Loading [MathJax]/jax/element/mml/optable/GeneralPunctuation.js
Research article Special Issues

Mathematical model of atherosclerotic aneurysm

  • Atherosclerosis is a major cause of abdominal aortic aneurysm (AAA) and up to 80% of AAA patients have atherosclerosis. Therefore it is critical to understand the relationship and interactions between atherosclerosis and AAA to treat atherosclerotic aneurysm patients more effectively. In this paper, we develop a mathematical model to mimic the progression of atherosclerotic aneurysms by including both the multi-layer structured arterial wall and the pathophysiology of atherosclerotic aneurysms. The model is given by a system of partial differential equations with free boundaries. Our results reveal a 2D biomarker, the cholesterol ratio and DDR1 level, assessing the risk of atherosclerotic aneurysms. The efficacy of different treatment plans is also explored via our model and suggests that the dosage of anti-cholesterol drugs is significant to slow down the progression of atherosclerotic aneurysms while the additional anti-DDR1 injection can further reduce the risk.

    Citation: Guoyi Ke, Chetan Hans, Gunjan Agarwal, Kristine Orion, Michael Go, Wenrui Hao. Mathematical model of atherosclerotic aneurysm[J]. Mathematical Biosciences and Engineering, 2021, 18(2): 1465-1484. doi: 10.3934/mbe.2021076

    Related Papers:

    [1] Xiaolin Gui, Yuanlong Cao, Ilsun You, Lejun Ji, Yong Luo, Zhenzhen Luo . A Survey of techniques for fine-grained web traffic identification and classification. Mathematical Biosciences and Engineering, 2022, 19(3): 2996-3021. doi: 10.3934/mbe.2022138
    [2] Aigou Li, Chen Yang . AGMG-Net: Leveraging multiscale and fine-grained features for improved cargo recognition. Mathematical Biosciences and Engineering, 2023, 20(9): 16744-16761. doi: 10.3934/mbe.2023746
    [3] Keying Jin, Jiahao Zhai, Yunyuan Gao . TwinsReID: Person re-identification based on twins transformer's multi-level features. Mathematical Biosciences and Engineering, 2023, 20(2): 2110-2130. doi: 10.3934/mbe.2023098
    [4] Wenzhuo Chen, Yuan Wang, Xiaojiang Tang, Pengfei Yan, Xin Liu, Lianfeng Lin, Guannan Shi, Eric Robert, Feng Huang . A specific fine-grained identification model for plasma-treated rice growth using multiscale shortcut convolutional neural network. Mathematical Biosciences and Engineering, 2023, 20(6): 10223-10243. doi: 10.3934/mbe.2023448
    [5] Yamei Deng, Ting Song, Xu Wang, Yonglu Chen, Jianwei Huang . Region fine-grained attention network for accurate bone age assessment. Mathematical Biosciences and Engineering, 2024, 21(2): 1857-1871. doi: 10.3934/mbe.2024081
    [6] Ruirui Han, Zhichang Zhang, Hao Wei, Deyue Yin . Chinese medical event detection based on event frequency distribution ratio and document consistency. Mathematical Biosciences and Engineering, 2023, 20(6): 11063-11080. doi: 10.3934/mbe.2023489
    [7] Xinlin Liu, Viktor Krylov, Su Jun, Natalya Volkova, Anatoliy Sachenko, Galina Shcherbakova, Jacek Woloszyn . Segmentation and identification of spectral and statistical textures for computer medical diagnostics in dermatology. Mathematical Biosciences and Engineering, 2022, 19(7): 6923-6939. doi: 10.3934/mbe.2022326
    [8] Bo Wang, Yabin Li, Xue Sui, Ming Li, Yanqing Guo . Joint statistics matching for camera model identification of recompressed images. Mathematical Biosciences and Engineering, 2019, 16(5): 5041-5061. doi: 10.3934/mbe.2019254
    [9] Yanmei Jiang, Mingsheng Liu, Jianhua Li, Jingyi Zhang . Reinforced MCTS for non-intrusive online load identification based on cognitive green computing in smart grid. Mathematical Biosciences and Engineering, 2022, 19(11): 11595-11627. doi: 10.3934/mbe.2022540
    [10] Kittur Philemon Kibiwott , Yanan Zhao , Julius Kogo, Fengli Zhang . Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Mathematical Biosciences and Engineering, 2019, 16(5): 3561-3594. doi: 10.3934/mbe.2019178
  • Atherosclerosis is a major cause of abdominal aortic aneurysm (AAA) and up to 80% of AAA patients have atherosclerosis. Therefore it is critical to understand the relationship and interactions between atherosclerosis and AAA to treat atherosclerotic aneurysm patients more effectively. In this paper, we develop a mathematical model to mimic the progression of atherosclerotic aneurysms by including both the multi-layer structured arterial wall and the pathophysiology of atherosclerotic aneurysms. The model is given by a system of partial differential equations with free boundaries. Our results reveal a 2D biomarker, the cholesterol ratio and DDR1 level, assessing the risk of atherosclerotic aneurysms. The efficacy of different treatment plans is also explored via our model and suggests that the dosage of anti-cholesterol drugs is significant to slow down the progression of atherosclerotic aneurysms while the additional anti-DDR1 injection can further reduce the risk.



    Camera devices are typical pieces of Internet of Things (IoT) equipment ubiquitously deployed in cyberspace and play an important role in maintaining safety in daily life and industrial operations. However, camera devices are usually technically heterogeneous and geographically dispersed, and it is time-consuming for devices owners to test which cameras are online and whether they are functioning normally. Camera devices are becoming attractive targets of cyber-attacks lack of security management. In 2016, up to 1.5 million webcams were attacked by the Mirai malware. The compromised webcams launched a large-scale distributed denial-of-service (DDoS) attack against some high-profile network infrastructure, causing paralysis of half of the U.S. internet. Therefore, accurately identifying the fine-grained type of device is of great significance for asset management. Conducting cyberspace resource surveying and mapping [1], assessing the impact of equipment vulnerabilities [2], and improving the effectiveness of network device governance [3] also requires understanding the type of devices.

    Precise identification of camera devices is helpful for asset management, vulnerability assessment, and patch upgrading and thus is the groundwork for security management. Concurrently, there are two main kinds of methods for device identification, traffic-based, and web search-based methods—described as follows.

    Traffic-based identification approaches can be classified into two main areas: active probing and passive monitoring.

    Active Traffic Probing. A server sends a request message to a remote host using a specific application protocol (such as HTTP, FTP, POP3, etc.) via an IP address and extracts features from the response. Features match with a pre-established device fingerprint to establish the identification of the device. Shodan [4] is the world's first search engine for networked devices based on this technology. It uses Nmap [5] to periodically perform port scans on approximately 600 million devices around the world and returns banner information through processing to identify specific devices. Scholars at the University of Michigan used the self-developed Zmap [6] scanning tool to build the Censys [7] system to search for devices. In addition, ZoomEye, FoFa, and Oshadan are examples of the implementation of active probing [8], which has strong scalability. For new device types, a fingerprint is added to the fingerprint database to establish identification.

    This method can customize the request packet to obtain a specific response message text, feature data are easy to obtain. However, with the enhancement of security protection strategies, more and more devices no longer respond to request messages. In this case, the response data is not obtained and the device identification is invalid.

    Passive Traffic Monitoring. This technique monitors network traffic without sending any messages. First, it extracts various characteristics such as protocol parameters, packet fingerprints, or communication patterns from the traffic. Second, it establishes an appropriate identification model leveraging machine learning theory is established. Finally, it identifies the device types using the identification model.

    Y. Meidan et al. [9] took a quadruple composed of a source IP, destination IP, port number, and flag bits (SYN, FIN, ACK, etc.) in the TCP session data as characteristics. They used several machine learning approaches to classify and identify IoT devices.

    Miettinen M et al. [10] extracted a total of 23 features (e.g., the protocol types of each layer of the packet, source, and destination port number) from network traffic. They built the SENTINEL system by using the random forest method to classify IoT devices.

    Arunan Sivanathan et al. [11] extracted features such as flow duration, port number, domain name, and cipher suite. They built a multistage classification model based on naive Bayes and random forest methods.

    Cheng et al. [12] took the differences among the device file headers in traffic as features and used classification algorithms such as a backpropagation neural network [13], support vector machine [14], and k-nearest neighbors [15] to identify device types.

    Yang et al. [16] took advantage of the characteristics of device network protocols at different open systems interconnection layers and neural network algorithms to generate the fingerprints of IoT devices for device identification.

    Arunan et al. [17] used traffic characteristics obtained at the network level for IoT device classification. They presented insights into the underlying network traffic characteristics using statistical attributes such as activity cycles, port numbers, signaling patterns, and cipher suites. The work developed a multistage machine learning-based classification algorithm to identify specific IoT devices.

    Sakthi et al. [18] proposed GTID, a wireless device identification technique based on traffic measurement metrics using the Ping and iPerf tools. They collect the interarrival time (IAT) of messages from the switch as features to create a unique and reproducible device signature and use artificial neural networks (ANNs) for classification.

    This type of method circumvents the problem of non-responsive messages due to security policies, but it also limits the acquisition of high-value features and reduces the accuracy of device classification and identification.

    Web-search-based. Web-search-based device identification method acquires knowledge of IoT devices—i.e., IoT devices and related vendors, products, and models—to build a device information repository or establish annotation rules.

    Zou et al. [19] proposed an IoT device recognition framework based on web searches, which identified the brand and model of IoT devices by matching their protocol banners with a product attributes database established by crawling specific electronic business websites.

    Feng [20] proposed an ARE engine that extracts relevant terms from the response data as search query crawl websites. They used an association algorithm to generate rules for IoT device annotations based on vendors, products, and models.

    Agarwal et al. [21] developed a tool named WID that captures the web pages of IoT devices and performs device type classification by analyzing the source code of the web pages.

    This type of approach does not need manual construction of fingerprints or training data to identify device types, but the accuracy relies on the reliability of Internet resources and requires the design of very complex rules for matching attribute information, which limits the accuracy and recall of the algorithm.

    In addition, there is a device type identification method based on clock deviation [22,23,24,25,26,27]. This type of method uses the deviation that still exists after each device is calibrated by the network time protocol (NTP) to classify IoT devices. However, the clock deviation of a device is very difficult to measure, and it is difficult to distinguish the difference in the clock deviation among devices from the same manufacturer. This method of identifying the specific type of device can cause large errors.

    The above methods have high accuracy in identifying coarse-grained device types. However, it is a challenge to accurately identify fine-grained types of devices. We propose a fine-grained camera device identification method based on the inherent features of devices. Inherent features represent characteristics of the device itself, such as device-specific parameters, geometric shapes, physical properties, and technical parameters. There are few research studies based on inherent features for classifying and identifying devices.

    We believe that inherent features can be used to effectively identify the fine-grained device. When distinguishing a device, our method determines the weight of each feature based on the coverage and differences of the inherent features. We develop a feature similarity calculation strategy (FSCS) based on the manifestation of an inherent feature value. Based on each weight and the FSCS, we build a device identification model to establish the fine-grained identification of a device type. The detailed contribution of work is given below:

    1) We propose a new feature weight determination strategy. The method proposed in this paper selects features based on the coverage of inherent attributes. The greater the feature differences among different types are, the better the distinction of the features. For the inherent selection characteristics, we calculate a feature entropy value based on the feature differences, use the feature entropy value to determine a feature weight, and provide a feature weight determination strategy based on a theoretical foundation.

    2) We design a more reasonable feature similarity calculation rule. The inherent characteristics are classified into "phrase type", "numerical value", "interval type", and "collection type" according to the expression form. Similarity calculation rules are developed for each type of inherent characteristic. Compared with a strategy that uses a single calculation rule to calculate all types of similarity, the classification similarity calculation rule is more concise, and the calculation cost is lower.

    3) We construct a fine-grained camera equipment type identification model based on inherent characteristics. Based on the feature weights and similarity calculation rules, we design a device type identification model using the idea of weighted average. This model can recognize fine-grained types of target devices with high accuracy even when some inherent feature values are missing, and it has good applicability in a real environment.

    The rest of the paper is as follows: Section 2 introduces the detailed methodology and steps of the method. The rationality and reliability analysis of the method is given in Section 3. Section 4 presents the experimental results and analysis. In the end, Section 5 concludes our paper and discusses future work.

    In this section, we explain our proposed method in detail. We first present the basic framework, and we explain the notations of our algorithm. Then, we analyze the FSCS. Finally, we build the device identification model. Our proposed basic framework is shown in Figure 1, which includes three phases described as follows.

    Figure 1.  Framework of fine-grained device identification based on inherent features.

    Extracting the inherent features. For data about the inherent attributes (e.g., size, weight, parameter, etc.) of a device fi,n in various types of equipment, we select the inherent attributes with large differences and wide coverage as the inherent features.

    Building the identification model. First, we design the calculation rules of feature similarity using the manifestation of the inherent features. Then, the feature weights are determined from the information entropy of the features in the dataset. Finally, we construct the identification model according to the calculation rules of feature similarity and the weights of the features.

    Identifying the device type. Based on the inherent features of the target device, the similarity between the target device and known devices is calculated to identify the type of the target device, and the device model with the largest similarity value is considered as the model of the target device.

    The notations used to describe our proposed approach and the means of evaluating them are summarized below.

    f: An inherent feature of the device. fi,n is the nth feature of the ith device.

    F: A collection of all inherent features of the device, and the inherent features of the ith device are Fi={fi,1,fi,2,,fi,n}

    Ti: The type of device I. Tno indicates the unknown device type; that is, if the type of device i is unknown, then Ti=Tno.

    devi: A two-tuple composed of the inherent features and type of device i, devi=<Fi,Ti>.

    Dbase: A knowledge set defined as the collection of all known types of devices, Dbase={<Fbase,1,Tbase,1>,<Fbase,2,Tbase,2>,,<Fbase,n,Tbase,n>}, Fbase, n is the feature set of the nth device in the Dbase database and Tbase, n is the type of the nth device in the Dbase database. Tbase,iTno(1in).

    Dtarget: The target set is defined as the set consisting of all types of devices to be identified, Dtarget={<Ftarget,1,Tno>,<Ftarget,2,Tno>,,<Ftarget,s,Tno>}.

    Similarity(fi,k,fj,k): The similarity of the k-th inherent feature between Fj and Fi. At this time, fi,k is called the benchmark feature, and fj,k is the target feature (note: Similarity(fi,k,fj,k) is not necessarily equal to Similarity(fj,k,fi,k)).

    Similarity(Fi,Fj): The similarity of the feature set Fi andFj. At this time, Fi is called the benchmark feature set, and Fj is the target feature set (note: Similarity(Fi,Fj) is not necessarily equal to Similarity(Fj,Fi)).

    Different inherent features are usually expressed in different forms. For example, the size of a device is usually "length × width × height" or "bottom radius × height", and the shape of a device is usually "square", "cylindrical" or "spherical". Therefore, it is necessary to design different feature similarity calculation rules for the features of different expressions. Analyzing the manifestation of the inherent features of the camera devices resulted in the division of the manifestation of the inherent features into four types: "phrase type", "numerical value", "interval type" and "collection type". We design similarity calculation rules for these four manifestations.

    For "phrase type", when the feature phrases are the same, the feature similarity is 1; otherwise, it is 0. Considering the k-th feature of the inherent feature vectors Fbase and Fi as a "phrase type" feature, the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k is shown in Eq (1).

    Similarity(fbase,k,fi,k)={1, if fbase,k=fi,k0, if fbase,kfi,k (1)

    For the "numerical type", the size of the feature value and the measurement error ε of the feature value are comprehensively considered. If the kth feature of the inherent feature vectors Fbase and Fi is a "numerical type" feature, we can obtain the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k described as Eq (2).

    Similarity(fbase,k,fi,k)={1|fbase,k(fi,k+ε)|max(fbase,k,fi,k), if fbase,k>fi,k 1, if fbase,k=fi,k1|fbase,k(fi,kε)|max(fbase,k,fi,k), if fbase,k<fi,k (2)

    For "interval type", the calculation strategy is designed based on an interval inclusion relationship. If the kth feature of the inherent feature vectors Fbase and Fi is an "interval type" feature, then the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k is constructed as Eq (3).

    Similarity(fbase,k,fi,k)={1, if fi,kfbase,k0, if fi,kfbase,k (3)

    For "collection type", the benchmark feature is used as a reference. The target feature and the benchmark feature are vectorized, and the cosine similarity is used to measure the feature similarity. If the kth feature of the inherent feature vectors Fbase and Fi is a "collection type" feature, where fbase,k=(ebase,1,ebase,2,,ebase,n) represents the benchmark feature and fi,k=(ei,1,ei,2,,ei,m) represents the target feature, suppose the vectorization of the benchmark feature is expressed as Vbase,k=(abase,1,abase,2,,abase,n), and the vectorization of the target feature is expressed as Vi,k=(bi,1,bi,2,,bi,n). Then, the vectorization process is as follows: for Vbase,k, rZ+,  1rn, then abase,r=1; for Vi,k, rZ+,  1rn. If ebase,rfi,k, thenbi,r=1. After vectorization, the similarity calculation strategy is expressed as Eq (4).

    Similarity(fbase,k,fi,k)=r=1 (4)

    where {b_{i, r}} is the vectorization result of the r-th feature of the i-th device.

    According to the differences in the inherent features, an entropy value of a feature is calculated as the weight value. By using the FSCS combined with the inherent feature weights, the device identification model is constructed. The determination strategy of the inherent feature weight is as follows.

    Given a feature, for each distinct value v of the feature, let v be the number of occurrences of v in the knowledge set, and let f = v/N be the frequency of occurrence of v, where N is the size of the knowledge set. If we approximate f as the probability of v, we can calculate the entropy of the feature as Eq (5).

    {H}_{k} = -{\displaystyle \sum {p}_{i}·\mathrm{log}\left({p}_{i}\right)} (5)

    where {p_i} represents the probability function of the ith value of the feature {f_k} .

    After calculating the entropy {H_1}, {H_2}, \cdots, {H_n} of all features, the weight value {w_1}, {w_2}, \cdots, {w_n} of each feature is calculated as Eq (6).

    {w_i} = \frac{{{H_i}}}{{\sum\limits_{k = 1}^n {{H_k}} }} (6)

    According to the similarity calculation strategy and the weight of each feature, a feature set similarity model is constructed as Eq (7).

    Similarity\left( {{F_{base}}, {F_i}} \right) = \sum\limits_{k = 1}^{\left\| {{F_{base}}} \right\|} {Similarity\left( {{f_{base, k}}, {f_{i, k}}} \right) \times {w_k}} (7)

    The identification model is used to calculate the similarity between the target device and the known devices. In the process of device type identification, the device type with the largest similarity is considered the device type of the target device, so the device type identification is as Eq (8).

    {T_i} = {T_{base, k}}\left| {Similarity\left( {{F_{base, k}}, {F_i}} \right) = \max \left\{ {Similarity\left( {{F_{base, j}}, {F_i}} \right), < {F_{base, j}}, {T_{base, j}} > \in {D_{base}}} \right\}} \right. (8)

    In this section, we'll analyze the effectiveness of the inherent feature based device identification and the rationality of the FSCS.

    Devices of different models are usually different in inherent features. For example, as shown in Table 1, camera devices of different models are different in some inherent features such as appearance. size, weight. and so on. So, it's sound and feasible to distinguish devices by their inherent features. We should avoid identifying devices just by one single inherent feature since the measurement process of the value of an inherent feature may introduce deviation, as many as inherent features should be used instead.

    Table 1.  Differences in some inherent attributes of camera devices.
    Camera device model Appearance Size (mm) Weight (g) Imaging component (inches) Compression rate (bps)
    Dahua DH-IPC-HDBW2230R-AS Dome φ122 × 89 406 CMOS, 1/2.7 6K-8 M
    Dahua DH-IPC-HDBW4636R-AS Dome φ122 × 89 444 CMOS, 1/2.9 73K-10 M
    Dahua DH-IPC-HDBW4833R-ZAS Dome φ122 × 88.9 494 CMOS, 1/1.8 16K-14.75 M
    Dahua DH-IPC-HFW4433F-ZAS Bullet 186 × 87 × 85 772 CMOS, 1/3.0 8K-10 M
    Hikvision DS-2CD1311D Dome φ127 × 97.5 570 CMOS, 1/3.0 32K-16 M
    Hikvision DS-2CD3345P1 Dome φ127.3 × 103.7 340 CMOS, 1/3.0 32K-16 M
    Hikvision DS-2CD3646F Barrel 191.4 × 97.9 × 93.5 1260 CMOS, 1/2.7 32K-8 M
    Hikvision DS-2CD3726F Dome 153.3 × 153.3 × 111.6 840 CMOS, 1/2.7 32K-8 M

     | Show Table
    DownLoad: CSV

    Table 1 shows that almost all devices of different types have different values of the "weight" inherent attribute, but it should be noted that in the actual classification process, the value of the "weight" inherent attribute is measured, and deviations are prone to occur during the measurement process. Using only the "weight" attribute as an inherent feature to identify devices results in large errors. It is necessary to use multiple inherent features to identify a camera device. Therefore, the use of multiple inherent features in this method can more effectively identify a device.

    There are 4 types of inherent features: "phrase", "numerical", "interval" and "collection", and each has a corresponding FSCS respectively.

    A. Phrase

    The inherent features of the "phrase" type are described by one or more words. For example, the inherent feature of the shape of a camera device may be described by words like "dome", "bullet", or "barrel". The FSCS of inherent features of the "phrase" type is determined by whether the phrases are the same, so it's reasonable to use Eq (1) to calculate the similarity of two features of the "phrase" type.

    B. Numerical

    For inherent features of the "numerical" type, the similarity depends on numerical differences, and the smaller the numerical difference between two features is, the larger the similarity. Suppose that the kth feature of the vectors {F_{base}} and {F_i} are both of "numerical" type, a naive calculation strategy for the similarity between the target and benchmark feature would be expressed as Eq (9).

    Similarity\left( {{f_{base, k}}, {f_{i, k}}} \right) = \left\{ {\begin{array}{*{20}{c}} {{\text{ }}1, {\text{ }}if{\text{ }}{f_{base, k}} = {f_{i, k}}} \\ {\frac{1}{{\left| {{f_{base, k}} - {f_{i, k}}} \right|}}, {\text{ }}if{\text{ }}{f_{base, k}} \ne {f_{i, k}}} \end{array}} \right. (9)

    Note that the impact of \left| {{f_{base, k}} - {f_{i, k}}} \right| is relevant to the absolute value of {f_{base, k}} or {f_{i, k}} , so Eq (9) should be revised as Eq (10).

    Similarity\left( {{f_{base, k}}, {f_{i, k}}} \right) = 1 - \frac{{\left| {{f_{base, k}} - {f_{i, k}}} \right|}}{{\max \left( {{f_{base, k}}, {f_{i, k}}} \right)}} (10)

    Practically, values of inherent features of the "numerical" type are acquired by measurement. Due to the precision of measurement tools and human errors during the measurement process, there might be a deviation between the real value and measured value of a feature. So, we introduce an error tolerance \epsilon into Eq (10) and obtain Eq (2).

    C. Interval

    For inherent features of the "interval" type, the similarity is determined by the relationship between intervals. If the interval value of the benchmark feature is the same as the one of the target feature, the benchmark feature and the target feature are considered the same, and vice versa. Thus, suppose that the kth feature of the inherent feature vectors {F_{base}} and {F_i} are both of "interval" type, a naive calculation strategy for the similarity between the target feature {f_{i, k}} and the benchmark feature {f_{base, k}} would be described as Eq (11).

    Similarity\left( {{f_{base, k}}, {f_{i, k}}} \right) = \left\{ {\begin{array}{*{20}{c}} {1, {\text{ }}if{\text{ }}{f_{i, k}} = {f_{base, k}}} \\ {0, {\text{ }}if{\text{ }}{f_{i, k}} \ne {f_{base, k}}} \end{array}} \right. (11)

    Practically, the interval of a benchmark feature is usually complete, and the interval of a target feature is often a subset of the interval of the benchmark feature, so it might be a fault to calculate similarity using Eq (11). We think it's reasonable to use Eq (3) for evaluating the similarity of features of the "interval" type. When a target feature interval is a subset of the benchmark feature interval, the two features are similar, and vice versa. Note that when an interval value is numeric (denoted by a), the numeric value a should be regarded as an interval [a, a].

    D. Collection

    Features of the "collection" type contain multiple elements, and the similarity between features can be determined by the inclusion relationship between collections, or by cosine similarity between vectors after collection vectorization.

    The calculation strategy of cosine similarity is considered to be more accurate than the strategy of inclusion relationship. Taking the "image resolution" feature as an example, suppose that the benchmark and target features are {f_{base}} = \{ a \times b, c \times d\} , {f_1} = \{ a \times b\} and {f_2} = \{ a \times b, c \times d\} , when using calculation strategy of inclusion relationship, the similarity values of {f_1} vs. {f_{base}} and {f_2} vs. {f_{base}} are both 1. however, when using calculation strategy of cosine similarity, the similarity value of {f_1} vs. {f_{base}} is 0.5 and value of {f_2} vs. {f_{base}} is 1. Obviously, the calculation strategy of cosine similarity gets a smaller error and is more reasonable.

    However, "interval type" features are difficult to vectorize due to the continuous elements, so it is not suitable to use the cosine similarity to measure feature similarity. In contrast, the elements in the "collection type" feature are discrete, and the vectorization process is simple. It is undoubtedly a more reasonable choice to construct an FSCS based on the cosine similarity method with smaller errors. The above analysis shows that the inherent FSCS adopted in this method is reasonable.

    In this section, we conduct two experiments: 1) when the feature sets are complete, a device type identification experiment verifies the feasibility of the method; 2) when features are missing, a device type identification experiment verify the effectiveness of the method.

    We select 40 types of fine-grained devices each from Dahua and Hikvision camera products as the knowledge set of the experiment. The specific device types are shown in Table 2, while each device has a number for the convenience of recording and presentation.

    Table 2.  Device list.
    No. Device model No. Device model
    T01 Dahua DH-IPC-HDBW1020R T21 Hikvision DC-2CD2T45
    T02 Dahua DH-IPC-HDBW2130R-AS T22 Hikvision DS-2CD1225
    T03 Dahua DH-IPC-HDBW2230R-AS T23 Hikvision DS-2CD1311D
    T04 Dahua DH-IPC-HDBW4636R-AS T24 Hikvision DS-2CD3310F-I
    T05 Dahua DH-IPC-HDBW4833R-ZAS T25 Hikvision DS-2CD3345P1
    T06 Dahua DH-IPC-HDPW4233-PT-SA-0360B T26 Hikvision DS-2CD3410FD-IW
    T07 Dahua DH-IPC-HFW4433F-ZAS T27 Hikvision DS-2CD3646F
    T08 Dahua DH-IPC-HFW4631K-AS T28 Hikvision DS-2CD3726F
    T09 Dahua DH-IPC-HFW8841K-ZRL-DS T29 Hikvision DS-2CD3935FWD-IWS
    T10 Dahua DH-IPC-PDBW4638-B270 T30 Hikvision DS-2CD3942F-I
    T11 Dahua DH-CA-DW48 T31 Hikvision DS-2CD3A20F-IS
    T12 Dahua DH-CA-FW19M-IR8 T32 Hikvision DS-2CD3T25-I5
    T13 Dahua DH-HAC-HDW2208E T33 Hikvision DS-2CD3T56WD-I5
    T14 Dahua DH-IPC-EW4431-ASW T34 Hikvision DS-IPC-E22H-IW
    T15 Dahua DH-IPC-HDBW4243E-ZFD T35 Hikvision DS-IPC-T12-I
    T16 ACTi ACM-3001 T36 TP-LINK TL-IPC223
    T17 ACTi ACM-5001 T37 TP-LINK TL-IPC313K-W10
    T18 ACTi ACM-3511 T38 TP-LINK TL-IPC43KZ
    T19 ACTi ACM-5601 T39 TP-LINK TL-IPC546H
    T20 ACTi ACM-7411 T40 TP-LINK TL-IPC646P-A4

     | Show Table
    DownLoad: CSV

    For each device, the device shape ( {f_1} ), size ( {f_2} ), weight ( {f_3} ), imaging component ( {f_4} ), resolution ( {f_5} ), minimum illumination ( {f_6} ), lens parameters ( {f_7} ), compression code rate ( {f_8} ), electronic shutter time ( {f_9} ) and ambient temperature ( {f_{10}} ) are inherent features for device identification. The different inherent characteristic values of the different device types are shown in Table 3

    Table 3.  Different intrinsic feature values of different fine-grained device types.
    No. f1 f2
    (mm)
    f3 (g) f4 (inch) f5 f6 (Lux) f7 f8 (bps) f9 (s) f10 (℃)
    T01 Dome 122×89 400 CMOS, 1/4.0 {704×576;1280×720} 0.4;0.22; {6, F2.6, 37;3.6, F2.5, 59;2.8, F2.5, 70.5} 5K- > 5M 1/3- > 1/10-5 -30- > 60
    T02 Dome 122×89 462 CMOS, 1/3.0 {704×576;1280×960;1280×720;704×480} 0.01;0.001;0 {8, F2.5, 35.5;6, F2.1, 47;3.6, F2.0, 72.2;2.8, F2.0, 91.7} 12K- > 6M 1/3- > 1/10-5 -40- > 60
    T03 Dome 122×89 406 CMOS, 1/2.7 {704×576;1920×1080;704×480} 0.01;0.001;0 {8, F2.2, 42;6, F2.0, 55;3.6, F2.0, 90;2.8, F2.0,115} 6K- > 8M 1/3- > 1/10-5 -40- > 60
    T04 Dome 122×89 444 CMOS, 1/2.9 {2688×1520;704×576;2592×1944;1280×720;3072×2048;704×480;2560×1440} 0.002;0.0002;0 {6, F2.5, 47.34;3.6, F2.2, 70;2.8, F2.0, 99} 73K- > 10M 1/3- > 1/10-5 -30- > 60
    T05 Dome 122×88.9 494 CMOS, 1/1.8 {704×576;1920×1080;3840×2160;704×480} 0.002;0.0002;0 {12, F2.8, 45.5;3.5, F1.9,110} 16K- > 14.75M 1/3- > 1/10-5 -40- > 55
    T06 Dome 124.6×82.3 265 CMOS, 1/2.8 {704×576;1920×1080;1920×10801;704×480} 0.002;0.0002;0 {3.6, F1.6, 87} 12K- > 10M 1/3- > 1/10-5 -20- > 50
    T07 Bullet 186×87×85 772 CMOS, 1/3.0 {704×576;1280×720;704×480;2592×1520;2560×1440} 0.001;0.0001;0 {13.5, F3.13, 27.7;2.7, F1.6,104.2} 8K- > 10M 1/3- > 1/10-5 -30- > 60
    T08 Bullet 194×96×89 640 CMOS, 1/2.9 {2688×1520;704×576;2592×1944;1280×720;3072×2048;704×480;2560×1440} 0.002;0.0002;0 {6, F2.5, 47.34;3.6, F2.2, 70;2.8, F2.0, 99} 73K- > 10M 1/3- > 1/10-5 -40- > 60
    T09 Bullet 221×109×101 1080 CMOS, 1/1.8 {704×576;1920×1080;3840×2160;1704×576;704×480} 0.01;0.001;0 {2.7, F1.2,111} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T10 Dome 285.1×100.8 2600 CMOS, 1/2.8 {704×576;1920×1080;1280×720;1280×960;704×480} 0.002;0.0002;0 {12, F2.7, 44;2.7, F1.8,105} 16K- > 8M 1/3- > 1/10-5 -30- > 60
    T11 Dome 113.6×85.4 300 CCD, 1/1.3 {976×582} 0.001;;0 {2.8, F1.2, 0} 16K- > 8M 1/50- > 1/10-5 -30- > 60
    T12 Bullet 194.4×96.6×89.5 400 CMOS, 1/3.0 {1280×720} 0.01;; {3.6, F1.2, 0} 16K- > 8M 1/25- > 1/10-5 -30- > 60
    T13 Dome 110×95 440 CMOS, 1/2.8 {1920×1080;1280×720} 0.001;; {3.6, F1.2, 0} 16K- > 8M 1/1- > 1/30000 -30- > 60
    T14 Dome 126×37.7 500 CMOS, 1/3.0 {2688×1520;704×576;1920×1080;1280×720} 0.001;; {1.6, F1.4,180} 14K- > 40M 1/3- > 1/10-5 -10- > 50
    T15 Dome 159.1×117.9 925 CMOS, 1/2.8 {704×576;1920×1080;704×480} 0.002;0.0002;0 {35, F1.8, 13;13.5, F3.05, 31;7, F1.4, 36;2.7, F1.6,110} 16K- > 8M 1/3- > 1/10-5 -40- > 60
    T16 Dome 130×99 350 CMOS, 1/3.0 {320×240;160×120;640×480} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 40
    T17 Bullet 67×55 400 CMOS, 1/3.0 {320×240;160×120;640×480} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 50
    T18 Dome 130×99 380 CMOS, 1/3.0 {320×240;160×112;640×480;1280×1024;1280×720} ; ; {3.3, F1.6, 0} 1/5- > 1/2000 -10- > 45
    T19 Bullet 67×55×129.5 400 CMOS, 1/3.0 {640×480;1280×720;1280×1024} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 50
    T20 Dome 151.69×114.9 1040 CMOS, 1/3.0 {640×480;1280×720;1280×1024} ; ; {3.3, F1.4, 0} 1/10- > 1/2000 -30- > 50
    T21 Barrel 90×85×169 550 CMOS, 1/3.0 {2560×1440} 0.1;; {1.68, F2.0,180} 32K- > 16M 1/3- > 1/10-5 -30- > 60
    T22 Bullet 100.5×88.1×157.3 600 CMOS, 1/4.0 {1280×720} 0.01;; {12, F1.2, 26;8, F1.2, 39;6, F1.2, 50;4, F1.2, 76;2.8, F1.2, 95} 32K- > 8M 1/25- > 1/10-5 -30- > 60
    T23 Dome 127×97.5 570 CMOS, 1/3.0 {1280×960} 0.01;; {16, F1.2, 18;12, F1.2, 22;8, F1.2, 33;6, F1.2, 50;4, F1.2, 69;2.8, F1.2, 90} 32K- > 16M 1/25- > 1/10-5 -30- > 60
    T24 Dome 114.6×89.4 670 CMOS, 1/3.0 {1280×960} 0.01;; {4, F2.0, 75.8} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T25 Dome 127.3×103.7 340 CMOS, 1/3.0 {2560×1440} 0.01;; {4, F1.2, 69;2.8, F1.2, 90} 32K- > 16M 1/3- > 1/10-5 -10- > 40
    T26 Bullet 66×139.1×70.6 400 CCD, 1/3.0 {1280×920} 0.02;; {4, F2.0, 75.8} 32K- > 16M 1/25- > 1/10-5 -25- > 60
    T27 Barrel 191.4×97.9×93.5 1260 CMOS, 1/2.7 {2560×1440} 0.005;; {2.8, F1.2,105} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T28 Barrel 153.3×153.3×111.6 840 CMOS, 1/2.7 {1920×1080} 0.002;; {2.7, F1.2,103} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T29 Dome 119.9×41.2 600 CMOS, 1/2.8 {1600×1200;1280×960;2048×1536} 0.005;;0 {1.16, F2.2,180} 32K- > 16M 1/3- > 1/10-5 -10- > 40
    T30 Dome 119.9×41.2 600 CMOS, 1/3.0 {2048×1536} 0.01;;0 {1.6, F1.6,186} 32K- > 8M 1/25- > 1/10-5 -10- > 40
    T31 Barrel 134×116.1×293 2000 CMOS, 1/2.8 {1920×1080} 0.01;;0 {25, F1.2, 12.4;16, F1.2, 19.2;12, F1.2, 24.6;8, F1.2, 40;6, F1.2, 52;4, F1.2, 85} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T32 Bullet 194.04×93.85×89.52 1000 CMOS, 1/2.7 {1920×1080;1280×960;1296×732;1280×720} 0.01;; {4, F1.2, 80} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T33 Bullet 93.85×93.52×194.1 690 CMOS, 1/2.7 {704×576;2560×1920;640×480;1280×720;2560×1536;1920×1280;352×288} 0.005;; {6, F1.2, 55;4, F1.2, 83} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T34 Barrel 175×89×75 340 CMOS, 1/2.7 {1920×1080} 0.01;; {8, F1.2, 43;6, F1.2, 54.4;4, F1.2, 89.1;2.8, F1.2,114.8} 32K- > 8M 1/3- > 1/10-5 -30- > 50
    T35 Dome 110×93.2 350 CMOS, 1/2.7 {1920×1080} 0.01;; {8, F1.2, 43;6, F1.2, 54.5;4, F1.2, 91;2.8, F1.2,114.8} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T36 Dome 113×113×87 268 CMOS, 1/2.7 {1920×1080} 0.1;0.1;0 {4, F2.1, 0;6, F2.1, 0} 64K- > 8M 1/25- > 1/10-5 -30- > 60
    T37 Barrel 173×83.4×84.2 390 CMOS, 1/3.0 {1280×960} 0.1;0.1;0 {2.8, F2.1, 0;4, F2.1, 0;6, F2.1, 0} 64K- > 4M 1/25- > 1/10-5 -10- > 60
    T38 Dome 120×120×129 328 CMOS, 1/2.7 {2304×1296} 0.1;;0 {3.35, F2.4, 0} 64K- > 2M 1/25- > 1/10-5 -30- > 50
    T39 Barrel 173×83.4×84.2 390 CMOS, 1/2.7 {2560×1440} 0.01;; {4, F1.6, 0;6, F1.6, 0;8, F1.6, 0;12, F1.6, 0} 256K- > 6M 1/25- > 1/10-5 -30- > 60
    T40 Ball 230×177×188 930 CMOS, 1/3.0 {2560×1440} 0.002;;0 {4, F1.6, 0} 64K- > 6M 1/25- > 1/10-5 -30- > 60

     | Show Table
    DownLoad: CSV

    In Table 3, f1 and f4 are "phrase type" inherent features; f2, f3, and f6 are "numerical value" inherent features; f8, f9 and f10 are "interval type" inherent features; and f5 and f7 are "collective type" inherent features. The elements in f6 represent the minimum illumination of the color camera, black-and-white camera, and infrared camera. For example, in the f6 value of T01, "0.4; 0.22; -" indicates that the lowest illuminance of the T01 color camera is 0.4 lux, the minimum illuminance of the black-and-white camera is 0.22 lux, and the infrared camera is not supported. Each set element of f7 includes the focal length, aperture, and horizontal field of view. For example, in the f7 value of T01, "6, F2.6, 37" indicates that the focal length is 6 mm, the aperture is F2.6, and the horizontal field of view is 37 degrees.

    From Eqs (5) and (6), we calculate the weight of each feature separately, and the results are {w_1} = 0.09089 , {w_2} = 0.{\text{11481}} , {w_3} = 0.{\text{11294}} , {w_4} = 0.0{\text{9217}} , {w_5} = 0.{\text{11}}0{\text{61}} , {w_6} = 0.{\text{1}}0{\text{381}} , {w_7} = 0.{\text{11596}} , {w_8} = 0.0{\text{9915}} , {w_9} = 0.0{\text{7682}} , and {w_{10}} = 0.0{\text{8285}} . In Sections 4.2 and 4.3, we use the calculated feature weights.

    To verify the effectiveness of identifying device types using the inherent features, we carry out a device identification experiment with each feature set complete and calculate the similarity between any two devices.

    We use the feature weights calculated in Section 4.1, set the error tolerance \varepsilon = 1 for the "numerical type" features, and calculate the difference between any two devices in {T01, T02..., T20} using Eq (7). Figure 2 shows the confusion matrix of the device similarity.

    Figure 2.  Confusion matrix of device similarities.

    In Figure 2, "True Type" represents the actual fine-grained type of the device, and "Basic Type" represents the basic type. When "True Type" is "T02" and "Basic Type" is "T01", the similarity is 0.492, which means that the similarity between T02 and T01 is 0.492 in other words, Similarity\left({{F_{base, 1}}, {F_{target, 2}}} \right) = 0.492 .

    By using the 10 inherent characteristics described in Section 4.1, Figure 2 shows that the similarity between any two devices is less than 0.85 (the maximum value is 0.842), which can effectively distinguish the devices, in other words, it proves the effectiveness of inherent features in distinguishing devices type. The areas with greater similarity are T1-T15, T16-T20, T21-T25, T36-T40, which indicates that the inherent features of the devices from the same manufacturer are more similar than the devices from different manufacturers.

    Our experiment simulates a situation with incomplete device features in an actual environment. We discard some features or elements of collective features with a certain probability and accomplish fine-grained device identification with incomplete features.

    The discarding probability of an inherent feature changes from 0 to 1 in increments of 0.01. At each discarding probability value, the target set with inherent missing features is generated using the knowledge set, and the similarity between each feature in the target set and the knowledge set is calculated separately, and the greatest similar device type is taken as the target device type. To ensure arbitrary discarding of probability values, the experiment is repeated 1000 times to obtain the average identification accuracy of each type of device.

    The increase of feature discard probability makes the similarity value between fine-grained device types decrease, which is because when a feature value of the target device is empty (i.e., no feature is acquired), the feature similarity between the target device and the knowledge device will be 0. When the target device has fewer non-empty feature values, the similarity value between it and the knowledge set device type will be less. Therefore, we set a similarity threshold in the experiment. When the maximum similarity is less than the threshold, device identification is considered to fail (even if the type corresponding to the maximum similarity is the correct type). When the threshold value is set to 0.5, the graph of the variation between the average recognition accuracy and the discard probability of each type of device is obtained as shown in Figure 3.

    Figure 3.  When the threshold value is 0.5, the relationship between the average identification accuracy and discarding probability.

    In Figure 3, when the discard probability is less than 0.25, the average identification accuracy of the fine-grained type of the device is greater than 90%. When the discard probability is greater than 0.2, the average identification accuracy decreases rapidly with the increase of discard probability. When the discard probability is 0.4, the average identification accuracy is approximately 60%. When the discard probability is 0.8, the average identification accuracy is close to 0.

    An increase in the discard probability inevitably leads to a decrease in the similarity value. While the similarity value of the correct device type decreases, the similarity value between other devices and the target device will also decrease. The strategy of setting the similarity threshold will directly lead to the failure of fine-grained type identification of the device when the discarding probability is large. Figure 4 shows the similarity matrix between the target set devices and the knowledge set devices during the 500th experiment when the discard probability is 0.5.

    Figure 4.  When the discarding probability is 0.5, the 500th result of the device similarity experiment between the target set and the knowledge set.

    Figure 4 shows that when the discarding probability of an inherent feature is 0.5, the maximum similarity value (i.e., T10, T19, etc.) is less than 0.5. However, the device type with the maximum similarity value is the correct device type. Therefore, when a feature is missing, a similarity threshold should not be set (or the threshold should be set to 0).

    Figure 5 shows that when there is no similarity threshold, the average identification accuracy of each device fine-grained type is still greater than 80% even if the discarding rate of inherent features is 50%. When the discard rate is 0.8, the average identification accuracy of each device is greater than 35%. This shows that the method proposed in this paper can still identify the fine-grained types of devices effectively when some inherent features are missing.

    Figure 5.  When there is no similarity threshold, the relationship between the average identification accuracy and the discarding probability.

    In this section, the experimental results based on real data show that the method proposed in this paper to identify the fine-grained type of device based on inherent features is feasible and effective. In reality, the more inherent features of the target device are obtained, the more accurate the identification of the target device will be. When the "missing rate" of inherent features is 50%, the average accuracy to identify the fine-grained type of device still exceeds 80%.

    This paper develops an inherent feature-based device identification method to solve the current deficiency in fine-grained identification of types of camera devices. The method classifies devices inherent features into 4 types according to their expressive form, establishes a similarity calculation strategy (FSCS) for each type of inherent feature, assigns a weight value derived from information entropy for each inherent feature, and constructs a fine-grained device type identification model combining the FSCS and weight value. Experiment results show that the method proposed in this paper can recognize fine-grained types of devices in the partial absence of inherent features. Especially, when the "absence rate" of inherent features is 50%, the average accuracy is still more than 80%. In future work, finding more effective inherent features and combining them with network features may be an important direction to improve the accuracy of fine-grained device type identification.

    We would like to thank the reviewers for their positive suggestions, which helped to improve the paper enormously.

    The authors declare that there is no conflict of interest.



    [1] J. Golledge, P. E. Norman, Atherosclerosis and abdominal aortic aneurysm: cause, response, or common risk factors?, Arterioscler. Thromb. Vasc. Biol., 30 (2010), 1075-1077. doi: 10.1161/ATVBAHA.110.206573
    [2] P. Libby, P. M. Ridker, G. K. Hansson, Progress and challenges in translating the biology of atherosclerosis, Nature, 473 (2011), 317-325. doi: 10.1038/nature10146
    [3] W. H. Pearce, V. P. Shively, Abdominal aortic aneurysm as a complex multifactorial disease: interactions of polymorphisms of inflammatory genes, features of autoimmunity, and current status of MMPs, Ann. N. Y. Acad. Sci., 1085 (2006), 117-132. doi: 10.1196/annals.1383.025
    [4] R. M. Sandford, M. J. Bown, N. J. London, R. D. Sayers, The genetic basis of abdominal aortic aneurysms: a review, Eur. J. Vasc. Endovasc. Surg., 33 (2007), 381-390. doi: 10.1016/j.ejvs.2006.10.025
    [5] S. Canic, Blood flow through compliant vessels after endovascular repair: wall deformations induced by the discontinuous wall properties, Comput. Vis. Sci., 4 (2002), 147-155. doi: 10.1007/s007910100066
    [6] S. Canic, D. Mirkovic, A hyperbolic system of conservation laws in modeling endovascular treatment of abdominal aortic aneurysm, in Hyperbolic problems: theory, numerics, applications, Springer, (2001), 227-236.
    [7] S. Canic, K. Ravi-Chandar, Z. Krajcer, D. Mirkovic, S. Lapin, Mathematical model analysis of wallstent and aneurx: dynamic responses of bare-metal endoprosthesis compared with those of stent-graft, Tex. Heat I. J., 32 (2005), 502.
    [8] J. Chen, H. Huang, W. Hao, J. Xu, A machine learning method correlating pulse pressure wave data with pregnancy, Int. J. Numer. Meth. Bio., 36 (2020), e3272.
    [9] P. Erhart, A. Hyhlik-Durr, P. Geisbusch, D. Kotelis, M. Muller-Eschner, T. C. Gasser, et al., Finite element analysis in asymptomatic, symptomatic, and ruptured abdominal aortic aneurysms: in search of new rupture risk predictors, Eur. J. Vasc. Endovasc. Surg., 49 (2015), 239-245. doi: 10.1016/j.ejvs.2014.11.010
    [10] P. Fok, Growth of necrotic cores in atherosclerotic plaque, Math. Med. Biol., 29 (2011), 301-327.
    [11] C. Poelma, P. N. Watton, Y. Ventikos, Transitional flow in aneurysms and the computation of haemodynamic parameters, J. R. Soc. Interface, 12 (2015), 20141394. doi: 10.1098/rsif.2014.1394
    [12] D. Roy, S. Lerouge, K. Inaekyan, C. Kauffmann, R. Mongrain, G. Soulez, Experimental validation of more realistic computer models for stent-graft repair of abdominal aortic aneurysms, including pre-load assessment, Int. J. Numer. Method. Biomed. Eng., 32 (2016), e02769. doi: 10.1002/cnm.2769
    [13] E. Soudah, E. Y. Ng, T. H. Loong, M. Bordone, U. Pua, S. Narayanan, CFD modelling of abdominal aortic aneurysm on hemodynamic loads using a realistic geometry with CT, Comput. Math. Methods Med., 2013 (2013).
    [14] J. Tambaa, M. Kosor, S. Canic, Mathematical modeling of vascular stents, SIAM J. Appl. Math., 70 (2010), 1922-1952. doi: 10.1137/080722618
    [15] F. Tian, L. Zhu, P. Fok, X. Lu, Simulation of a pulsatile non-newtonian flow past a stenosed 2d artery with atherosclerosis, Comput. Biol. Med., 43 (2013), 1098-1113. doi: 10.1016/j.compbiomed.2013.05.023
    [16] Q. Wang, A hydrodynamic theory for solutions of nonhomogeneous nematic liquid crystalline polymers of different configurations, J. Chem. Phys., 116 (2002), 9120-9136. doi: 10.1063/1.1452722
    [17] J. Wu, S. C. Shadden, Coupled Simulation of Hemodynamics and Vascular Growth and Remodeling in a Subject-Specific Geometr, Ann. Biomed. Eng., 43 (2015), 1543-1554. doi: 10.1007/s10439-015-1287-6
    [18] X. Yang, G. Forest, W. Mullins, Q. Wang, Dynamic defect morphology and hydrodynamics of sheared nematic polymers in two space dimensions, J. Rheol., 53 (2009), 589-615. doi: 10.1122/1.3089622
    [19] Y. Yu, Fluid-structure interaction modeling in 3d cerebral arteries and aneurysms, in Biomedical Technology, Springer, (2018), 123-146.
    [20] Y. Yu, P. Perdikaris, G. Karniadakis, Fractional modeling of viscoelasticity in 3d cerebral arteries and aneurysms, J. Comput. Phys., 323 (2016), 219-242. doi: 10.1016/j.jcp.2016.06.038
    [21] J. Zhao, X. Yang, J. Shen, Q. Wang, A decoupled energy stable scheme for a hydrodynamic phase-field model of mixtures of nematic liquid crystals and viscous fluids, J. Comput. Phys., 305 (2016), 539-556. doi: 10.1016/j.jcp.2015.09.044
    [22] M. Domanski, D. Lloyd-Jones, V. Fuster, S. Grundy, Can we dramatically reduce the incidence of coronary heart disease?, Nat. Rev. Cardiol., 8 (2011), 721-725. doi: 10.1038/nrcardio.2011.158
    [23] M. Dabagh, P. Jalali, J. M. Tarbell, Coupled Simulation of Hemodynamics and Vascular Growth and Remodeling in a Subject-Specific Geometr, Am. J. Physiol. Heart Circ. Physiol., 297 (2009), H983-H996. doi: 10.1152/ajpheart.00324.2009
    [24] M. Cilla, M. A. Martinez, E. Pena, Effect of Transmural Transport Properties on Atheroma Plaque Formation and Development, Ann. Biomed. Eng., 43 (2015), 1516-1530. doi: 10.1007/s10439-015-1299-2
    [25] M. Cilla, E. Pena, M. A. Martinez, Mathematical modelling of atheroma plaque formation and development in coronary arteries, J. R. Soc. Interface, 11 (2014), 20130866. doi: 10.1098/rsif.2013.0866
    [26] K. Govindaraju, S. Kamangar, I. A. Badruddin, G. N. Viswanathan, A. Badarudin, N. J. Salman Ahmed, Effect of porous media of the stenosed artery wall to the coronary physiological diagnostic parameter: a computational fluid dynamic analysis, Atherosclerosis, 233 (2014), 630-635. doi: 10.1016/j.atherosclerosis.2014.01.043
    [27] A. Friedman, W. Hao, A Mathematical Model of Atherosclerosis with Reverse Cholesterol Transport and Associated Risk Factors, Bull. Math. Biol., 77 (2015), 758-781. doi: 10.1007/s11538-014-0010-3
    [28] W. Hao, A. Friedman, The LDL-HDL profile determines the risk of atherosclerosis: a mathematical model, PLoS One, 9 (2014), e90497. doi: 10.1371/journal.pone.0090497
    [29] D. A. Vorp, Biomechanics of abdominal aortic aneurysm, J. Biomech., 40 (2007), 1887-1902. doi: 10.1016/j.jbiomech.2006.09.003
    [30] D. A. Vorp, J. P. Vande Geest, Biomechanics of abdominal aortic aneurysm, Arterioscler. Thromb. Vasc. Biol., 25 (2005), 1558-1566. doi: 10.1161/01.ATV.0000174129.77391.55
    [31] V. Lobo, A. Patil, A. Phatak, N. Chandra, Free radicals, antioxidants and functional foods: Impact on human health, Pharmacogn. Rev., 4 (2010), 118-126. doi: 10.4103/0973-7847.70902
    [32] K. T. Ji, L. Qian, J. L. Nan, Y. J. Xue, S. Q. Zhang, G. Q. Wang, et al., Ox-LDL induces dysfunction of endothelial progenitor cells via activation of NF-B, BioMed Res. Int., 2015 (2015).
    [33] A. Rousselle, F. Qadri, L. Leukel, R. Yilmaz, J. F. Fontaine, G. Sihn, et al., CXCL5 limits macrophage foam cell formation in atherosclerosis, J. Clin. Invest., 123 (2013), 1343-1347. doi: 10.1172/JCI66580
    [34] W. T. Gerthoffer, Mechanisms of vascular smooth muscle cell migration, Circ. Res., 100 (2007), 607-621. doi: 10.1161/01.RES.0000258492.96097.47
    [35] G. Dimas, F. Iliadis, D. Grekas, Matrix metalloproteinases, atherosclerosis, proteinuria and kidney disease: Linkage-based approaches, Hippokratia, 17 (2013), 292-297.
    [36] E. Galkina, K. Ley, Immune and inflammatory mechanisms of atherosclerosis, Annu. Rev. Immunol., 27 (2009), 165-197. doi: 10.1146/annurev.immunol.021908.132620
    [37] H. L. Fu, R. R. Valiathan, R. Arkwright, A. Sohail, C. Mihai, M. Kumarasiri, et al., Discoidin domain receptors: unique receptor tyrosine kinases in collagen-mediated signaling, J. Biol. Chem., 288 (2013), 7430-7437. doi: 10.1074/jbc.R112.444158
    [38] C. Franco, P. J. Ahmad, G. Hou, E. Wong, M. P. Bendeck, Increased cell and matrix accumulation during atherogenesis in mice with vessel wall-specific deletion of discoidin domain receptor 1, Circ. Res., 106 (2010), 1775-1783. doi: 10.1161/CIRCRESAHA.109.213637
    [39] W. L. Chan, N. Pejnovic, H. Hamilton, T. V. Liew, D. Popadic, A. Poggi, et al., Atherosclerotic abdominal aortic aneurysm and the interaction between autologous human plaque-derived vascular smooth muscle cells, type 1 NKT, and helper T cells, Circ. Res., 96 (2005), 675-683. doi: 10.1161/01.RES.0000160543.84254.f1
    [40] Q. Wang, J. Ren, S. Morgan, Z. Liu, C. Dou, B. Liu, Monocyte chemoattractant protein-1 (MCP-1) regulates macrophage cytotoxicity in abdominal aortic aneurysm, PLoS One, 9 (2014), e92053. doi: 10.1371/journal.pone.0092053
    [41] W. Ma-Krupa, M. S. Jeon, S. Spoerl, T. F. Tedder, J. J. Goronzy, C. M. Weyand, Activation of arterial wall dendritic cells and breakdown of self-tolerance in giant cell arteritis, J. Exp. Med., 199 (2004), 173-183. doi: 10.1084/jem.20030850
    [42] Q. Wang, C. Shu, J. Su, X. Li, A crosstalk triggered by hypoxia and maintained by MCP-1/miR- 98/IL-6/p38 regulatory loop between human aortic smooth muscle cells and macrophages leads to aortic smooth muscle cells apoptosis via Stat1 activation, Int. J. Clin. Exp. Pathol., 8 (2015), 2670-2679.
    [43] S. Becker, M. Warren, S. Haskill, Colony-stimulating factor-induced monocyte survival and differentiation into macrophages in serum-free cultures, J. Immun., 139 (1987), 3703-3709.
    [44] C. S. Robbins, I. Hilgendorf, G. F. Weber, I. Theurl, Y. Iwamoto, J.-L. Figueiredo, et al., Local proliferation dominates lesional macrophage accumulation in atherosclerosis, Nat. Med., 19 (2013), 1166. doi: 10.1038/nm.3258
    [45] P. J. Gough, D. R. Greaves, H. Suzuki, T. Hakkinen, M. O. Hiltunen, M. Turunen, et al., Analysis of macrophage scavenger receptor (sr-a) expression in human aortic atherosclerotic lesions, Arterioscler. Thromb. Vasc. Biol., 19 (1999), 461-471. doi: 10.1161/01.ATV.19.3.461
    [46] C. Franco, K. Britto, E. Wong, G. Hou, S.-N. Zhu, M. Chen, et al., Discoidin domain receptor 1 on bone marrow-derived cells promotes macrophage accumulation during atherogenesis, Circ. Res., 105 (2009), 1141-1148. doi: 10.1161/CIRCRESAHA.109.207357
    [47] P. Wiesner, M. Tafelmeier, D. Chittka, S.-H. Choi, L. Zhang, Y. S. Byun, et al., Mcp-1 binds to oxidized ldl and is carried by lipoprotein (a) in human plasma, J. Lipid Res., 54 (2013), 1877-1883. doi: 10.1194/jlr.M036343
    [48] C. Franco, G. Hou, P. J. Ahmad, E. Y. Fu, L. Koh, W. F. Vogel, et al., Discoidin domain receptor 1 (ddr1) deletion decreases atherosclerosis by accelerating matrix accumulation and reducing inflammation in low-density lipoprotein receptor-deficient mice, Circ. Res., 102 (2008), 1202-1211. doi: 10.1161/CIRCRESAHA.107.170662
    [49] E. Raines, R. Ross, Smooth muscle cells and the pathogenesis of the lesions of atherosclerosis, Br. Heart J., 69 (1993), S30. doi: 10.1136/hrt.69.1_Suppl.S30
    [50] M. G. Watson, H. M. Byrne, C. Macaskill, M. R. Myerscough, A multiphase model of growth factor-regulated atherosclerotic cap formation, J. Math. Biol., 81 (2020), 725-767. doi: 10.1007/s00285-020-01526-6
    [51] R. Ross, Atherosclerosis-an inflammatory disease, N. Engl. J. Med., 340 (1999), 115-126. doi: 10.1056/NEJM199901143400207
    [52] D. Liu, L. Guan, Y. Zhao, Y. Liu, X. Sun, H. Li, et al., Association of triglycerides to high-density lipoprotein-cholesterol ratio with risk of incident hypertension}, Hypertens. Res., 43 (2020), 948-955. doi: 10.1038/s41440-020-0439-8
    [53] W. Masson, T. Epstein, M. Huerín, M. Lobo, G. Molinero, D. Siniawski, Association between non-HDL-C/HDL-C ratio and carotid atherosclerosis in postmenopausal middle-aged women, Climacteric, 22 (2019), 518-522. doi: 10.1080/13697137.2019.1631787
    [54] W. Hao, S. Gong, S. Wu, J. Xu, M. R. Go, A. Friedman, et al., A mathematical model of aortic aneurysm formation, PLoS One, 12 (2017), e0170807. doi: 10.1371/journal.pone.0170807
    [55] C. De Moura, C. Kubrusly, The courant-friedrichs-lewy (cfl) condition, AMC, 10 (2013), 12.
    [56] T. C. Hodges, P. R. Detmer, D. L. Dawson, R. O. Bergelin, K. W. Beach, T. S. Hatsukami, et al., Ultrasound determination of total arterial wall thickness, J. Vasc. Surg., 19 (1994), 745-753. doi: 10.1016/S0741-5214(94)70051-6
    [57] C. Ciavarella, E. Gallitto, F. Ricci, M. Buzzi, A. Stella, G. Pasquinelli, The crosstalk between vascular MSCs and inflammatory mediators determines the pro-calcific remodelling of human atherosclerotic aneurysm, Stem Cell Res. Ther., 8 (2017), 99. doi: 10.1186/s13287-017-0554-x
    [58] A. R. Brady, S. G. Thompson, F. G. Fowkes, R. M. Greenhalgh, J. T. Powell, Abdominal aortic aneurysm expansion: risk factors and time intervals for surveillance, Circulation, 110 (2004), 16-21. doi: 10.1161/01.CIR.0000133279.07468.9F
    [59] R. W. Alexander, Hypertension and the pathogenesis of atherosclerosis: oxidative stress and the mediation of arterial inflammatory response: a new perspective, Hypertension, 25 (1995), 155-161. doi: 10.1161/01.HYP.25.2.155
    [60] G. R. Gadowski, M. A. Ricci, E. D. Hendley, D. B. Pilcher, Hypertension accelerates the growth of experimental aortic aneurysms, J. Surg. Res., 54 (1993), 431-436. doi: 10.1006/jsre.1993.1068
    [61] G. F. Mureddu, Arterial hypertension. Does the J curve exist? And then?, Monaldi Arch. Chest Dis., 88 (2018), 953.
    [62] W. Hao, E. D. Crouser, A. Friedman, Mathematical model of sarcoidosis, PANS, 111 (2014), 16065-16070. doi: 10.1073/pnas.1417789111
    [63] W. Hao, H. M. Komar, P. A. Hart, D. L. Conwell, G. B. Lesinski, A. Friedman, Mathematical model of chronic pancreatitis, PNAS, 114 (2017), 5011-5016. doi: 10.1073/pnas.1620264114
    [64] T. Khamdaeng, J. Luo, J. Vappou, P. Terdtoon, E. E. Konofagou, Arterial stiffness identification of the human carotid artery using the stress-strain relationship in vivo, Ultrasonics, 52 (2012), 402-411. doi: 10.1016/j.ultras.2011.09.006
    [65] S. Laurent, Arterial wall hypertrophy and stiffness in essential hypertensive patients, Hypertension, 26 (1995), 355-362. doi: 10.1161/01.HYP.26.2.355
    [66] J. Xiong, S. M. Wang, W. Zhou, J. G. Wu, Measurement and analysis of ultimate mechanical properties, stress-strain curve fit, and elastic modulus formula of human abdominal aortic aneurysm and nonaneurysmal abdominal aorta, J. Vasc. Surg., 48 (2008), 189-195. doi: 10.1016/j.jvs.2007.12.053
    [67] Y. Momiyama, R. Ohmori, Z. A. Fayad, N. Tanaka, R. Kato, H. Taniguchi, et al., The LDLcholesterol to HDL-cholesterol ratio and the severity of coronary and aortic atherosclerosis, Atherosclerosis, 222 (2012), 577-580. doi: 10.1016/j.atherosclerosis.2012.03.023
    [68] D. Moris, E. Mantonakis, E. Avgerinos, M. Makris, C. Bakoyiannis, E. Pikoulis, et al., Novel biomarkers of abdominal aortic aneurysm disease: identifying gaps and dispelling misperceptions, BioMed Res. Int., 2014 (2014).
    [69] J. R. Tonniges, B. Albert, E. P. Calomeni, S. Roy, J. Lee, X. Mo, et al., Collagen Fibril Ultrastructure in Mice Lacking Discoidin Domain Receptor 1, Microsc. Microanal., 22 (2016), 599-611. doi: 10.1017/S1431927616000787
    [70] C. Franco, G. Hou, P. J. Ahmad, E. Y. Fu, L. Koh, W. F. Vogel, et al., Discoidin domain receptor 1 (ddr1) deletion decreases atherosclerosis by accelerating matrix accumulation and reducing inflammation in low-density lipoprotein receptor-deficient mice, Circ. Res., 102 (2008), 1202-1211. doi: 10.1161/CIRCRESAHA.107.170662
    [71] S. Xu, S. Bala, M. P. Bendeck, Discoidin domain receptor 1 deficiency in vascular smooth muscle cells leads to mislocalisation of N-cadherin contacts, Biol. Open, 8 (2019), bio041913. doi: 10.1242/bio.041913
    [72] N. Ferri, N. O. Carragher, E. W. Raines, Role of discoidin domain receptors 1 and 2 in human smooth muscle cell-mediated collagen remodeling: potential implications in atherosclerosis and lymphangioleiomyomatosis, Am. J. Pathol., 164 (2004), 1575-1585. doi: 10.1016/S0002-9440(10)63716-9
    [73] G. Hou, W. Vogel, M. P. Bendeck, The discoidin domain receptor tyrosine kinase DDR1 in arterial wound repair, J. Clin. Invest., 107 (2001), 727-735. doi: 10.1172/JCI10720
    [74] G. Hou, W. F. Vogel, M. P. Bendeck, Tyrosine kinase activity of discoidin domain receptor 1 is necessary for smooth muscle cell migration and matrix metalloproteinase expression, Circ. Res., 90 (2002), 1147-1149. doi: 10.1161/01.RES.0000022166.74073.F8
    [75] T. Islam, Impact of statins on vascular smooth muscle cells and relevance to atherosclerosis, J. Physiol., (2020).
    [76] H. Martynowicz, P. Gać, O. Kornafel-Flak, S. Filipów, Ł. Łaczmański, M. Sobieszczańska, et al., The relationship between the effectiveness of blood pressure control and telomerase reverse transcriptase concentration, adipose tissue hormone concentration and endothelium function in hypertensives, Heart Lung Circ., 29 (2020), e200-e209. doi: 10.1016/j.hlc.2019.12.012
    [77] A. L. Høgh, J. Sandermann, J. S. Lindholt, Medical treatment of small abdominal aortic aneurysms, Ugeskr. Laeg., 170 (2008), 2003-2005.
    [78] L. Castro-Sanchez, A. Soto-Guzman, M. Guaderrama-Diaz, P. Cortes-Reynosa, E. P. Salazar, Role of DDR1 in the gelatinases secretion induced by native type IV collagen in MDA-MB-231 breast cancer cells, Clin. Exp. Metastasis, 28 (2011), 463-477. doi: 10.1007/s10585-011-9385-9
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4345) PDF downloads(280) Cited by(5)

Figures and Tables

Figures(8)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog