Loading [MathJax]/jax/output/SVG/jax.js
Review

Six decades of lateral flow immunoassay: from determining metabolic markers to diagnosing COVID-19

  • Technologies based on lateral flow immunoassay (LFIA), known in some countries of the world as immunochromatographic tests, have been successfully used for the last six decades in diagnostics of many diseases and conditions as they allow rapid detection of molecular ligands in biosubstrates. The popularity of these diagnostic platforms is constantly increasing in healthcare facilities, particularly those facing limited budgets and time, as well as in household use for individual health monitoring. The advantages of these low-cost devices over modern laboratory-based analyzers come from their availability, opportunity of rapid detection, and ease of use. The attractiveness of these portable diagnostic tools is associated primarily with their high analytical sensitivity and specificity, as well as with the easy visual readout of results. These qualities explain the growing popularity of LFIA in developing countries, when applied at small hospitals, in emergency situations where screening and monitoring health condition is crucially important, and as well as for self-testing of patients. These tools have passed the test of time, and now LFIA test systems are fully consistent with the world's modern concept of ‘point-of-care testing’, finding a wide range of applications not only in human medicine, but also in ecology, veterinary medicine, and agriculture. The extensive opportunities provided by LFIA contribute to the continuous development and improvement of this technology and to the creation of new-generation formats. This review will highlight the modern principles of design of the most widely used formats of test-systems for clinical laboratory diagnostics, summarize the main advantages and disadvantages of the method, as well as the current achievements and prospects of the LFIA technology. The latest innovations are aimed at improving the analytical performance of LFIA platforms for the diagnosis of bacterial and viral infections, including COVID-19.

    Citation: Boris G. Andryukov. Six decades of lateral flow immunoassay: from determining metabolic markers to diagnosing COVID-19[J]. AIMS Microbiology, 2020, 6(3): 280-304. doi: 10.3934/microbiol.2020018

    Related Papers:

    [1] Arjumand Seemab, Mujeeb ur Rehman, Jehad Alzabut, Yassine Adjabi, Mohammed S. Abdo . Langevin equation with nonlocal boundary conditions involving a ψ-Caputo fractional operators of different orders. AIMS Mathematics, 2021, 6(7): 6749-6780. doi: 10.3934/math.2021397
    [2] Dinghong Jiang, Chuanzhi Bai . On coupled Gronwall inequalities involving a ψ-fractional integral operator with its applications. AIMS Mathematics, 2022, 7(5): 7728-7741. doi: 10.3934/math.2022434
    [3] Weerawat Sudsutad, Chatthai Thaiprayoon, Aphirak Aphithana, Jutarat Kongson, Weerapan Sae-dan . Qualitative results and numerical approximations of the (k,ψ)-Caputo proportional fractional differential equations and applications to blood alcohol levels model. AIMS Mathematics, 2024, 9(12): 34013-34041. doi: 10.3934/math.20241622
    [4] Weerawat Sudsutad, Jutarat Kongson, Chatthai Thaiprayoon, Nantapat Jarasthitikulchai, Marisa Kaewsuwan . A generalized Gronwall inequality via ψ-Hilfer proportional fractional operators and its applications to nonlocal Cauchy-type system. AIMS Mathematics, 2024, 9(9): 24443-24479. doi: 10.3934/math.20241191
    [5] Qi Wang, Shumin Zhu . On the generalized Gronwall inequalities involving ψ-fractional integral operator with applications. AIMS Mathematics, 2022, 7(11): 20370-20380. doi: 10.3934/math.20221115
    [6] Qing Yang, Chuanzhi Bai, Dandan Yang . Finite-time stability of nonlinear stochastic ψ-Hilfer fractional systems with time delay. AIMS Mathematics, 2022, 7(10): 18837-18852. doi: 10.3934/math.20221037
    [7] Weerawat Sudsutad, Chatthai Thaiprayoon, Sotiris K. Ntouyas . Existence and stability results for ψ-Hilfer fractional integro-differential equation with mixed nonlocal boundary conditions. AIMS Mathematics, 2021, 6(4): 4119-4141. doi: 10.3934/math.2021244
    [8] A.G. Ibrahim, A.A. Elmandouh . Existence and stability of solutions of ψ-Hilfer fractional functional differential inclusions with non-instantaneous impulses. AIMS Mathematics, 2021, 6(10): 10802-10832. doi: 10.3934/math.2021628
    [9] Thabet Abdeljawad, Sabri T. M. Thabet, Imed Kedim, Miguel Vivas-Cortez . On a new structure of multi-term Hilfer fractional impulsive neutral Levin-Nohel integrodifferential system with variable time delay. AIMS Mathematics, 2024, 9(3): 7372-7395. doi: 10.3934/math.2024357
    [10] Choukri Derbazi, Zidane Baitiche, Mohammed S. Abdo, Thabet Abdeljawad . Qualitative analysis of fractional relaxation equation and coupled system with Ψ-Caputo fractional derivative in Banach spaces. AIMS Mathematics, 2021, 6(3): 2486-2509. doi: 10.3934/math.2021151
  • Technologies based on lateral flow immunoassay (LFIA), known in some countries of the world as immunochromatographic tests, have been successfully used for the last six decades in diagnostics of many diseases and conditions as they allow rapid detection of molecular ligands in biosubstrates. The popularity of these diagnostic platforms is constantly increasing in healthcare facilities, particularly those facing limited budgets and time, as well as in household use for individual health monitoring. The advantages of these low-cost devices over modern laboratory-based analyzers come from their availability, opportunity of rapid detection, and ease of use. The attractiveness of these portable diagnostic tools is associated primarily with their high analytical sensitivity and specificity, as well as with the easy visual readout of results. These qualities explain the growing popularity of LFIA in developing countries, when applied at small hospitals, in emergency situations where screening and monitoring health condition is crucially important, and as well as for self-testing of patients. These tools have passed the test of time, and now LFIA test systems are fully consistent with the world's modern concept of ‘point-of-care testing’, finding a wide range of applications not only in human medicine, but also in ecology, veterinary medicine, and agriculture. The extensive opportunities provided by LFIA contribute to the continuous development and improvement of this technology and to the creation of new-generation formats. This review will highlight the modern principles of design of the most widely used formats of test-systems for clinical laboratory diagnostics, summarize the main advantages and disadvantages of the method, as well as the current achievements and prospects of the LFIA technology. The latest innovations are aimed at improving the analytical performance of LFIA platforms for the diagnosis of bacterial and viral infections, including COVID-19.


    A network can be seen as a tangible manifestation of interconnected components. When comparing industrial networks to social networks, communication networks, or electrical networks, it becomes apparent that the entities involved in industrial networks are active participants in economic processes. These networks play a vital role in converting raw materials into the end products and services that are ultimately consumed by the public [1,2]. Consequently, the relationships between actors within industrial networks are often conceptualized through financial transactions that occur within the framework of long-term partnerships. These interconnected links are what make industrial networks viable and successful [3,4]. Typically, networks are utilized for data transfer, and certain networks are better suited for handling specific data volumes. Industrial networks enable the connection of various devices over long distances, facilitating communication between them by efficiently transmitting and receiving substantial volumes of data [5]. Therefore, the number of internet-connected devices in industrial settings has experienced a recent increase, primarily driven by emerging technologies in Internet of Things (IoT) networks [6]. While these technologies make administrative tasks easier, they also face the challenge of cyber attacks. One such system commonly used in industrial environments is Supervisory Control and Data Acquisition (SCADA) [7]. Sodinokibi, an affiliate of REvil, launched a Stuxnet [8] attack against Acer, while the Darkside cyber-criminal organization launched an attack against Colonial Pipeline [9].

    Recently, hackers have been targeting not just traditional commercial networks but also industrial networks[10]. Twenty-one lines of code were demonstrated by the US government in 2007 as a potential means of damaging a power plant generator [11]. To render an out-of-phase generator, unless the attackers connected and disconnected it from the grid on a regular basis [12]. More than 80, 000 people in Ukraine were left without electricity after cyber-criminals hijacked the networks of two power distribution companies in late 2015 and early 2016 [13]. Hackers got into a German steel firm in 2015 and tampered with a blast furnace, severely damaging the plant [14]. An attack scenario is illustrated in Figure 1. These attack scenarios show that traditional systems cannot be adequately protected using standard security methods. Consequently, cyber security is increasingly becoming an inherent component of today's industrial networks [15].

    Figure 1.  An attack scenario on a device in the network.

    Numerous security solutions, such as intrusion detection systems (IDS) based on machine learning (ML) and deep learning (DL) models [16], have been proposed by several research studies to protect industrial networks from both known and unknown (zero-day) attacks[17]. An IDS is software that monitors the network for any suspicious activities, like a failed network intrusion attempt or the use of a hacked account [18]. An IDS is considered to be the most effective form of security because it is designed to identify intrusions by spotting unusual anomalies in sensor data or actuator activity [19]. Hence, an IDS plays a crucial role in preserving the security of industrial networks [20].

    There are a number of problems with the current batch of IDSs [21], such as poor detection rates, excessive false positives, and sluggish real-time functionality during attempted impersonations [22]. Due to insufficient security solutions, the attacker breaks the firewall to attack the networks, which results in a huge loss of confidential data of the industrial networks. They either sneak into the network and snitch the sensitive information without making any changes, or they obtain unauthorized access and modify the confidential data by encrypting, deleting, or tampering with it, thus, badly damaging the industrial network. The detection of malicious attacks in industrial networks is crucial, as these attacks can result in system failures, network disruptions [23], data damage, or the theft of confidential information [24]. Thus, enhancing the security of industrial networks necessitates the creation of reliable and efficient systems for detecting anomalies, based on continuous monitoring of the actual state of the system.

    To automatically detect malicious attacks in real-time, DL algorithms exhibit a superior performance compared to traditional ML algorithms, particularly when handling large amounts of data[25]. DL is highly effective in detecting zero-day attacks and achieving a high detection rate [26], as it has the capability to automatically identify correlations within the data [27]. Therefore, in this study, DL algorithms convolutional neural networks (CNN) and deep belief networks (DBN) are used to develop an IDS which specifically meets the requirements of industrial network security. To improve detection rates while lowering training and generalization errors, we have proposed an integrated intrusion detection model that comprises three layers namely CNN, DENSE, and DBN. The reason for choosing CNN and DBN for IDS is due to their superior performance compared to other ML and DL methods [28]. The results show that the proposed model offers an optimal performance within a shorter time frame when compared to other models.

    With the rise of interconnected networks, industrial networks are now relying on the vast amount of information available online. However, increasing integration has left industrial network security exposed to a variety of cyberattacks [29]. As such, it is imperative to integrate measures to detect these potential attacks and establish defense mechanisms [30]. One of the most effective solutions is the use of IDSs.

    These systems keep an eye out for any suspicious behavior on a network and can spot intrusions by seeing potentially harmful abnormalities in sensor data or actuator activity [19]. The primary goal of this research study is to develop an improved model for IDSs that provides optimal accuracy rates and enhances the performance of evaluation measures used in experiments [31].

    The use of ML and time series-based anomaly detection methods in [32] helps in monitoring industrial operations data present in networks for signs of cyber-attacks. The data analyzed include Modbus-based gas pipeline control traffic and OPC UA-based batch processing traffic. The resulting accuracy of 90.8% is slightly worse than before. The F1-score is doing quite well with a 94.9% recall. The algorithms still work well, despite a large amount of missing data in this dataset. In actual use, this will allow attacks on industrial networks to go undetected, which is a major security risk. To improve safety, more resources are needed.

    The knowledge distillation triplet convolution neural network (KD-TCNN) model was developed to enhance the performance of IDS in industrial CPS. The proposed model reduces the computational cost and size by 86% while maintaining a 0.4% drop in accuracy compared to the current model. To process and analyze huge volumes of data and comprehend the relationships between categories in the teacher network, knowledge distillation aims to make the student network's outputs identical to those of the teacher network. To perform an efficient detection of intrusion, the model must undergo two stages of training: first, the preliminary training of the teacher model, and second, the training of the KD-TCNN model. To bridge the gap between similar inputs for knowledge distillation, deep metric learning is applied, which improves the performance of the student model [33].

    The data from the Integrated Automation lab's process control plant was utilized to gather metrics pertaining to ICS. CNNs were employed to assess the efficiency of detecting injection attacks. A three-layer CNN architecture with rectified linear activation unit (ReLU) activation and a SoftMax classification layer was constructed to distinguish between benign and malicious data. The proposed CNN model's efficacy was gauged through a range of metrics such as F1-score, accuracy, recall, precision, and Cohen's kappa coefficient. In terms of performance, CNN demonstrated a superiority over other deep learning algorithms. However, the outcome depends on the program and data utilized. By combining various DL and ML techniques, the effectiveness of the security mechanism can be further improved. Alternative DL techniques such as recurrent neural networks (RNN) can also be employed [34].

    The intrusion detection system based on CNN has the capability to identify different attack types, which were evaluated using datasets such as Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) and University of New South Wales-Network Behavior 15 (UNSW-NB 15). Performance indicators such as recall, F1-score, and precision, were calculated and contrasted to those of other DL techniques. A CNN has been tested on the NSL-KDD and UNSW-NB 15 datasets for intrusion detection, resulting in an improved detection accuracy when compared to previous CNN-based methods. However, when it came to classifying attacks with multiple classes, the CNN did not perform better than other DL-based IDSs, such as SAE and DBN. For a more specific and accurate development, creating a dataset within the ICS context should be considered. MATLAB can be used to capture real-time network traffic data and DL algorithms can then be applied to this network for enhanced results [35].

    The use of a Stacked Auto-encoder (SAE) combined with a CNN can reduce high-dimensional data to generalizations and essential characteristics that describe the machine tool's operating state. The process begins with the use of an unsupervised SAE for generic feature extraction from industrial process data. The proposed model's effectiveness in the updated production line is then validated by fine-tuning a one-dimensional CNN classifier with supervised data. It is evident from the experimental results that the proposed model is a potent and versatile solution for monitoring machine tool production data, minimizing the complexity features with high-dimensional, and having positive economic impacts on the industry [36].

    A proposed model for SCADA [37] network data detection has been suggested as a means of creating a secure architecture for ICS networks. The proposed architecture creates two ensemble-based detection methods by combining a DBN with a conventional classifier, such as a support vector machine (SVM). The results of the experiments support the effectiveness of the proposed DBN ensemble approach in addressing the DBN structure selection problem and providing dependable attack detection for the secure operation of SCADA systems. However, the approach has some limitations, including using a neural network (NN)-based classifier within the DBN framework. Although DBNs are effective in extracting features from raw data, the NN-based classifiers they use can limit their pattern recognition precision. Additionally, the proposed training method for the DBN is not designed for real-time situations [38].

    A proposed method for diagnosing intrusions in industrial robots, based on joint DBN information fusion technology, addresses the limitations of the traditional fault diagnosis model. These limitations include low precision, inefficiency, instability, and a slow time-to-diagnosis in cases of multiple faults. To test the method, the researchers chose an industrial robot with a problem in one of its joint bearings. The results showed that the developed fault diagnostic approach is effective, with a test set accuracy of 97.96%. The proposed method has several advantages over the traditional diagnostic model, including a faster diagnosis time and an improved diagnosis efficiency, making it better suited for diagnosing multiple faults [39].

    The detection of cyberattacks on SCADA-based industrial control systems (ICS) is addressed in a study that introduces the first-ever population extremal optimization (PEO)-based DBN network detection technique (PEO-DBN). To further improve the detection performance, a new ensemble learning strategy, called EnPEO-DBN, is proposed to combine the PEO-DBN approach. The simulation results depicted that the proposed PEO-DBN and EnPEO-DBN have superior performance compared to other methods and can be considered promising solutions for detecting cyberattacks on SCADA-based ICS. To speed up the fitness evaluation process, future work can take advantage of surrogate-assisted models, such as a Gaussian process regression or a Bayesian optimization [40].

    As a means of securing IoT networks, [41] presented a hybrid DBN cyber intrusion detection system. In order to construct better attack detectors for network traffic, researchers have studied and addressed DBN's drawbacks. The results from the analysis are then integrated into a SoftMax Regression model to improve the security and accuracy of detection. The hybrid DBN model was trained and evaluated based on the original and unaltered dataset generated by the system. In terms of detecting and classifying intrusions, the suggested hybrid DBN model had a 99.72 % success rate. According to these findings, the model outperformed the current IDS. Further, the hybrid model offered a roughly 5% greater accuracy improvements compared to pre-hybrid DBN-based systems.

    An interesting approach is used as a solution that aims to combine the strengths of two popular machine learning techniques: Long short-term memory (LSTM) and DBNs. By using LSTM to enhance the representation power of traditional shallow machine learning, and DBNs to extract non-linear components from the data, the researchers hope to achieve both high accuracy and high processing speed. The results of their approach appear to be promising, with recall rates as high as 97.3% and area under the curve (AUC) as high as 0.927, suggesting that this combination of techniques could be effective for solving complex problems in machine learning. However, as mentioned, this area of research is still being explored, and more work needs to be done to fully understand the trade-offs between precision, speed, and other factors when using this hybrid approach [42].

    The KDD-98 dataset, produced by the "Defense Advanced Research Projects Agency's Knowledge Discovery and Data Mining program" in 1998, was the first publicly available intrusion detection dataset, though it contained flaws like duplicate records [43]. NSL-KDD, introduced in 2009, improved on KDD-98, though KDD-99 still had issues like outdated attack methods and inaccurate network parameters [43]. The Cooperative Association for Internet Data Analysis (CAIDA) dataset, introduced in 2007 had limited information on DDoS attacks [44]. The University of Brescia (UNIBS) database (2009) by Gringoli et al. focused on profiling popular web apps but was unsuitable for detecting anomalies [45]. The Information Security Centre of Excellence (ISCX) 2012 dataset by Shiravi et al. had two network configurations (α and β) but lacked Hypertext Transfer Protocol Secure (HTTPS) protocol traffic [46]. DDoS 2016, released in 2016 by Alkassasbeh et al., was not useful for multi-step attack detection. The ADFA Linux (ADFA-LD) and ADFA Windows Datasets (ADFA-WD) were created using system call traces, but attackers can hide their tracks. Canadian Institute for Cybersecurity Intrusion Detection System (CIC-IDS) 2017 had 80 network parameters from a five-day simulated test but had missing values and no information on multi-stage attacks. TUIDS, developed by Tezpur University, used a hybrid of packet and flow formats but couldn't simulate multi-step attacks.

    The new Multi-Step Cyber Attack (MSCAD) [47] dataset overcomes the limitations of prior methods by serving as a new benchmark for IDS. The MSCAD stands out with its ability to detect complex, multi-stage attacks, which are carried out through a variety of techniques such as volume-based DDoS, site crawling, and network-based DDoS. This dataset is built on a full network infrastructure and contains no duplicates or missing data, making it ready for use in training IDS systems without any further cleaning [48]. The attributes of the MSCAD have been compared to those in the literature, including the dataset used, evaluation measures, k-fold validation, balancing strategy, and response time, as presented in Table 1.

    Table 1.  Comparison of previous literature.
    Author Dataset Evaluation measure K-Fold validation Balancing strategy Response time
    [32] Modbus, OPC-UA Accuracy, Precision, Recall, F-1 score No No High
    [38] SCADA network Accuracy, Precision Yes No Medium
    [39] Industrial robot Accuracy No No Low
    [40] SCADA network Accuracy No No Medium
    [35] NSL-KDD, UNSW-NB15 Accuracy, Precision, Recall, F-1 score Yes No Medium
    [34] PCP from IAE Accuracy, Precision, Recall, F-1 score No No High
    [41] SCADA network Accuracy, F-1 score No No Medium
    [33] NSL-KDD, CIC-IDS 2017 Accuracy, Precision, F-1 score Yes Yes High
    [42] NSL-KDD Accuracy, Precision, Recall, F-1 score No No Medium
    [36] Collected data from industry production line Accuracy No No Medium
    Proposed Model Multi-step cyber attack dataset Accuracy, Precision, Recall, F-1, G-mean score Yes Yes Low

     | Show Table
    DownLoad: CSV

    The following section comes up with a comprehensive overview of the proposed methodology. The data has undergone pre-processing and has been trained and tested. The diagram in Figure 2 showcases the general structure and flow of the model. The implementation involves the use of two DL algorithms, with a thorough explanation of how the CNN and DBN components are integrated into the proposed scheme.

    There are several public network datasets available for intrusion detection, such as KDD-98, NSL-KDD [43], CAIDA [44], UNIBS [45], ISCX 2012 [46], DDos 2016, ADFA-LD and ADFA-WD, CIC-ID 2017, and TUIDS. This experiment makes use of the MSCAD [20] dataset for industrial networks, as it is the latest dataset available and features a variety of attack scenarios that are well-suited for detecting multi-step attacks, as demonstrated in Table 2.

    Table 2.  Multi-step cyber attack dataset.
    Classe Encoding Records
    Brute force 0 88, 502
    HTTP DDoS 1 641
    ICMP flood 2 45
    Normal 3 28, 501
    Port scan 4 11, 081
    Web crawler 5 28

     | Show Table
    DownLoad: CSV

    Before analyzing a data set, it must undergo data cleaning, which consists of correcting or removing any incorrect, redundant, or otherwise undesired information. Data cleansing aims to remove ambiguity and other issues from your data. We must have clean data (i.e., information that our costly data analysis tools can process [49]).

    Each dataset consists of many entries. Before training a model, inspecting a dataset for missing and undefined entries is essential. Training the model will produce errors if any data record includes an unexpectedly blank or undefined value. We should ensure that the dataset does not have any confusing data before training a model by cleaning it first. Several approaches [50,51] are available for removing redundant or unclear entries from data sets. The dataset was cleansed using Python libraries (Pandas and NumPy) [52] and functions that provide true or false Boolean values to test for missing and enduring values. If this is true, then some of the values in the dataset are missing or infinite; however, if it is false, then the cleaning of the dataset is completed. The datasets were cleaned by converting all undefined records into blank spaces. Once the undefined values were transformed, the dataset was further refined by removing all empty entries and replacing any remaining undefined values with empty ones.

    To achieve numericalization, one must first construct a string-to-integer encoding system and then individually apply it to each string. Typically, the attributes or labels of the datasets we work with, are available throughout multiple columns. These labels can be composed of either words or numbers. Typically, training data is labeled with either a phrase that makes it understandable or in a human-readable format. The process of label encoding [53] involves transforming human-readable labels into a format that can be processed by computers. This allows machine learning [54] algorithms to make more informed decisions based on these labels and is an essential step in the preparation of structured datasets for supervised learning. The label encoder searches for labels ranging from zero to n-1 and gives numerical values to these labels. This experiment quantifies categorical attributes using the label encoder method.

    During machine learning model training, data normalization reduces the impact of feature scales. Thus, our model can converge to accurate weights, therefore enhancing its accuracy. Normalization increases the model's capacity to predict outputs by bringing the features into a condition of homogeneity. The process of rescaling a numeric attribute with a real value to the interval 0 to 1 is what normalization means. This decreases the effect of the feature size on the training procedure [55]. Consequently, this leads to improved coefficients following the training. Normalization is a technique applied to datasets with varying value ranges, such as when one feature has values ranging from 0 to 1 and another has values ranging from 100 to 1000. This helps to equalize the data and makes it easier for the machine-learning model to be trained effectively.

    The selected dataset in this experiment has features with varied range values; for example, some features have extremely high range values while others have extremely low range values. If we train the model using these variables, it will fail. This problem can be addressed by employing the normalization approach, which can be done by this equation to transform all non-zero values into one.

    Xnorm=XXminXmaxXmin (3.1)

    The experiment's model is based on a dataset with a substantial number of records. Prior to training and testing the model, it's critical to guarantee that each class has the same amount of examples. This can be achieved through the use of balancing techniques such as oversampling and undersampling. Oversampling raises the minority class's percentage to the majority class, whereas undersampling decreases the majority class's share to match the minority class. However, oversampling can lead to overfitting because it involves repetitive data. The dataset used for this experiment was imbalanced, so we applied two balancing techniques, the Synthetic Minority Oversampling Technique (SMOTE) [56] and SMOTETomek, to ensure that the dataset was representative of the entire population.

    SMOTE generates synthetic information using a k-nearest neighbor algorithm. The first phase of SMOTE involves randomly selecting data from the minority class and then determining those data's k-nearest neighbors. Then, the random data and the k-nearest neighbor are utilized to generate synthetic data. There is a version of the SMOTE called the Borderline-SMOTE. The name implies a connection to borders, which is indeed the case. In Borderline-SMOTE, synthetic data are generated only along the decision boundary between the two classes, whereas in SMOTE, they are generated randomly between the two classes [57]. The SMOTEENN and SMOTETomek sampling methods include oversampling (SMOTE) and undersampling (ENN, Tomek). SMOTE generates synthetic class samples to establish a statistical parity, whilst the latter is used to clean redundant information at the boundary of two classes to increase separation.

    Figure 2.  The Proposed architecture for CNN, DENSE, and DBN.

    We have proposed an integrated intrusion detection model that is a combination of CNN and DBN. The proposed model contains three layers: CNN, DENSE, and DBN, which are depicted in Figure 2. All of the models utilized in the proposed model's layers are extensively explained for understanding. The model enhanced the performance for the detection of attacks [58] and reduced the response and training time in industrial networks.

    Convolutional neural networks (CNNs) are a powerful tool for discovering features, as they reduce the need for human input[59]. The primary objective of CNN is to learn the most significant features of the input data [60]. A CNN is comprised of pooling layers, convolutional layers, and fully connected (FC) layers [61], which can be stacked to form a CNN architecture as illustrated in Figure 3. These layers also incorporate an activation function, which is a crucial aspect of their function [62]. The convolutional layer performs a mathematical operation, known as the convolution, between the input and a filter of size M×M to extract features from the input data. As the filter is moved over the input, the dot product of its M×M dimensions and the input is calculated, and the output is forwarded to the succeeding layer [63].

    Figure 3.  Architecture of convolutional neural network.

    The pooling layer commonly comes after the convolutional layer, reduces the size of the feature matrix, expedites training, and minimizes the number of parameters to avoid the overfitting problem. The pooling layer typically follows the convolutional layer and serves to reduce the size of the feature matrix, speed up training, and reduce the number of parameters to prevent overfitting issues [64].

    The neurons, weights, and biases in a fully connected (FC) layer play a significant role in establishing connections between the neurons of consecutive layers. These layers are usually the final ones to be added in a CNN architecture and precede the output layer. A significant aspect of CNN models is the activation function, which determines which pieces of information from the model should be forwarded to the output nodes and which should be disregarded, thereby making the network less linear. The activation functions in a CNN model are responsible for determining whether a neuron is activated or not [65].

    The proposed model incorporates a DENSE layer for enhanced and expedited responses. This layer effectively combines CNN and DBN. The layer has 66 parameters on both the input and output sides. The ReLU (rectified linear activation unit) was utilized in this experiment. To better represent complicated relationships between the inputs and outputs of a neural network, the ReLU function transforms the linear function's output into a nonlinear one. The output of each neuron in a particular layer of a neural network is transmitted into the ReLU function. The output of the ReLU function is then utilized as the input for the subsequent neural network layer. The ReLU function efficiently solves the vanishing gradient problem and is significantly quicker than earlier activation functions. The vanishing gradient problem hinders the network's ability to learn when the gradient of the loss function with respect to the network's weights becomes negligible. Given that the binary derivative of the ReLU function, proves the effectiveness for non-negative values between 0 and 1, it has the potential to address the problem of vanishing gradients in deep neural networks. This property ensures that the gradient does not decrease excessively as the network becomes deeper. It is mathematically represented as:

    RELU(x)={0 if x<0x if x>=0 (3.2)

    The machine learning technology known as a DBN differs significantly from a DNN in several significant ways. They use a feed-forward neural network to process networks and feature a feed-forward architecture with numerous hidden layers. DBNs were designed to replace conventional neural networks during deeply layered network training because of their sluggish learning, the tendency to become caught in local minima due to poor parameter selection, and a necessity for many training datasets [66].

    The deep belief network's unsupervised learning algorithm is made up of belief networks and restricted boltzmann machines (RBMs). DBN is a multi-layered belief network, similar to a perceptron and backpropagation neural network, where each layer must be trained before training the DBN as a whole. This is achieved by using the greedy algorithm, which trains the RBMs one by one until they are all trained. DBN has a layered architecture, with the upper two levels being associative memory and the bottom layer consisting of visible units. The relationships between the lower layers are indicated by arrows pointing toward the layer closest to the data.

    The lowest layers of the DBN use directed acyclic connections to convert the associative memory into quantifiable data, with the lowest layer of visible units accepting either binary or real data as the input. Like RBM, DBN has no intra-layer connections, with hidden units representing the characteristics that embody the relationships in the data as represented in Figure 4. The two levels are linked by a matrix of proportional weights, W, with the units of each layer being connected to the layer above them [66]. Common activation functions used in DBN include ReLU, SoftMax, tanH, and sigmoid, each with a specific use. Sigmoid and SoftMax functions are typically used for binary classification models, while SoftMax functions are used for multiclass classification using Eq (3.3).

    σ(z)i=eziKj=1ezj (3.3)
    Figure 4.  Architecture of deep belief network.

    The proposed model is implemented using Python, version 3.9, because it is a language that is frequently used for these kinds of studies. We used the Keras package of the TensorFlow library because Keras is easy to implement and it is a structural package. For coding purposes, the Jupyter Notebook was utilized since it displays the results after every code cell. In this experiment, Windows 10 Pro was used with an I5-6th Gen Laptop. The laptop contained a 2.4 GHz processor and 8 GB of RAM.

    The model's performance was assessed through an evaluation process. An improvement in the model's results leads to an increase in its performance, while subpar results reveal differences in performance. Researchers often validate the model using accuracy, precision, recall, F1-score, and G-mean score based on the false negative (FN), true negative (TN), false positive (FP), and true positive (TP). The model's performance is evaluated in terms of attack detection using various metrics. During the model development, 80% of the dataset was utilized and pre-processed. The data were then subjected to evaluation and the performance was analyzed based on these metrics [67].

    Accuracy in a machine learning classification model refers to the fraction of accurate classifications to the total number of negative and positive observations. Precision measures the accuracy of positive predictions and is equivalent to reliability and positive predictive value. Recall measures the model's capability to identify TP results and is synonymous with the TP rate. The F1-score combines precision and recall to provide a single metric that reflects the model's overall performance. The geometric mean, which is calculated by taking the nth root of the product of all numbers in a set, where n represents the number of observations, provides a single equivalence threshold that combines the true negative rate with the true positive rate.

    GM=nx1×x2×...xn (4.1)

    In our study, we carried out experiments for the proposed model using two approaches. The first experiment involved comparing our proposed model with traditional models without utilizing any balancing strategy. In the second experiment, we compared the proposed model with other models using two balancing techniques: SMOTE and SMOTETomek. The proposed model was evaluated using the Multi-Step Cyber-attack dataset.

    The performance of the proposed approach was evaluated against the results from [48] in terms of the G-mean score, as depicted in Figure 5. Our proposed approach outperformed the G-mean scores of the Decision Tree (DT) and Random Forest (RF) in [48]. During the training process, five epochs were used. The G-mean score for the proposed approach was 0.813, which is more optimum than [48] scores of 0.710 and 0.650. The model has been enhanced by incorporating the Adam optimizer, with the loss function set as sparse categorical entropy. The activation function of SoftMax was used in the output layer.

    The proposed model outperformed all the other traditional models and also outperforms the accuracy score of [47], as shown in Table 3. The comparison between the CNN and the proposed approach is illustrated in Figure 6. The proposed model achieved the highest results for all selected metrics among all the models, as indicated in Table 3. Furthermore, the response time of the proposed model was less compared to other models. The proposed model was tested using 3220 instances with a batch size of 32 and verbose set to 1.

    Table 3.  Scores without balancing strategy.
    References Mode Accuracy Precision Recall F1-score G-Mean
    [47] 0.825 0.942 0.911 0.926 x
    [48] DT x x x x 0.71
    RF x x x x 0.65
    Other techniques NB 0.787 0.462 0.627 0.313 x
    DNN 0.687 0.114 0.166 0.135 x
    LSTM 0.99 0.708 0.668 0.682 x
    GRU 0.97 0.554 0.522 0.532 x
    CNN 0.993 0.813 0.77 0.788 x
    RNN 0.99 0.777 0.753 0.763 x
    Proposed method CNN-DBN 0.996 0.82 0.779 0.801 0.81

     | Show Table
    DownLoad: CSV
    Figure 5.  G-mean without balancing strategy.
    Figure 6.  Evaluation without balancing strategy.

    The proposed approach was compared with [47] and with [48] using the SMOTE balancing strategy, as shown in Figure 7. The results show that the proposed approach outperforms [47] with higher accuracy, precision, recall, and F1-score and [48] higher G-mean scores. The training process was conducted over five epochs and the G-mean score for the proposed approach was 0.975, while the G-mean scores for [48] using DT and RF were 0.780 and 0.790, respectively. This indicates the superiority of the proposed model. The sparse categorical entropy loss function was utilized in the training process, and the model was tested on the Adam optimizer. The output layer was activated using the SoftMax activation function for multi-class classification.

    The proposed model was compared to other traditional models, as shown in Table 4, and the results indicate that it surpassed their performance. The comparison between the CNN and the suggested model using SMOTE is presented in Figure 8. The proposed model exhibits the highest accuracy, recall, precision, and F1-score score when compared to the other models, as displayed in Table 4. Additionally, it has a faster response time than the other models. The performance of our model was evaluated on the MSCAD dataset, using 13, 276 instances with a batch size of 32 and verbose set to 1. The results confirm that the proposed approach outperforms the other models, with 20% of the data being used for testing.

    Table 4.  Scores with SMOTE.
    References Model Accuracy Precision Recall F1-score G-Mean
    [47] 0.825 0.942 0.911 0.926 x
    [48] DT x x x x 0.78
    RF x x x x 0.79
    Other techniques NB 0.641 0.644 0.641 0.573 x
    DNN 0.166 0.027 0.166 0.047 x
    LSTM 0.97 0.97 0.971 0.97 x
    GRU 0.943 0.932 0.945 0.943 x
    CNN 0.972 0.971 0.972 0.971 x
    RNN 0.954 0.954 0.956 0.955 x
    Proposed method CNN-DBN 0.976 0.976 0.975 0.975 0.97

     | Show Table
    DownLoad: CSV
    Figure 7.  G-Mean with SMOTE.
    Figure 8.  Evaluation with SMOTE.

    Our proposed approach surpassed the [47] accuracy, precision, recall, and F1-score and achieved a SMOTETomek G-mean score of 0.978, as demonstrated in Figure 9. This score succeeds the G-mean scores of both the DT and RF methods described in [48]. The G-mean scores for [48] DT and RF were 0.830 and 0.820, respectively, showcasing the superior performance of our model. The model was trained using the Adam optimizer, and the activation function named SoftMax was utilized in the final layer. The process of training took place over five epochs and utilized the sparse categorical entropy loss function.

    Figure 9.  G-Mean with SMOTETomek.
    Figure 10.  Evaluation with SMOTETomek.

    In Figure 10, we compared the performance of the proposed technique with that of a CNN using SMOTETomek. The results are presented in Table 5, which includes the results of both the proposed model and other traditional models. The proposed model outperforms other models in terms of F1-score score, precision, recall, and accuracy, as demonstrated in Table 5. Additionally, our model has a faster response time compared to other models. The model was tested on 13, 233 instances using a batch size of 32 and a verbose level of 1 on the MSCAD dataset. The results clearly show that the suggested model produces more optimal scores than other models, even though the scores of the CNN model are slightly lower. However, the CNN model has a longer response time compared to the proposed approach.

    Table 5.  Scores with SMOTETomek.
    References Model Accuracy Precision Recall F1-score G-Mean
    [47] 0.825 0.942 0.911 0.926 x
    [48] DT x x x x 0.83
    RF x x x x 0.82
    Other techniques NB 0.643 0.648 0.643 0.574 x
    DNN 0.167 0.278 0.166 0.047 x
    LSTM 0.968 0.97 0.969 0.968 x
    GRU 0.937 0.934 0.939 0.943 x
    CNN 0.971 0.972 0.972 0.971 x
    RNN 0.953 0.955 0.954 0.954 x
    Proposed method CNN-DBN 0.981 0.979 0.978 0.979 0.98

     | Show Table
    DownLoad: CSV

    In comparison to previous models, the experimental results demonstrate that the proposed approach provides optimal performance and quicker response time. As shown in Table 3, all scores were evaluated without using any balancing strategy. The CNN accuracy is near to the proposed approach accuracy but it takes more time to execute than our approach. With our proposed methodology, we can also identify binary-class and multi-class attacks. The proposed model has the best accuracy of 99.6%. It also provides a precision of 82%, recall of 77.9%, F1-score of 80.1%, and a G-mean score of 0.813 which provides an improved solution.

    The performance of the proposed approach utilizing SMOTE is presented in Table 4. It is evident from the results that the proposed approach outperforms all other models and has a faster execution time. The performance of CNN and LSTM models came closest to the suggested model, but they took much longer to execute. Our model achieved equal precision and accuracy of 97.6%, whereas a recall has a value of 97.5% and a G-mean score of 0.975.

    The results of combining SMOTE (oversampling) and Tomek (undersampling), referred to as SMOTETomek, are presented in Table 5. The Table depicts that the proposed model performs more optimally than others in terms of F1-score, G-mean score, recall, accuracy, and precision. Although the CNN model can be compared to the proposed approach, it takes a longer time to execute. The proposed method is suitable for detecting binary as well as multi-class intrusion with a faster response time. In contrast, the proposed model has the best accuracy of 98.1%, provides the best precision of 97.9%, recall of 97.8%, F1-score of 97.9% compared to [47], and the G-mean score of 0.973 compared to [48].

    The response time was also calculated for the DL models which were used with the same dataset. Our proposed model responded faster when compared with all the models without using any balancing strategy. The response time for the proposed model is 20 seconds, while for RNN, CNN, GRU, and LSTM, the response time is 41 seconds, 22 seconds, 122 seconds, and 113 seconds, respectively. In contrast to other models, the CNN exhibits a shorter response time. Therefore, we compare the response time of the proposed model with that of the CNN to evaluate its efficiency. By employing SMOTE, the response time for the proposed model is recorded as 14 seconds, while for the CNN, it is 17 seconds. Additionally, when utilizing SMOTETomek, the response time for the proposed model is 13 seconds, whereas, for the CNN, it is 15 seconds. These results clearly demonstrate the effectiveness of the proposed model in terms of response time.

    The exponential growth of industrial networks and inadequate security assessments pave the way for cyber attackers to cause significant losses and damage to confidential data and sensitive information. A DL-based architecture for intrusion detection in industrial networks is presented in this research. The model employs the use of CNN and DBN algorithms to enhance its performance and reduce both training and response times. The proposed framework's performance was evaluated through experiments on the MSCAD. The experimental findings demonstrated that, in comparison to other conventional models, the suggested approach achieves optimal results with a 99.6% accuracy without using any balancing strategy, 97.6% accuracy using SMOTE, and 98.1% accuracy rate using SMOTETomek for the tested dataset. This extensive research work achieves a high accuracy rate for any anomaly in a short time. It warns the administrator of the industrial network that the system has detected an attack. The administrator then investigates the matter to stop the attacker from getting off the system. The network industry will benefit from this study to design attack-detection devices. In the future, when the IDS detects any intrusion, the same IDS, also prevents the network from intrusion and blocks it. This auto-prevention technique will save the industrial network from losing sensitive information. When the system detects an attack, it should block the next data packet from getting access into the network, thus making the network safe for communication and other industrial purposes. Moreover, other balancing techniques such as SamplePairing, ADASYN, etc will be used to improve the performance of the proposed model in the future as well.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code (NU/RG/SERC/12/3).

    The authors declare there is no conflict of interest.



    Funding of the study



    The study was supported by the ‘Far East’ Integrated Program of Basic Research, Far Eastern Branch, Russian Academy of Sciences, project no. 18-03-053.

    Conflict of interests



    The author declares that he has no conflict of interests.

    [1] Havelaar AH, Kirk MD, Torgerson PR, et al. (2010) World health organization global estimates and regional comparisons of the burden of foodborne disease in 2010. PLOS Med 12: e1001923. doi: 10.1371/journal.pmed.1001923
    [2] Byzova NA, Vinogradova SV, Porotikova EV, et al. (2018) Lateral flow immunoassay for rapid detection of grapevine leafroll-associated virus. Biosensors (Basel) 8: E111. doi: 10.3390/bios8040111
    [3] Anfossi L, Di Nardo F, Cavalera S, et al. (2018) Multiplex lateral flow immunoassay: an overview of strategies towards high-throughput point-of-need testing. Biosensors (Basel) 9: E2. doi: 10.3390/bios9010002
    [4] Kim H, Chung DR, Kang M (2019) A new point-of-care test for the diagnosis of infectious diseases based on multiplex lateral flow immunoassays. The Analyst 144: 2460-2466. doi: 10.1039/C8AN02295J
    [5] World Health Organization (2010) Global estimates and regional comparisons of the burden of foodborne disease in 2010. PLoS Med 12: e1001923.
    [6] Urusov AE, Zherdev AV, Dzantiev BB (2019) Towards lateral flow quantitative assays: detection approaches. Biosensors (Basel) 9: 89. doi: 10.3390/bios9030089
    [7] Cheng N, Song Y, Zeinhom MM, et al. (2017) Nanozyme-mediated dual immunoassay integrated with smartphone for use in simultaneous detection of pathogens. ACS Appl Mater Interfaces 9: 40671-40680. doi: 10.1021/acsami.7b12734
    [8] Zarei M (2018) Infectious pathogens meet point-of-care diagnostics. Biosens Bioelectron 106: 193-203. doi: 10.1016/j.bios.2018.02.007
    [9] Yalow RS, Berson SA (1960) Immunoassay of endogenous plasma insulin in man. J Clin Invest 39: 1157-1175. doi: 10.1172/JCI104130
    [10] Mak WC, Beni V, Turner APF (2016) Lateral-flow technology: From visual to instrumental. Trends Analyt Chem 79: 297-305. doi: 10.1016/j.trac.2015.10.017
    [11] McPartlin DA, O'Kennedy RJ (2014) Point-of-care diagnostics, a major opportunity for change in traditional diagnostic approaches: Potential and limitations. Expert Rev Mol Diagn 14: 979-998. doi: 10.1586/14737159.2014.960516
    [12] Fu X, Wen J, Li J, et al. (2019) Highly sensitive detection of prostate cancer specific PCA3 mimic DNA using SERS-based competitive lateral flow assay. Nanoscale 11: 15530-15536. doi: 10.1039/C9NR04864B
    [13] Zhao Y, Wang HR, Zhang PP, et al. (2016) Rapid multiplex detection of 10 foodborne pathogens with an up-converting phosphor technology-based 10-channel lateral flow assay. Sci Rep 6: 21342. doi: 10.1038/srep21342
    [14] Sastre P, Gallardo C, Monedero A, et al. (2016) Development of a novel lateral flow assay for detection of African swine fever in blood. BMC Vet Res 12: 206. doi: 10.1186/s12917-016-0831-4
    [15] Jones D, Glogowska M, Locock L, et al. (2016) Embedding new technologies in practice–a normalization process theory study of point of care testing. BMC Health Serv Res 16: 591. doi: 10.1186/s12913-016-1834-3
    [16] Kozel TR, Burnham-Marusich AR (2017) Point-of-care testing for infectious diseases: past, present, and future. J Clin Microb 55: 2313-2320. doi: 10.1128/JCM.00476-17
    [17] Kim C, Yoo YK, Han SI, et al. (2017) Battery operated preconcentration-assisted lateral flow assay. Lab Chip 17: 2451-2458. doi: 10.1039/C7LC00036G
    [18] Kim H, Chung DR, Kang M (2019) A new point-of-care test for the diagnosis of infectious diseases based on multiplex lateral flow immunoassays. Analyst 144: 2460-2466. doi: 10.1039/C8AN02295J
    [19] Gitonga LK, Boru WG, Kwena A, et al. (2017) Point of care testing evaluation of lateral flow immunoassay for diagnosis of cryptococcus meningitis in HIV-positive patients at an urban hospital in Nairobi, Kenya, 2017. BMC Res Notes 12: 797. doi: 10.1186/s13104-019-4829-4
    [20] Kumar S, Bhushan P, Krishna V, et al. (2018) Tapered lateral flow immunoassay-based point-of-care diagnostic device for ultrasensitive colorimetric detection of dengue NS1. Biomicrofluidics 12: 034104. doi: 10.1063/1.5035113
    [21] Anfossi L, Di Nardo F, Cavalera S, et al. (2018) Multiplex lateral flow immunoassay: an overview of strategies towards high-throughput point-of-need testing. Biosensors (Basel) 9: E2. doi: 10.3390/bios9010002
    [22] Banerjee R, Jaiswal A (2018) Recent advances in nanoparticle-based lateral flow immunoassay as a point-of-care diagnostic tool for infectious agents and diseases. Analyst 143: 1970-1996. doi: 10.1039/C8AN00307F
    [23] Safenkova IV, Panferov VG, Panferova NA, et al. (2019) Alarm lateral flow immunoassay for detection of the total infection caused by the five viruses. Talanta 95: 739-744. doi: 10.1016/j.talanta.2018.12.004
    [24] Zhao Y, Zhang Q, Meng Q, et al. (2017) Quantum dots-based lateral flow immunoassay combined with image analysis for semiquantitative detection of IgE antibody to mite. Int J Nanomedicine 12: 4805-4812. doi: 10.2147/IJN.S134539
    [25] Jørgensen CS, Uldum SA, Sørensen JF, et al. (2015) Evaluation of a new lateral flow test for detection of Streptococcus pneumoniae and Legionella pneumophila urinary antigen. J Microbiol Methods 116: 33-36. doi: 10.1016/j.mimet.2015.06.014
    [26] Rohrman BA, Leautaud V, Molyneux E, et al. (2012) A lateral flow assay for quantitative detection of amplified HIV-1 RNA. PLoS One 7: e45611. doi: 10.1371/journal.pone.0045611
    [27] Boisen ML, Oottamasathien D, Jones AB, et al. (2015) Development of prototype filovirus recombinant antigen immunoassays. J Infect Dis 212: 359-367. doi: 10.1093/infdis/jiv353
    [28] Nielsen K, Yu WL, Kelly L, et al. (2008) Development of a lateral flow assay for rapid detection of bovine antibody to Anaplasma marginaleJ Immunoassay Immunochem 29: 10-18. doi: 10.1080/15321810701734693
    [29] Kamphee H, Chaiprasert A, Prammananan T, et al. (2015) Rapid molecular detection of multidrug-resistant tuberculosis by PCR-nucleic acid lateral flow immunoassay. PLos One 10: e0137791. doi: 10.1371/journal.pone.0137791
    [30] Helfmann J, Netz UJ (2015) Sensors in diagnostics and monitoring. Photonics Lasers Med 4: 36-42. doi: 10.1515/plm-2015-0012
    [31] You M, Lin M, Gong Y, et al. (2017) Household fluorescent lateral flow strip platform for sensitive and quantitative prognosis of heart failure using dual-color upconversion nanoparticles. ACS Nano 11: 6261-6270. doi: 10.1021/acsnano.7b02466
    [32] Pilavaki E, Demosthenous A (2017) Optimized Lateral Flow Immunoassay Reader for the Detection of Infectious Diseases in Developing Countries. Sensors (Basel) 17: E2673. doi: 10.3390/s17112673
    [33] Kim C, Yoo YK, Han SI, et al. (2017) Battery operated preconcentration-assisted lateral flow assay. Lab Chip 17: 2451-2458. doi: 10.1039/C7LC00036G
    [34] Naidoo N, Ghai M, Moodley K, et al. (2017) Modified RS-LAMP assay and use of lateral flow devices for rapid detection of Leifsonia xyli subsp. xyli. Lett Appl Microbiol 65: 496-503. doi: 10.1111/lam.12799
    [35] Xiao W, Huang C, Xu F, et al. (2018) A simple and compact smartphone-based device for the quantitative readout of colloidal gold lateral flow immunoassay strips. Sens Actuators B Chem 266: 63-70. doi: 10.1016/j.snb.2018.03.110
    [36] Nelis D, Bura L, Zhao Y, et al. (2019) The Efficiency of Color Space Channels to Quantify Color and Color Intensity Change in Liquids, pH Strips, and Lateral Flow Assays with Smartphones. Sensors (Basel) 19: E5104. doi: 10.3390/s19235104
    [37] Schwenke KU, Spiehl D, Krauße M, et al. (2019) Analysis of free chlorine in aqueous solution at very low concentration with lateral flow tests. Sci Rep 9: 17212. doi: 10.1038/s41598-019-53687-0
    [38] Borges M, Araújo J (2019) False-negative result of serum cryptococcal antigen lateral flow assay in an HIV-infected patient with culture-proven cryptococcaemia. Med Mycol Case Rep 26: 64-66. doi: 10.1016/j.mmcr.2019.10.009
    [39] Foysal KH, Seo SE, Kim MJ, et al. (2018) Analyte Quantity Detection from Lateral Flow Assay Using a Smartphone. Sensors (Basel) 19: E4812. doi: 10.3390/s19214812
    [40] Romeo A, Leunga T, Sánchez S (2016) Smart biosensors for multiplexed and fully integrated point-of-care diagnostics. Lab Chip 16: 1957-1961. doi: 10.1039/C6LC90046A
    [41] Lee S, Mehta S, Erickson D (2016) Two-Color Lateral Flow Assay for Multiplex Detection of Causative Agents Behind Acute Febrile Illnesses. Anal Chem 88: 8359-8363. doi: 10.1021/acs.analchem.6b01828
    [42] Yen CW, de Puig H, Tam JO, et al. (2015) Multicolored silver nanoparticles for multiplexed disease diagnostics: distinguishing dengue, yellow fever, and Ebola viruses. Lab Chip 5: 1638-1641. doi: 10.1039/C5LC00055F
    [43] Edwards KA, Korff R, Baeumner AJ (2017) Liposome-Enhanced Lateral-Flow Assays for Clinical Analyses. Methods Mol Biol 1571: 407-434. doi: 10.1007/978-1-4939-6848-0_25
    [44] Koczula K, Gallotta A (2016) Lateral flow assays. Essays Biochem 60: 111-120. doi: 10.1042/EBC20150012
    [45] Guo C, Zhong LL, Yi HL, et al. (2016) Clinical value of fluorescence lateral flow immunoassay in diagnosis of influenza A in children. Zhongguo Dang Dai Er Ke Za Zhi 18: 1272-1276.
    [46] Berger P, Sturgeon C (2014) Pregnancy testing with hCG-future prospects. Trends Endocrinol. Metab 25: 637-648. doi: 10.1016/j.tem.2014.08.004
    [47] Lu F, Wang KH, Lin Y (2005) Rapid, quantitative and sensitive immunochromatographic assay based on stripping voltammetric detection of a metal ion label. Analyst 130: 1513-1517. doi: 10.1039/b507682j
    [48] Campbell JP, Heaney JL, Shemar M, et al. (2017) Development of a rapid and quantitative lateral flow assay for the simultaneous measurement of serum κ and λ immunoglobulin free light chains (FLC): inception of a new near-patient FLC screening tool. Clin Chem Lab Med 55: 424-434. doi: 10.1515/cclm-2016-0194
    [49] Pilavaki E, Demosthenous A (2017) Optimized lateral flow immunoassay reader for the detection of infectious diseases in developing countries. Sensors (Basel) 17: E2673. doi: 10.3390/s17112673
    [50] Hsieh HV, Dantzler JL, Weigl BH, et al. (2017) Analytical tools to improve optimization procedures for lateral flow assays. Diagnostics (Basel) 7: E29. doi: 10.3390/diagnostics7020029
    [51] Tran TV, Nguyen BV, Nguyen TTP, et al. (2019) Development of a highly sensitive magneto-enzyme lateral flow immunoassay for dengue NS1 detection. PeerJ 7: e7779. doi: 10.7717/peerj.7779
    [52] Chaterji S, Allen JC, Chow A, et al. (2011) Evaluation of the NS1 rapid test and the WHO dengue classification schemes for use as bedside diagnosis of acute dengue fever in adults. Am J Trop Med Hyg 84: 224-228. doi: 10.4269/ajtmh.2011.10-0316
    [53] Rong Z, Wang Q, Sun N, et al. (2019) Smartphone-based fluorescent lateral flow immunoassay platform for highly sensitive point-of-care detection of Zika virus nonstructural protein 1. Anal Chim Acta 1055: 140-147. doi: 10.1016/j.aca.2018.12.043
    [54] Kosasih H, Widjaja S, Surya E, et al. (2012) Evaluation of two IgM rapid immunochromatographic tests during circulation of Asian lineage chikungunya virus. Southeast Asian J Trop Med Public Health 43: 55-61.
    [55] Escadafal C, Faye O, Sall AA, et al. (2014) Rapid molecular assays for the detection of yellow fever virus in low-resource settings. PLoS Negl Trop Dis 8: e2730. doi: 10.1371/journal.pntd.0002730
    [56] Wonderly B, Jones S, Gatton ML, et al. (2019) Comparative performance of four rapid Ebola antigen-detection lateral flow immunoassays during the 2014–2016 Ebola epidemic in West Africa. PLoS One 14: e0212113. doi: 10.1371/journal.pone.0212113
    [57] Si J, Li J, Zhang L, et al. (2019) A signal amplification system on a lateral flow immunoassay detecting for hepatitis e-antigen in human blood samples. J Med Virol 91: 1301-1306. doi: 10.1002/jmv.25452
    [58] Nakagiri I, Tasaka T, Okai M, et al. (2019) Screening for human immunodeficiency virus using a newly developed fourth generation lateral flow immunochromatography assay. J Virol Methods 274: 113746. doi: 10.1016/j.jviromet.2019.113746
    [59] Karaman E, Ilkit M, Kuşçu F (2019) Identification of Cryptococcus antigen in human immunodeficiency virus-positive Turkish patients by using the Dynamiker® lateral flow assay. Mycoses 62: 961-968. doi: 10.1111/myc.12969
    [60] Morioka K, Fukai K, Yosihda K, et al. (2015) Development and evaluation of a rapid antigen detection and serotyping lateral flow antigen detection system for foot-and-mouth disease virus. PLoS ONE 10: e0134931. doi: 10.1371/journal.pone.0134931
    [61] Wang C, Wang C, Wang X, et al. (2019) Magnetic SERS Strip for Sensitive and Simultaneous Detection of Respiratory Viruses. ACS Appl Mater Interfaces 11: 19495-19505. doi: 10.1021/acsami.9b03920
    [62] El-Tholoth M, Branavan M, Naveenathayalan A, et al. (2019) Recombinase polymerase amplification-nucleic acid lateral flow immunoassays for Newcastle disease virus and infectious bronchitis virus detection. Mol Biol Rep 46: 6391-6397. doi: 10.1007/s11033-019-05085-y
    [63] Huang YH, Yu KY, Huang SP, et al. (2020) Development of a Nucleic Acid Lateral Flow Immunoassay for the Detection of Human Polyomavirus BK. Diagnostics (Basel) 10: E403. doi: 10.3390/diagnostics10060403
    [64] Salminen T, Knuutila A, Barkoff AM, et al. (2018) A rapid lateral flow immunoassay for serological diagnosis of pertussis. Vaccine 36: 1429-1434. doi: 10.1016/j.vaccine.2018.01.064
    [65] Hwang J, Lee S, Choo J (2016) Application of a SERS-based lateral flow immunoassay strip for the rapid and sensitive detection of staphylococcal enterotoxin B. Nanoscale 8: 11418-11425. doi: 10.1039/C5NR07243C
    [66] Eryılmaz M, Acar Soykut E, Çetin D, et al. (2019) -based rapid assay for sensitive detection of Group A Streptococcus by evaluation of the swab sampling technique. Analyst 144: 3573-3580. doi: 10.1039/C9AN00173E
    [67] Prentice KW, DePalma L, Ramage JG, et al. (2019) Comprehensive Laboratory Evaluation of a Lateral Flow Assay for the Detection of Yersinia pestisHealth Secur 17: 439-453. doi: 10.1089/hs.2019.0094
    [68] Wang J, Katani R, Li L, et al. (2016) Rapid detection of Escherichia coli O157 and shiga toxins by lateral flow immunoassays. Toxins 8: 92. doi: 10.3390/toxins8040092
    [69] Wu Z (2019) Simultaneous detection of Listeria monocytogenes and Salmonella typhimurium by a SERS-Based lateral flow immunochromatographic assay. Food Anal Methods 12: 1086-1091. doi: 10.1007/s12161-019-01444-4
    [70] El-Shabrawi M, El-Aziz NA, El-Adly TZ, et al. (2018) Stool antigen detection versus 13C-urea breath test for non-invasive diagnosis of pediatric Helicobacter pylori infection in a limited resource setting. Arch Med Sci 14: 69-73. doi: 10.5114/aoms.2016.61031
    [71] Machiesky L, Côté O, Kirkegaard LH, et al. (2019) A rapid lateral flow immunoassay for identity testing of biotherapeutics. J Immunol Methods 474: 112666. doi: 10.1016/j.jim.2019.112666
    [72] Anfossi L, Di Nardo F, Cavalera S, et al. (2018) Multiplex Lateral Flow Immunoassay: An Overview of Strategies towards High-throughput Point-of-Need Testing. Biosensors (Basel) 9: 2. doi: 10.3390/bios9010002
    [73] Nouvellet P, Garske T, Mills HL, et al. (2015) The role of rapid diagnostics in managing Ebola epidemics. Nature 528: S109-S116. doi: 10.1038/nature16041
    [74] Hassan AHA, Bergua JF, Morales-Narváez E, et al. (2019) Validity of a single antibody-based lateral flow immunoassay depending on graphene oxide for highly sensitive determination of E. coli O157:H7 in minced beef and river water. Food Chem 297: 124965. doi: 10.1016/j.foodchem.2019.124965
    [75] Lai CC, Wang CY, Ko WC (2020) In vitro diagnostics of coronavirus disease 2019: Technologies and application. J Microbiol Immunol Infect .
    [76] Askim JR, Suslick KS (2015) Hand-held reader for colorimetric sensor arrays. Anal. Chem 87: 7810-7816. doi: 10.1021/acs.analchem.5b01499
    [77] Liu J, Geng Z, Fan Z, et al. (2019) Point-of-care testing based on smartphone: The current state-of-the-art (2017–2018). Biosens Bioelectron 132: 17-37. doi: 10.1016/j.bios.2019.01.068
    [78] You M, Lin M, Gong Y, et al. (2017) Household fluorescent lateral flow strip platform for sensitive and quantitative prognosis of heart failure using dual-color upconversion nanoparticles. ACS Nano 11: 6261-6270. doi: 10.1021/acsnano.7b02466
    [79] Xiao W, Huang C, Xu F, et al. (2018) A simple and compact smartphone-based device for the quantitative readout of colloidal gold lateral flow immunoassay strips. Sens Actuators B Chem 266: 63-70. doi: 10.1016/j.snb.2018.03.110
    [80] Saisin L, Amarit R, Somboonkaew A, et al. (2020) Significant sensitivity improvement for camera-based lateral flow immunoassay readers. Sensors 18: 4026. doi: 10.3390/s18114026
    [81] Nsabimana AP, Uzabakiriho B, Kagabo DM, et al. (2018) Bringing Real-Time Geospatial Precision to HIV Surveillance Through Smartphones: Feasibility Study. JMIR Public Health Surveill 4: e11203. doi: 10.2196/11203
    [82] Gong Y, Zheng Y, Jin B, et al. (2019) A portable and universal upcon version nanoparticle-based lateral flow assay platform for point-of-care testing. Talanta 201: 126-133. doi: 10.1016/j.talanta.2019.03.105
    [83] Petrosillo N, Viceconte G, Ergonul O, et al. (2020) COVID-19, SARS and MERS: are they closely related? Clin Microbiol Infect 26: 729-734. doi: 10.1016/j.cmi.2020.03.026
    [84] Pfefferle S, Reucher S, Nörz D, et al. (2020) Evaluation of a quantitative RT-PCR assay for the detection of the emerging coronavirus SARS-CoV-2 using a high throughput system. Euro Surveill 25: 2000152. doi: 10.2807/1560-7917.ES.2020.25.9.2000152
    [85] Chu DKW, Pan Y, Cheng SMS, et al. (2020) Molecular diagnosis of a novel Coronavirus (2019-nCoV) causing an outbreak of pneumonia. Clin Chem 66: 549-555. doi: 10.1093/clinchem/hvaa029
    [86] Jo S, Kim S, Shin DH, et al. (2020) Inhibition of SARS-CoV 3CL protease by flavonoids. J Enzyme Inhib Med Chem 35: 145-151. doi: 10.1080/14756366.2019.1690480
    [87] Yip CC, Ho CC, Chan JF, et al. (2020) Development of a Novel, Genome Subtraction-Derived, SARS-CoV-2-Specific COVID-19-nsp2 Real-Time RT-PCR Assay and Its Evaluation Using Clinical Specimens. Int J Mol Sci 21: 2574. doi: 10.3390/ijms21072574
    [88] Wu JL, Tseng WP, Lin CH, et al. (2020) Four point-of-care lateral flow immunoassays for diagnosis of COVID-19 and for assessing dynamics of antibody responses to SARS-CoV-2. J Infect .
    [89] Lu F, Wang KH, Lin Y (2005) Rapid, quantitative and sensitive immunochromatographic assay based on stripping voltammetric detection of a metal ion label. Analyst 130: 1513-1517. doi: 10.1039/b507682j
    [90] Zhang Y, Kong H, Liu X, et al. (2018) Quantum dot-based lateral-flow immunoassay for rapid detection of rhein using specific egg yolk antibodies. Artif Cells Nanomed Biotechnol 46: 1685-1693.
    [91] Liu Y, Gayle AA, Wilder-Smith A, et al. (2020) The reproductive number of COVID-19 is higher compared to SARS coronavirus. J Travel Med 27: taaa021. doi: 10.1093/jtm/taaa021
    [92] Chen Y, Chan KH, Hong C, et al. (2016) A highly specific rapid antigen detection assay for on-site diagnosis of MERS. J Infect 73: 82-84. doi: 10.1016/j.jinf.2016.04.014
    [93] Bhadra S, Jiang YS, Kumar MR, et al. (2015) Real-time sequence-validated loop-mediated isothermal amplification assays for detection of Middle East respiratory syndrome coronavirus (MERS-CoV). PLoS One 10: e0123126. doi: 10.1371/journal.pone.0123126
    [94] Pallesen J, Wang N, Corbett KS, et al. (2017) Immunogenicity and structures of a rationally designed prefusion MERS-CoV spike antigen. Proc Natl Acad Sci USA 114: E7348-E7357. doi: 10.1073/pnas.1707304114
    [95] Malik YS, Sircar S, Bhat S, et al. (2020) Emerging novel coronavirus (2019-nCoV)-current scenario, evolutionary perspective based on genome analysis and recent developments. Vet Q 40: 68-76. doi: 10.1080/01652176.2020.1727993
    [96] Corman VM, Landt O, Kaiser M, et al. (2020) Detection of 2019 novel coronavirus (2019-nCoV) by real-time RT-PCR. Euro Surveill 25: 2000045.
    [97] Wu A, Peng Y, Huang B, et al. (2020) Genome Composition and Divergence of the Novel Coronavirus (2019-nCoV) Originating in China. Cell Host Microbe 27: 325-328. doi: 10.1016/j.chom.2020.02.001
    [98] Chen Z, Zhang Z, Zhai X, et al. (2020) Rapid and sensitive detection of anti-SARS-CoV-2 IgG, using lanthanide-doped nanoparticles-based lateral flow immunoassay. Anal Chem 92: 7226-7231. doi: 10.1021/acs.analchem.0c00784
    [99] Li YC, Bai WZ, Hashikawa T (2020) The neuroinvasive potential of SARS-CoV2 may play a role in the respiratory failure of COVID-19 patients. J Med Virol 92: 552-555. doi: 10.1002/jmv.25728
    [100] Huang WE, Lim B, Hsu CC, et al. (2020) RT-LAMP for rapid diagnosis of coronavirus SARS-CoV-2. Microb Biotechnol 13: 950-961. doi: 10.1111/1751-7915.13586
    [101] Nguyen T, Duong Bang D, Wolff A (2020) Novel Coronavirus Disease (COVID-19): paving the road for rapid detection and point-of-care ciagnostics. Micromachines (Basel) 11: 306. doi: 10.3390/mi11030306
    [102] Kashir J, Yaqinuddin A (2020) Loop mediated isothermal amplification (LAMP) assays as a rapid diagnostic for COVID-19. Med Hypotheses 141: 109786. doi: 10.1016/j.mehy.2020.109786
    [103] Koch T, Dahlke C, Fathi A, et al. (2020) Safety and immunogenicity of a modified vaccinia virus Ankara vector vaccine candidate for Middle East respiratory syndrome: an open-label, phase 1 trial. Lancet Infect Dis 20: 827-838. doi: 10.1016/S1473-3099(20)30248-6
    [104] Zhu FC, Li YH, Guan XH, et al. (2020) Safety, tolerability, and immunogenicity of a recombinant adenovirus type-5 vectored COVID-19 vaccine: a dose-escalation, open-label, non-randomised, first-in-human trial. Lancet 395: 1845-1854. doi: 10.1016/S0140-6736(20)31208-3
    [105] Alkan F, Ozkul A, Bilge-Dagalp S, et al. (2011) The detection and genetic characterization based on the S1 gene region of BCoVs from respiratory and enteric infections in Turkey. Transbound Emerg Dis 58: 179-185. doi: 10.1111/j.1865-1682.2010.01194.x
    [106] Pradhan SK, Kamble NM, Pillai AS, et al. (2014) Recombinant nucleocapsid protein based single serum dilution ELISA for the detection of antibodies to infectious bronchitis virus in poultry. J Virol Methods 209: 1-6. doi: 10.1016/j.jviromet.2014.08.015
    [107] Montesinos I, Gruson D, Kabamba B, et al. (2020) Evaluation of two automated and three rapid lateral flow immunoassays for the detection of anti-SARS-CoV-2 antibodies. J Clin Virol 128: 104413. doi: 10.1016/j.jcv.2020.104413
    [108] Deeks JJ, Dinnes J, Takwoingi Y, et al. (2020) Antibody tests for identification of current and past infection with SARS-CoV-2. Cochrane Database Syst Rev 6: CD013652.
    [109] Wen T, Huang C, Shi FJ, et al. (2020) Development of a lateral flow immunoassay strip for rapid detection of IgG antibody against SARS-CoV-2 virus. Analyst 10: 1039.
    [110] Wang Y, Hou Y, Li H, et al. (2019) A SERS-based lateral flow assay for the stroke biomarker S100-β. Mikrochim Acta 186: 548. doi: 10.1007/s00604-019-3634-z
    [111] Nicol T, Lefeuvre C, Serri O, et al. (2020) Assessment of SARS-CoV-2 serological tests for the diagnosis of COVID-19 through the evaluation of three immunoassays: Two automated immunoassays (Euroimmun and Abbott) and one rapid lateral flow immunoassay (NG Biotech). J Clin Virol 129: 104511. doi: 10.1016/j.jcv.2020.104511
    [112] (2020)  Johns Hopkins University Health Safety Center official website. Available from: https://www.centerforhealthsecurity.org/resources/COVID-19/serology/Serology-based-tests-for-COVID-19.html.
    [113] (2020)  Cellex Ltd. official website. Cellex qSARS-CoV-2 IgG/IgM Rapid Test. Available from: https://cellexcovid.com.
    [114] (2020)  ChemBio Ltd. official website. DPP® COVID-19 IgM/IgG System. Available from: http://chembio.com.
    [115] (2020)  Hardy diagnostics official website. Anti-SARS-CoV-2 Rapid Test. Available from: https://hardydiagnostics.com/sars-cov-2.
    [116] (2020)  Healgen Scientific LLC official website. COVID-19 Antibody Rapid Detection Kit. Available from: https://www.healgen.com/if-respiratory-covid-19.
    [117] (2020)  Hangzhou Biotest Biotech Co., Ltd official website. RightSign™ COVID-19 IgM/IgG Rapid Test Kit. Available from: https://www.healgen.com/if-respiratory-covid-19.
    [118] (2020)  Biohit Healthcare (Heifei) Co. Ltd. official website. Biohit SARS-CoV-2 IgM/IgG Antibody Test Kit. Available from: https://www.fda.gov/media/139283/download.
    [119] (2020)  Hangzhou Laihe Biotech Co., Ltd official website. Novel Coronavirus (2019-nCoV) IgM/IgG Antibody Combo Test Kit. Available from: https://www.fda.gov/media/139410/download.
    [120] (2020)  Aytu Biosciences/Orient Gene Biotech official website. The COVID-19 IgG/IgM Point-of-Care Rapid Test. Available from: https://stocknewsnow.com/companynews/5035338834942348/ AYTU/101843.
    [121] Sajid M, Kawde AN, Daud M (2015) Designs, formats and applications of lateral flow assay: A literature review. J Saudi Chem Soc 19: 689-705. doi: 10.1016/j.jscs.2014.09.001
    [122] Choi JR, Hu J, Gong Y, et al. (2016) An integrated lateral flow assay for effective DNA amplification and detection at the point of care. Analyst 141: 2930-2939. doi: 10.1039/C5AN02532J
    [123] Kamphee H, Chaiprasert A, Prammananan T, et al. (2015) Rapid molecular detection of multidrug-resistant tuberculosis by PCR-nucleic acid lateral flow immunoassay. PLoS One 10: e0137791. doi: 10.1371/journal.pone.0137791
    [124] Huang YH, Yu KY, Huang SP, et al. (2020) Development of a Nucleic Acid Lateral Flow Immunoassay for the Detection of Human Polyomavirus BK. Diagnostics (Basel) 10: 403. doi: 10.3390/diagnostics10060403
    [125] Mens PF, de Bes HM, Sondo P, et al. (2012) Direct blood PCR in combination with nucleic acid lateral flow immunoassay for detection of Plasmodium species in settings where malaria is endemic. J Clin Microbiol 50: 3520-3525. doi: 10.1128/JCM.01426-12
    [126] Pecchia S, Da Lio D (2018) Development of a rapid PCR-Nucleic Acid Lateral Flow Immunoassay (PCR-NALFIA) based on rDNA IGS sequence analysis for the detection of Macrophomina phaseolina in soil. J Microbiol Methods 151: 118-128. doi: 10.1016/j.mimet.2018.06.010
    [127] Moers AP, Hallett RL, Burrow R, et al. (2015) Detection of single-nucleotide polymorphisms in Plasmodium falciparum by PCR primer extension and lateral flow immunoassay. Antimicrob Agents Chemother 59: 365-371. doi: 10.1128/AAC.03395-14
    [128] Roth JM, Sawa P, Omweri G, et al. (2018) Molecular Detection of Residual Parasitemia after Pyronaridine-Artesunate or Artemether-Lumefantrine Treatment of Uncomplicated Plasmodium falciparum Malaria in Kenyan Children. Am J Trop Med Hyg 99: 970-977. doi: 10.4269/ajtmh.18-0233
    [129] Rule GS, Montagna RA, Durst RA (1996) Rapid method for visual identification of specific DNA sequences based on DNA-tagged liposomes. Clinical Chemistry 42: 1206-1209. doi: 10.1093/clinchem/42.8.1206
    [130] Jauset-Rubio M, Svobodová M, Mairal T, et al. (2016) Ultrasensitive, rapid and inexpensive detection of DNA using paper based lateral flow assay. Sci Rep 6: 37732. doi: 10.1038/srep37732
  • This article has been cited by:

    1. Arjumand Seemab, Mujeeb ur Rehman, Jehad Alzabut, Yassine Adjabi, Mohammed S. Abdo, Langevin equation with nonlocal boundary conditions involving a ψ-Caputo fractional operators of different orders, 2021, 6, 2473-6988, 6749, 10.3934/math.2021397
    2. Kanoktip Kotsamran, Weerawat Sudsutad, Chatthai Thaiprayoon, Jutarat Kongson, Jehad Alzabut, Analysis of a Nonlinear ψ-Hilfer Fractional Integro-Differential Equation Describing Cantilever Beam Model with Nonlinear Boundary Conditions, 2021, 5, 2504-3110, 177, 10.3390/fractalfract5040177
    3. Dinghong Jiang, Chuanzhi Bai, On coupled Gronwall inequalities involving a ψ-fractional integral operator with its applications, 2022, 7, 2473-6988, 7728, 10.3934/math.2022434
    4. Badreddine Meftah, Djamal Foukrach, Some new Gronwall–Bellman–Bihari type integral inequality associated with ψ-Hilfer fractional derivative, 2023, 0, 0174-4747, 10.1515/anly-2022-1073
    5. Marisa Kaewsuwan, Rachanee Phuwapathanapun, Weerawat Sudsutad, Jehad Alzabut, Chatthai Thaiprayoon, Jutarat Kongson, Nonlocal Impulsive Fractional Integral Boundary Value Problem for (ρk,ϕk)-Hilfer Fractional Integro-Differential Equations, 2022, 10, 2227-7390, 3874, 10.3390/math10203874
    6. Songkran Pleumpreedaporn, Weerawat Sudsutad, Chatthai Thaiprayoon, Juan E. Nápoles, Jutarat Kongson, A Study of ψ-Hilfer Fractional Boundary Value Problem via Nonlinear Integral Conditions Describing Navier Model, 2021, 9, 2227-7390, 3292, 10.3390/math9243292
    7. Weerawat Sudsutad, Chatthai Thaiprayoon, Bounmy Khaminsou, Jehad Alzabut, Jutarat Kongson, A Gronwall inequality and its applications to the Cauchy-type problem under ψ-Hilfer proportional fractional operators, 2023, 2023, 1029-242X, 10.1186/s13660-023-02929-x
    8. Ayoub Louakar, Ahmed Kajounı, Khalid Hilal, Hamid Lmou, A Class of Implicit Fractional ψ-Hilfer Langevin Equation with Time Delay and Impulse in the Weighted Space, 2024, 7, 2651-4001, 88, 10.33434/cams.1425019
    9. Hacen Serrai, Brahim Tellab, Sina Etemad, İbrahim Avcı, Shahram Rezapour, Ψ-Bielecki-type norm inequalities for a generalized Sturm–Liouville–Langevin differential equation involving Ψ-Caputo fractional derivative, 2024, 2024, 1687-2770, 10.1186/s13661-024-01863-1
    10. Weerawat Sudsutad, Jutarat Kongson, Chatthai Thaiprayoon, Nantapat Jarasthitikulchai, Marisa Kaewsuwan, A generalized Gronwall inequality via ψ-Hilfer proportional fractional operators and its applications to nonlocal Cauchy-type system, 2024, 9, 2473-6988, 24443, 10.3934/math.20241191
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(14485) PDF downloads(912) Cited by(128)

Figures and Tables

Figures(2)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog