are similarly confident in specifically their post-target errors as their correct responses when annuli define targets, but not when color of the letter defines targets. Experiment 3 provides some evidence to suggest that this error pattern and associated confidence is time-dependent when the color of the annulus defines the target, but not when the color of the letter defines the target. These results raise questions concerning the nature of the errors and possibly the mechanisms of the attentional blink phenomenon itself.

6.
Sensors (Basel) ; 24(11)2024 May 23.
Article in English | MEDLINE | ID: mdl-38894128

ABSTRACT

Intrusion detection systems (IDSs) in wireless sensor networks (WSNs) rely heavily on effective feature selection (FS) for enhanced efficacy. This study proposes a novel approach called Genetic Sacrificial Whale Optimization (GSWO) to address the limitations of conventional methods. GSWO combines a genetic algorithm (GA) and whale optimization algorithms (WOA) modified by applying a new three-population division strategy with a proposed conditional inherited choice (CIC) to overcome premature convergence in WOA. The proposed approach achieves a balance between exploration and exploitation and enhances global search abilities. Additionally, the CatBoost model is employed for classification, effectively handling categorical data with complex patterns. A new technique for fine-tuning CatBoost's hyperparameters is introduced, using effective quantization and the GSWO strategy. Extensive experimentation on various datasets demonstrates the superiority of GSWO-CatBoost, achieving higher accuracy rates on the WSN-DS, WSNBFSF, NSL-KDD, and CICIDS2017 datasets than the existing approaches. The comprehensive evaluations highlight the real-time applicability and accuracy of the proposed method across diverse data sources, including specialized WSN datasets and established benchmarks. Specifically, our GSWO-CatBoost method has an inference time nearly 100 times faster than deep learning methods while achieving high accuracy rates of 99.65%, 99.99%, 99.76%, and 99.74% for WSN-DS, WSNBFSF, NSL-KDD, and CICIDS2017, respectively.

7.
Sensors (Basel) ; 24(11)2024 May 24.
Article in English | MEDLINE | ID: mdl-38894166

ABSTRACT

The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient and accurate results. However, IoMT technology is accompanied by a set of drawbacks in terms of security risks and vulnerabilities, such as violating and exposing patients' sensitive and confidential data. Further, the network traffic data is prone to interception attacks caused by a wireless type of communication and alteration of data, which could cause unwanted outcomes. The advocated scheme provides insight into a robust Intrusion Detection System (IDS) for IoMT networks. It leverages a honeypot to divert attackers away from critical systems, reducing the attack surface. Additionally, the IDS employs an ensemble method combining Logistic Regression and K-Nearest Neighbor algorithms. This approach harnesses the strengths of both algorithms to improve attack detection accuracy and robustness. This work analyzes the impact, performance, accuracy, and precision outcomes of the used model on two IoMT-related datasets which contain multiple attack types such as Man-In-The-Middle (MITM), Data Injection, and Distributed Denial of Services (DDOS). The yielded results showed that the proposed ensemble method was effective in detecting intrusion attempts and classifying them as attacks or normal network traffic, with a high accuracy of 92.5% for the first dataset and 99.54% for the second dataset and a precision of 96.74% for the first dataset and 99.228% for the second dataset.


Subject(s)
Algorithms , Computer Security , Delivery of Health Care , Internet of Things , Humans , Wireless Technology , Cloud Computing , Confidentiality
8.
Sci Total Environ ; 946: 174102, 2024 Jun 20.
Article in English | MEDLINE | ID: mdl-38908572

ABSTRACT

Barrier islands are threatened by climate change as sea-level rise and higher frequency storm surge lead to more flooding and saltwater intrusion. Vegetation plays a vital role in preventing erosion of barrier islands due to aeolian and hydrological forces. However, vegetation on barrier islands is threatened by rising water tables causing hypoxic conditions and storm-surge overwash introducing saline water to the root zone. To better protect barrier island ecosystems, it is critical to identify the relative influence of different hydrological drivers on water table elevation and salinity, and understand how this influence varies spatially and temporally. In this study, three barrier island sites were instrumented with groundwater wells monitoring water level and specific conductance. Using these data, a set of transfer function noise models were calibrated and used to determine the relative influence of hydrologic drivers including precipitation, evapotranspiration, bay and ocean water levels, and wave height on groundwater levels and specific conductance. We found that drivers of water-level change and specific conductance vary strongly among sites, depending primarily on the surface water connectivity and the geology of the island. Sites with close connection to inlets showed more salinization and responded to a larger number of drivers, while sites that were poorly connected to the ocean responded to fewer drivers.

9.
Chemosphere ; 361: 142551, 2024 Aug.
Article in English | MEDLINE | ID: mdl-38852280

ABSTRACT

The fate of volatile organic compounds (VOC) vapors in the unsaturated zone is the basis for evaluating the natural attenuation potential and vapor intrusion risk. Microcosm and column experiments were conducted to study the effects chemical speciation and soil types/properties on the fate of petroleum VOCs in unsaturated zone. The biodegradation and total attenuation rates of the seven VOCs obtained by microcosm experiments in black soil and yellow earth were also generally higher than those in floodplain soil, lateritic red earth, and quartz sand. The VOC vapors in floodplain soil, lateritic red earth, and quartz sand showed slow total attenuation rates (<0.3 d-1). N-pentane, methylcyclopentane, and methylcyclohexane showed lower biodegradation rates than octane and three monoaromatic hydrocarbons. Volatilization into the atmosphere and biodegradation are two important natural attenuation paths for VOCs in unsaturated soil columns. The volatilization loss fractions of different volatile hydrocarbons in all five unsaturated soils were generally in the order: n-pentane (93.5%-97.8%) > methylcyclopentane (77.2%-85.5%) > methylcyclohexane (53.5%-69.2%) > benzene (17.1%-73.3%) > toluene (0-45.7%) > octane (1.9%-34.2%) > m-xylene (0-5.7%). The fractions by volatilization into the atmosphere of all seven hydrocarbons in quartz sand, lateritic red earth, and floodplain soil were close and higher compared to the yellow earth and black soil. Overall, this study illustrated the important roles chemical speciation and soil properties in determining the vapor-phase transport and natural attenuation of VOCs in the unsaturated zone.


Subject(s)
Biodegradation, Environmental , Petroleum , Soil Pollutants , Soil , Volatile Organic Compounds , Volatile Organic Compounds/analysis , Volatile Organic Compounds/chemistry , Petroleum/analysis , Soil/chemistry , Soil Pollutants/analysis , Soil Pollutants/chemistry , Adsorption , Volatilization , Pentanes/chemistry , Pentanes/analysis , Octanes/chemistry , Toluene/chemistry , Toluene/analysis , Benzene/analysis , Benzene/chemistry
10.
J Hazard Mater ; 475: 134804, 2024 Aug 15.
Article in English | MEDLINE | ID: mdl-38880042

ABSTRACT

Microplastics (MPs), omnipresent contaminants in the ocean, could be carried by seawater intrusion into coastal aquifers, which might affect the fate of heavy metals existing in aquifers. Herein, we investigated the release behavior of arsenic (As) in coastal aquifers during MPs-containing seawater intrusion by applying laboratory experiment and numerical simulation. We found that seawater with marine MPs enhanced the release of As in aquifers, especially for dissolved As(V) and colloidal As. Negatively charged MPs competed with As(V) for the adsorption sites on iron (hydr)oxides in aquifers, resulting in the desorption of As(V). In addition, MPs could promote the release of Fe-rich colloids by imparting negative charge to its surface and providing it with sufficient repulsive force to detach from the matrix, thereby leading to the release of As associated with Fe-rich colloid. We also developed a modeling approach that well described the transport of As in coastal aquifer under the impact of MPs, which coupled variable density flow and kinetically controlled colloids transport with multicomponent reactive transport model. Our findings elucidated the enhancement of MPs on the release of As in aquifers during seawater intrusion, which provides new insights into the risk assessment of MPs in coastal zones.

11.
Environ Geochem Health ; 46(7): 254, 2024 Jun 17.
Article in English | MEDLINE | ID: mdl-38884664

ABSTRACT

Submarine Groundwater Discharge (SGD) and Seawater Intrusion (SWI) are two contrary hydrological processes that occur across the land-sea continuum and understanding their nature is essential for management and development of coastal groundwater resource. Present study has attempted to demarcate probable zones of SGD and SWI along highly populated Odisha coastal plains which is water stressed due to indiscriminate-exploitation of groundwater leading to salinization and fresh groundwater loss from the alluvial aquifers. A multi-proxy investigation approach including decadal groundwater level dynamics, LANDSAT derived sea surface temperature (SST) anomalies and in-situ physicochemical analysis (pH, EC, TDS, salinity and temperature) of porewater, groundwater and seawater were used to locate the SGD and SWI sites. A total of 340 samples for four seasons (85 samples i.e., 30 porewater, 30 seawater and 25 groundwater in each season) were collected and their in-situ parameters were measured at every 1-2 km gap along ~ 145 km coastline of central Odisha (excluding the estuarine region). Considering high groundwater EC values (> 3000 µS/cm), three probable SWI and low porewater salinities (< 32 ppt in pre- and < 25 ppt in post-monsoons), four probable SGD zones were identified. The identified zones were validated with observed high positive hydraulic gradient (> 10 m) at SGD and negative hydraulic gradient (< 0 m) at SWI sites along with anomalous SST (colder in pre- and warmer in post-monsoon) near probable SGD locations. This study is first of its kind along the Odisha coast and may act as initial basis for subsequent investigations on fresh-saline interaction along the coastal plains where environmental integrity supports the livelihood of coastal communities and the ecosystem.


Subject(s)
Environmental Monitoring , Groundwater , Salinity , Seawater , Groundwater/chemistry , Seawater/chemistry , India , Environmental Monitoring/methods , Water Movements , Temperature , Seasons
12.
Sensors (Basel) ; 24(12)2024 Jun 20.
Article in English | MEDLINE | ID: mdl-38931786

ABSTRACT

The security of the Industrial Internet of Things (IIoT) is of vital importance, and the Network Intrusion Detection System (NIDS) plays an indispensable role in this. Although there is an increasing number of studies on the use of deep learning technology to achieve network intrusion detection, the limited local data of the device may lead to poor model performance because deep learning requires large-scale datasets for training. Some solutions propose to centralize the local datasets of devices for deep learning training, but this may involve user privacy issues. To address these challenges, this study proposes a novel federated learning (FL)-based approach aimed at improving the accuracy of network intrusion detection while ensuring data privacy protection. This research combines convolutional neural networks with attention mechanisms to develop a new deep learning intrusion detection model specifically designed for the IIoT. Additionally, variational autoencoders are incorporated to enhance data privacy protection. Furthermore, an FL framework enables multiple IIoT clients to jointly train a shared intrusion detection model without sharing their raw data. This strategy significantly improves the model's detection capability while effectively addressing data privacy and security issues. To validate the effectiveness of the proposed method, a series of experiments were conducted on a real-world Internet of Things (IoT) network intrusion dataset. The experimental results demonstrate that our model and FL approach significantly improve key performance metrics such as detection accuracy, precision, and false-positive rate (FPR) compared to traditional local training methods and existing models.

13.
Heliyon ; 10(11): e32396, 2024 Jun 15.
Article in English | MEDLINE | ID: mdl-38933963

ABSTRACT

The impact of seawater intrusion from coast to inland terrain in the Cauvery River Basin (CRB) and Uppanar River Basin (URB) was evaluated based on major ion groundwater chemistry. TDS ranges from 229 to 2260 mg/l, and 408 to 3732 mg/l; Na+ range from 67 to 560 mg/l, and 74 to 1600 mg/l, and Cl- range from 120 to 906 mg/l, and 110 to 3260 mg/l for CRB and URB respectively. Piper Diagram, Hydrochemical Facies Evolution Diagram (HFE-D), rock-water interaction (Gibbs Plots), various bivariate plots viz., TDS vs. Cl-; Na+ vs. Cl-; Ca2+ vs. Cl-; Ca2+ vs. SO4 2-; TH vs. TDS and Principal Component Analysis (PCA) (Cluster and Factor analysis) were used to identify the seawater intrusion from coast to inland aquifers and to understand hydrogeochemical characterization and salinization processes. Piper diagram shows that most of the samples are Na+-Cl- type, HFE-D diagram also shows that most of the samples were saline intrusion type and mixing behavior, while TH vs. TDS plot shows hard fresh to hard brackish type from both the basins. PCA results clearly show the three factors, explaining 84.02 % and 76.67 % variance in URB and CRB. Factor-1 records 53.03 % alteration, with a strong confidence loading of TDS, Na+, Cl-, Ca2+, K+, SO4 2, Total Alkalinity (TA), and Total Hardness (TH) in URB indicating saline nature. A total variance of 46.23 % in CBR is more positively loaded with TH, Mg2+, Ca2+, and SO4 2- indicating rock-water interaction. Cluster analyses of these parameters illustrate the cluster distribution in CRB and URB. In URB, TDS, Na+, and Cl- ions make a cluster with a linkage distance of 5000 m, whereas in CRB, the TDS, Na+, Cl-, and TA ions make a cluster with a linkage distance of 2800 m. The factor and cluster analysis fetched out an effect of intensive use of fertilizers, aquaculture activities, and excessive groundwater exploitation. This technique gave the relationship between various chemical parameters in groundwater. Factor and cluster analysis have proven highly effective in groundwater quality studies. The study concluded that the study area has the threat of saline water intrusion in shallow aquifers with continuous influences of seawater mixing.

14.
Periodontol 2000 ; 2024 Jun 03.
Article in English | MEDLINE | ID: mdl-38831560

ABSTRACT

In patients with advanced periodontal disease, pathological tooth migration may occur, which may require subsequent orthodontic treatment for both aesthetic and functional purposes. When planning orthodontic treatment mechanics, intrusive or extrusive forces are frequently indicated. Understanding tissue reactions during these movements is essential for clinicians when devising a comprehensive orthodontic-periodontal treatment plan. This knowledge enables clinicians to be fully aware of and account for the potential effects on the surrounding tissues. The majority of our understanding regarding the behavior of periodontal tissues in both healthy and compromised periodontal conditions is derived from animal studies. These studies offer the advantage of conducting histological and other assessments that would not be feasible in human research. Human studies are nevertheless invaluable in being able to understand the clinically relevant response elicited by the periodontal tissues following orthodontic tooth movement. Animal and human data show that in dentitions with reduced periodontal support, orthodontic intrusion of the teeth does not induce periodontal damage, provided the periodontal tissues do not have inflammation and plaque control with excellent oral hygiene is maintained. On the contrary, when inflammation is not fully controlled, orthodontic intrusion may accelerate the progression of periodontal destruction, with bacterial plaque remnants being displaced subgingivally, leading to further loss of attachment. Orthodontic extrusion, on the other hand, does not seem to cause further periodontal breakdown in dentitions with reduced periodontal support, even in cases with deficient plaque control. This is attributed to the nature of the tooth movement, which directs any plaque remnants coronally (supragingivally), reducing the risk of adverse effects on the periodontal tissues. This specific type of tooth movement can be leveraged to benefit periodontal conditions by facilitating the regeneration of lost hard and soft periodontal tissues in a coronal direction. As a result, orthodontic extrusion can be employed in implant site development, offering an advantageous alternative to more invasive surgical procedures like bone grafting. Regardless of the tooth movement prescribed, when periodontal involvement is present, it is essential to prioritize periodontal therapy before commencing orthodontic treatment. Adequate plaque control is also imperative for successful outcomes. Additionally, utilizing light orthodontic forces is advisable to achieve efficient tooth movement while minimizing the risk of adverse effects, notably root resorption. By adhering to these principles, a more favorable and effective combined orthodontic-periodontal approach can be ensured. The present article describes indications, mechanisms, side effects, and histological and clinical evidence supporting orthodontic extrusion and intrusion in intact and reduced periodontal conditions.

15.
PeerJ Comput Sci ; 10: e2043, 2024.
Article in English | MEDLINE | ID: mdl-38855244

ABSTRACT

This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. Specifically, the study focuses on assessing BukaGini's effectiveness within the domain of intrusion detection systems (IDS). Recognizing the need for improved feature interaction analysis methodologies in IDS, this research aims to investigate the performance of BukaGini in this context. BukaGini's performance is evaluated across four diverse datasets commonly used in IDS research: NSLKDD (22,544 samples), WUSTL EHMS (16,318 samples), WSN-DS (374,661 samples), and UNSWNB15 (175,341 samples), amounting to a total of 588,864 data samples. The evaluation encompasses key metrics such as stability score, accuracy, F1-score, recall, precision, and ROC AUC. Results indicate significant advancements in IDS performance, with BukaGini achieving remarkable accuracy rates of up to 99% and stability scores consistently surpassing 99% across all datasets. Additionally, BukaGini demonstrates an average reduction in dimensionality of 25%, selecting 10 features for each dataset using the Gini index. Through rigorous comparative analysis with existing methodologies, BukaGini emerges as a promising solution for feature interaction analysis within cybersecurity applications, particularly in the context of IDS. These findings highlight the potential of BukaGini to contribute to robust model performance and propel intrusion detection capabilities to new heights in real-world scenarios.

16.
Sci Rep ; 14(1): 10724, 2024 May 10.
Article in English | MEDLINE | ID: mdl-38730228

ABSTRACT

The challenge of developing an Android malware detection framework that can identify malware in real-world apps is difficult for academicians and researchers. The vulnerability lies in the permission model of Android. Therefore, it has attracted the attention of various researchers to develop an Android malware detection model using permission or a set of permissions. Academicians and researchers have used all extracted features in previous studies, resulting in overburdening while creating malware detection models. But, the effectiveness of the machine learning model depends on the relevant features, which help in reducing the value of misclassification errors and have excellent discriminative power. A feature selection framework is proposed in this research paper that helps in selecting the relevant features. In the first stage of the proposed framework, t-test, and univariate logistic regression are implemented on our collected feature data set to classify their capacity for detecting malware. Multivariate linear regression stepwise forward selection and correlation analysis are implemented in the second stage to evaluate the correctness of the features selected in the first stage. Furthermore, the resulting features are used as input in the development of malware detection models using three ensemble methods and a neural network with six different machine-learning algorithms. The developed models' performance is compared using two performance parameters: F-measure and Accuracy. The experiment is performed by using half a million different Android apps. The empirical findings reveal that malware detection model developed using features selected by implementing proposed feature selection framework achieved higher detection rate as compared to the model developed using all extracted features data set. Further, when compared to previously developed frameworks or methodologies, the experimental results indicates that model developed in this study achieved an accuracy of 98.8%.

17.
Rev Infirm ; 73(301): 35-36, 2024 May.
Article in French | MEDLINE | ID: mdl-38796243

ABSTRACT

The first home visit (VAD) by a nurse from the medical-psychological center (CMP) for a patient who has been out of psychiatric care for a very long time, or who has never benefited from it, is decisive for the follow-up and continuity of care. The attitude and posture of the caregiver are decisive. VAD is an intrusion into a place of life, intimacy and suffering. It upsets a person who has walled himself into a shell, a cocoon, from which the fear of coming out is often massive. Anguish prevents any mobilization towards care. It takes a great deal of skill to create a bond of trust to initiate the idea of care.


Subject(s)
House Calls , Humans , Mental Disorders/therapy , Mental Disorders/nursing , Continuity of Patient Care/organization & administration
18.
Conscious Cogn ; 122: 103708, 2024 Jul.
Article in English | MEDLINE | ID: mdl-38821030

ABSTRACT

Some dissociative experiences may be related, in part, to REM intrusion into waking consciousness. If so, some aspects of dream content may be associated with daytime dissociative experiences. We tested the hypothesis that some types of dream content would predict daytime dissociative symptomology. As part of a longitudinal study of the impact of dreams on everyday behavior we administered a battery of survey instruments to 219 volunteers. Assessments included the Dissociative Experiences Scale (DES), along with other measures known to be related to either REM intrusion effects or dissociative experiences. We also collected dream reports and sleep measures across a two-week period from a subgroup of the individuals in the baseline group. Of this subgroup we analyzed two different subsamples; 24 individuals with dream recall for at least half the nights in the two-week period; and 30 individuals who wore the DREEM Headband which captured measures of sleep architecture. In addition to using multiple regression analyses to quantify associations between DES and REM intrusion and dream content variables we used a split half procedure to create high vs low DES groups and then compared groups across all measures. Participants in the high DES group evidenced significantly greater nightmare distress scores, REM Behavior Disorder scores, paranormal beliefs, lucid dreams, and sleep onset times. Validated measures of dreamed first person perspective and overall dream coherence in a time series significantly predicted overall DES score accounting for 26% of the variance in dissociation. Dream phenomenology and coherence of the dreamed self significantly predicts dissociative symptomology as an individual trait. REM intrusion may be one source of dissociative experiences. Attempts to ameliorate dissociative symptoms or to treat nightmare distress should consider the stability of dream content as a viable indicator of dissociative tendencies.


Subject(s)
Dissociative Disorders , Dreams , Humans , Dreams/physiology , Dissociative Disorders/physiopathology , Adult , Female , Male , Young Adult , Longitudinal Studies , Middle Aged , Sleep, REM/physiology , Adolescent
19.
Mar Environ Res ; 198: 106530, 2024 Jun.
Article in English | MEDLINE | ID: mdl-38691972

ABSTRACT

Seawater intrusion has been a globally significant environmental issue. This paper comprehensively reviews and highlights the research methods of seawater intrusion in China, recommending the potential application of novel radioactive radium-radon isotopes. Geochemical and geophysical techniques have been extensively utilized in studying seawater intrusion in China, including methods such as hydrochemical analysis, groundwater level observations, geophysical survey techniques, and isotope tracing. The former three methodologies boast a lengthier historical application in seawater intrusion field, while the radium-radon tools in isotope tracing, as newcomers, can specifically indicate crucial scientific questions such as seawater intrusion rates, salt groundwater age, water-rock reactions, and preferential flow dynamics. However, it is imperative to acknowledge the limitations inherent in the utilization of radium-radon tools within the realm of seawater intrusion research, as with any other methodologies. Strategic integration of radium-radon tools with other methodologies will propel advancements in the investigation of seawater intrusion in China. While the primary focus is on research methods in China, insights gained from novel radium-radon tools could have broader value for seawater intrusion research and coastal management globally.


Subject(s)
Radium , Radon , Seawater , Water Pollutants, Radioactive , China , Radium/analysis , Seawater/chemistry , Water Pollutants, Radioactive/analysis , Radon/analysis , Radiation Monitoring/methods , Groundwater/chemistry
20.
Sci Total Environ ; 939: 173595, 2024 Aug 20.
Article in English | MEDLINE | ID: mdl-38810738

ABSTRACT

Several studies have reported vapor intrusion (VI) occurring when volatile organic compound (VOC) vapors are transported through subsurface piping systems into building spaces (e.g. conduit VI). Site-specific risk assessment and risk management practices are complicated and evolving for conduit VI, especially at large hazardous waste sites, like Superfund sites, where many stakeholders are involved and have varied interests. Here, we propose a social ecological system (SES) framework as a decision-making tool to inform risk mitigation decisions. We demonstrate the SES framework using field data associated with a Superfund site near San Francisco, California. We evaluate sewer invert elevation and groundwater elevation data, as well as pre- and post- mitigation VOC concentration data within a sewer system. Unexpectedly, the sewer located above the groundwater table was determined to be a potential source of conduit VI risks. The SES framework describes how typical stakeholders associated with the site can affect and be affected by mitigation activities. It informs decisions about mitigation implementation and long-term operation efficacy by considering stakeholder roles and interests. Ultimately, gas siphons were selected as the mitigation technology for the example site. To date, approximately 6 gas siphons have been installed to mitigate conduit VI risks throughout the community. Collectively, our findings advance risk management decisions and highlight key considerations for risk mitigation approaches at hazardous waste sites, including Superfund sites, especially where VI risks are a concern.

SELECTION OF CITATIONS
SEARCH DETAIL
...