In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h...In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.展开更多
In the era of big data and artificial intelligence,optical neural networks(ONNs)have emerged as a promising alternative to conventional electronic approaches,offering superior parallelism,ultrafast processing speeds,a...In the era of big data and artificial intelligence,optical neural networks(ONNs)have emerged as a promising alternative to conventional electronic approaches,offering superior parallelism,ultrafast processing speeds,and high energy efficiency[1-3].However,a major bottleneck in the practical implementation of ONNs is the absence of effective nonlinear activation functions.Self-driven photodetectors have emerged as versatile optical to electrical converters,opening innovative avenues for energy-effective and flexibly integrated activation functions in ONNs through their reconfigurable optoelectronic nonlinearity.展开更多
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t...Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.展开更多
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener...The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.展开更多
Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation...Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation.The objective of this review is to evaluate the advances,relevances,and limitations of GANs in medical imaging.An organised literature review was conducted following the guidelines of PRISMA(Preferred Reporting Items for Systematic Reviews and Meta-Analyses).The literature considered included peer-reviewed papers published between 2020 and 2025 across databases including PubMed,IEEE Xplore,and Scopus.The studies related to applications of GAN architectures in medical imaging with reported experimental outcomes and published in English in reputable journals and conferences were considered for the review.Thesis,white papers,communication letters,and non-English articles were not included for the same.CLAIM based quality assessment criteria were applied to the included studies to assess the quality.The study classifies diverse GAN architectures,summarizing their clinical applications,technical performances,and their implementation hardships.Key findings reveal the increasing applications of GANs for enhancing diagnostic accuracy,reducing data scarcity through synthetic data generation,and supporting modality translation.However,concerns such as limited generalizability,lack of clinical validation,and regulatory constraints persist.This review provides a comprehensive study of the prevailing scenario of GANs in medical imaging and highlights crucial research gaps and future directions.Though GANs hold transformative capability for medical imaging,their integration into clinical use demands further validation,interpretability,and regulatory alignment.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these netw...Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field.展开更多
Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning in...Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond.展开更多
Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce different...Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce differential equations,constitutive relations,and boundary conditions within the loss function provides a physically grounded alternative to traditional data-driven models,particularly for solid and structural mechanics,where data are often limited or noisy.This review offers a comprehensive assessment of recent developments in PINNs,combining bibliometric analysis,theoretical foundations,application-oriented insights,and methodological innovations.A biblio-metric survey indicates a rapid increase in publications on PINNs since 2018,with prominent research clusters focused on numerical methods,structural analysis,and forecasting.Building upon this trend,the review consolidates advance-ments across five principal application domains,including forward structural analysis,inverse modeling and parameter identification,structural and topology optimization,assessment of structural integrity,and manufacturing processes.These applications are propelled by substantial methodological advancements,encompassing rigorous enforcement of boundary conditions,modified loss functions,adaptive training,domain decomposition strategies,multi-fidelity and transfer learning approaches,as well as hybrid finite element–PINN integration.These advances address recurring challenges in solid mechanics,such as high-order governing equations,material heterogeneity,complex geometries,localized phenomena,and limited experimental data.Despite remaining challenges in computational cost,scalability,and experimental validation,PINNs are increasingly evolving into specialized,physics-aware tools for practical solid and structural mechanics applications.展开更多
Red chilli powder(RCP)is a versatile spice accepted globally in diverse culinary products due to its distinct pungent characteristics and red colour.The higher market demand makes the spice vulnerable to unethical mix...Red chilli powder(RCP)is a versatile spice accepted globally in diverse culinary products due to its distinct pungent characteristics and red colour.The higher market demand makes the spice vulnerable to unethical mixing,so its quality assessment is crucial.The non-destructive application of computer vision for measuring food adulteration has always attracted researchers and industry due to its robustness and feasibility.Following the current era of Food Quality 4.0 and artificial intelligence,this study follows an approach based on 1D-convolutional neural networks(CNN)and 2D-CNN models for detecting RCP adulteration.The performance evaluation metrics are used to analyse the efficiency of these models.The histogram features from the Lab colour space trained on the 1D-CNN model(BS-40 and Epoch 100)show an accuracy of 84.56%.On the other hand,the 2D-CNN model DenseNet-121(AdamW and BS-30)also shows a test accuracy of 84.62%.From the observations of this study,it is concluded that CNN models can be a promising tool for solving the adulteration detection problem in food quality evaluation.Further,internet of things-based systems can be developed to aid the industry and government agencies in monitoring the quality of RCP to harness the unethical practices of food adulteration.展开更多
This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential g...This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs.展开更多
Global climate change is intensifying the impact of slope hazards,particularly rainfall-induced landslide hazards(RILH),on mountain road networks(MRNs).However,effective quantitative models for dynamically assessing M...Global climate change is intensifying the impact of slope hazards,particularly rainfall-induced landslide hazards(RILH),on mountain road networks(MRNs).However,effective quantitative models for dynamically assessing MRNs vulnerability under RILH disturbances are still lacking.To bridge this gap,this study develops a Cascading Failure Model for Rainfall-Induced Landslide Hazard(CFM-RILH).Validation via a case study of the GarzêTibetan Autonomous Prefecture Road Network(GTPRNs)reveals key characteristics of MRNs system vulnerability under RILH disturbances:(1)Under the disturbance effects of RILH,the vulnerability of the MRNs system follows a nonlinear phase transition law that intensifies with increasing disturbance intensity,exhibiting a distinct critical threshold.When the disturbance intensity exceeds this threshold,the system undergoes a global cascading failure phenomenon analogous to an“avalanche.”(2)Under RILH disturbances,the robustness of the MRNs system possesses a distinct safety boundary.Exceeding this boundary not only fails to improve hazard resistance but instead substantially elevates the risk of large-scale cascading failure.(3)Increasing network redundancy may be considered one of the primary engineering measures for enhancing MRNs resilience against such disturbances.Based on these findings,we propose a“Two-Stage Emergency Response and Hierarchical Fortification”strategy specifically to improve the resilience of GTPRNs impacted by RILH.The CFM-RILH model provides an effective tool for assessing road network vulnerability under such hazards.Furthermore,its modeling framework can also inform vulnerability assessment and resilience strategy development for road networks affected by other types of slope hazards.展开更多
The node labels collected from real-world applications are often accompanied by the occurrence of in-distribution noise(seen class nodes with wrong labels) and out-of-distribution noise(unseen class nodes with seen cl...The node labels collected from real-world applications are often accompanied by the occurrence of in-distribution noise(seen class nodes with wrong labels) and out-of-distribution noise(unseen class nodes with seen class labels), which significantly degrade the superior performance of recently emerged open-set graph neural networks(GNN). Nowadays, only a few researchers have attempted to introduce sample selection strategies developed in non-graph areas to limit the influence of noisy node labels. These studies often neglect the impact of inaccurate graph structure relationships, invalid utilization of noisy nodes and unlabeled nodes self-supervision information for noisy node labels constraint. More importantly, simply enhancing the accuracy of graph structure relationships or the utilization of nodes' self-supervision information still cannot minimize the influence of noisy node labels for open-set GNN. In this paper, we propose a novel RT-OGNN(robust training of open-set GNN) framework to solve the above-mentioned issues. Specifically, an effective graph structure learning module is proposed to weaken the impact of structure noise and extend the receptive field of nodes. Then, the augmented graph is sent to a pair of peer GNNs to accurately distinguish noisy node labels of labeled nodes. Third, the label propagation and multilayer perceptron-based decoder modules are simultaneously introduced to discover more supervision information from remaining nodes apart from clean nodes. Finally, we jointly optimize the above modules and open-set GNN in an end-to-end way via consistency regularization loss and cross-entropy loss, which minimizes the influence of noisy node labels and provides more supervision guidance for open-set GNN optimization.Extensive experiments on three benchmarks and various noise rates validate the superiority of RT-OGNN over state-of-the-art models.展开更多
Basins in western China produce hydrocarbons from 8,000 m deep and have been penetrated to 10,000 m,but the mechanical and petrophysical properties of deep and ultra-deep rocks are unclear and the origins of porosity ...Basins in western China produce hydrocarbons from 8,000 m deep and have been penetrated to 10,000 m,but the mechanical and petrophysical properties of deep and ultra-deep rocks are unclear and the origins of porosity and permeability remain a mystery.Our research used core samples from a depth of 7,600 m and mechanical tests to document the likely structural and porosity evolution of sandstone due to burial to 10,000 m.During triaxial tests,we characterized microstructure evolution using micro-CT scanning images and acoustic emissions and monitored stress and strain characteristics in high-temperature and high-pressure fluid environments.Under ultra deep-burial conditions,our samples deformed by pore collapse and pore distortion and brittle and ductile fracture,independently or concurrently.Under increasing triaxial stress,temperature and fluid pressure,sandstones initially lose porosity and permeability by pore collapse and compaction then develop a network of interconnected pores and fractures.Consequently,porosity can reach 8% to 18%,possibly accounting for fluid storage and flow capacity at depths of 10,000 m.Samples from 7,600 m lack substantial quartz,calcite cement and rapid burial for our samples and rocks at 10,000 m and quartz,calcite accumulation systematics suggests that though subject to temperatures of as much as 200°C,porosity loss and gain in sandstones at 10,000 m may be primarily due to compaction.Our tests show that due to pore collapse and grain fracture,sandstones having high initial porosity and permeability have a greater increase of porosity and permeability due to loading.展开更多
Owing to intensified globalization and informatization,the structures of the urban scale hierarchy and urban networks between cities have become increasingly intertwined,resulting in different spatial effects.Therefor...Owing to intensified globalization and informatization,the structures of the urban scale hierarchy and urban networks between cities have become increasingly intertwined,resulting in different spatial effects.Therefore,this paper analyzes the spatial interaction between urban scale hierarchy and urban networks in China from 2019 to 2023,drawing on Baidu migration data and employing a spatial simultaneous equation model.The results reveal a significant positive spatial correlation between cities with higher hierarchy and those with greater network centrality.Within a static framework,we identify a positive interaction between urban scale hierarchy and urban network centrality,while their spatial cross-effects manifest as negative neighborhood interactions based on geographical distance and positive cross-scale interactions shaped by network connections.Within a dynamic framework,changes in urban scale hierarchy and urban networks are mutually reinforcing,thereby widening disparities within the urban hierarchy.Furthermore,an increase in a city’s network centrality had a dampening effect on the population growth of neighboring cities and network-connected cities.This study enhances understanding of the spatial organisation of urban systems and offers insights for coordinated regional development.展开更多
Internal structural defects in engineering rock masses vary in size,exhibit complex shapes,and are unevenly distributed.Dominant fractures within a rock mass often play a critical to its mechanical behavior,directly a...Internal structural defects in engineering rock masses vary in size,exhibit complex shapes,and are unevenly distributed.Dominant fractures within a rock mass often play a critical to its mechanical behavior,directly affecting the macromechanical properties and failure modes.These fractures affect the instability and failure of the surrounding rock,significantlyimpacting the overall stability of engineering structures.Herein,sand-powder three-dimensional(3D)printing technology was used to prepare rock-like specimens with internal fracture networks.Triaxial compression testing,post-failure fracture mapping,and fractal dimension analysis of the fracture surfaces were conducted to investigate the effects of dominant fracture angles on the strength and deformation of rocks with internal fracture networks under triaxial stress.The results indicate that the dominant fracture angle has a pronounced effect on the mechanical behavior of rock.With increasing angle,both compressive strength and elastic modulus exhibit an initial decline followed by an increase.Moreover,higher confiningpressure significantlyimproves the compressive strength of fractured rock.This enhancement weakens as the confiningpressure further increases.Moreover,with increasing confiningpressure,the differences between the maximum and minimum values of elastic moduli and lateral strain ratios in fractured rock gradually decrease.Thus,the impact of the dominant fracture angle on rock mass deformation decreases with increasing confiningpressure.This research elucidates the effects of dominant fracture angles on the mechanical and failure properties of complex fractured rock masses and the influenceof the confiningpressure on these relationships.It provides valuable theoretical insights and practical guidance for stability analyses in engineering rock masses.展开更多
Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and env...Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs.展开更多
An efficient data-driven numerical framework is developed for transient heat conduction analysis in thin-walled structures.The proposed approach integrates spectral time discretization with neural network approximatio...An efficient data-driven numerical framework is developed for transient heat conduction analysis in thin-walled structures.The proposed approach integrates spectral time discretization with neural network approximation,forming a spectral-integrated neural network(SINN)scheme tailored for problems characterized by long-time evolution.Temporal derivatives are treated through a spectral integration strategy based on orthogonal polynomial expansions,which significantly alleviates stability constraints associated with conventional time-marching schemes.A fully connected neural network is employed to approximate the temperature-related variables,while governing equa-tions and boundary conditions are enforced through a physics-informed loss formulation.Numerical investigations demonstrate that the proposed method maintains high accuracy even when large time steps are adopted,where standard numerical solvers often suffer from instability or excessive computational cost.Moreover,the framework exhibits strong robustness for ultrathin configurations with extreme aspect ratios,achieving relative errors on the order of 10−5 or lower.These results indicate that the SINN framework provides a reliable and efficient alternative for transient thermal analysis of thin-walled structures under challenging computational conditions.展开更多
Shape memory polymers used in 4D printing only had one permanent shape after molding,which limited their applications in requiring multiple reconstructions and multifunctional shapes.Furthermore,the inherent stability...Shape memory polymers used in 4D printing only had one permanent shape after molding,which limited their applications in requiring multiple reconstructions and multifunctional shapes.Furthermore,the inherent stability of the triazine ring structure within cyanate ester(CE)crosslinked networks after molding posed significant challenges for both recycling,repairing,and degradation of resin.To address these obstacles,dynamic thiocyanate ester(TCE)bonds and photocurable group were incorporated into CE,obtaining the recyclable and 3D printable CE covalent adaptable networks(CANs),denoted as PTCE1.5.This material exhibits a Young's modulus of 810 MPa and a tensile strength of 50.8 MPa.Notably,damaged printed PTCE1.5 objects can be readily repaired through reprinting and interface rejoining by thermal treatment.Leveraging the solid-state plasticity,PTCE1.5 also demonstrated attractive shape memory ability and permanent shape reconfigurability,enabling its reconfigurable 4D printing.The printed PTCE1.5 hinges and a main body were assembled into a deployable and retractable satellite model,validating its potential application as a controllable component in the aerospace field.Moreover,printed PTCE1.5 can be fully degraded into thiol-modified intermediate products.Overall,this material not only enriches the application range of CE resin,but also provides a reliable approach to addressing environmental issue.展开更多
基金funding from the European Commission by the Ruralities project(grant agreement no.101060876).
文摘In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.
基金supported by the National Natural Science Foundation of China(52422107,T2394471,and 62571319)Beijing Nova Program(20240484531)+1 种基金China Postdoctoral Science Foundation(2022M710074)and Open Research Fund Program of Beijing National Research Center for Information Science and Technology(04410304023).
文摘In the era of big data and artificial intelligence,optical neural networks(ONNs)have emerged as a promising alternative to conventional electronic approaches,offering superior parallelism,ultrafast processing speeds,and high energy efficiency[1-3].However,a major bottleneck in the practical implementation of ONNs is the absence of effective nonlinear activation functions.Self-driven photodetectors have emerged as versatile optical to electrical converters,opening innovative avenues for energy-effective and flexibly integrated activation functions in ONNs through their reconfigurable optoelectronic nonlinearity.
文摘Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2025-00559546)supported by the IITP(Institute of Information&Coummunications Technology Planning&Evaluation)-ITRC(Information Technology Research Center)grant funded by the Korea government(Ministry of Science and ICT)(IITP-2025-RS-2023-00259004).
文摘The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.
基金supported by Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/540/46.
文摘Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation.The objective of this review is to evaluate the advances,relevances,and limitations of GANs in medical imaging.An organised literature review was conducted following the guidelines of PRISMA(Preferred Reporting Items for Systematic Reviews and Meta-Analyses).The literature considered included peer-reviewed papers published between 2020 and 2025 across databases including PubMed,IEEE Xplore,and Scopus.The studies related to applications of GAN architectures in medical imaging with reported experimental outcomes and published in English in reputable journals and conferences were considered for the review.Thesis,white papers,communication letters,and non-English articles were not included for the same.CLAIM based quality assessment criteria were applied to the included studies to assess the quality.The study classifies diverse GAN architectures,summarizing their clinical applications,technical performances,and their implementation hardships.Key findings reveal the increasing applications of GANs for enhancing diagnostic accuracy,reducing data scarcity through synthetic data generation,and supporting modality translation.However,concerns such as limited generalizability,lack of clinical validation,and regulatory constraints persist.This review provides a comprehensive study of the prevailing scenario of GANs in medical imaging and highlights crucial research gaps and future directions.Though GANs hold transformative capability for medical imaging,their integration into clinical use demands further validation,interpretability,and regulatory alignment.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
文摘Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Saudi Arabia,grant number RG-2-611-42(A.O.A.).
文摘Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond.
基金funded by National Research Council of Thailand(contract No.N42A671047).
文摘Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce differential equations,constitutive relations,and boundary conditions within the loss function provides a physically grounded alternative to traditional data-driven models,particularly for solid and structural mechanics,where data are often limited or noisy.This review offers a comprehensive assessment of recent developments in PINNs,combining bibliometric analysis,theoretical foundations,application-oriented insights,and methodological innovations.A biblio-metric survey indicates a rapid increase in publications on PINNs since 2018,with prominent research clusters focused on numerical methods,structural analysis,and forecasting.Building upon this trend,the review consolidates advance-ments across five principal application domains,including forward structural analysis,inverse modeling and parameter identification,structural and topology optimization,assessment of structural integrity,and manufacturing processes.These applications are propelled by substantial methodological advancements,encompassing rigorous enforcement of boundary conditions,modified loss functions,adaptive training,domain decomposition strategies,multi-fidelity and transfer learning approaches,as well as hybrid finite element–PINN integration.These advances address recurring challenges in solid mechanics,such as high-order governing equations,material heterogeneity,complex geometries,localized phenomena,and limited experimental data.Despite remaining challenges in computational cost,scalability,and experimental validation,PINNs are increasingly evolving into specialized,physics-aware tools for practical solid and structural mechanics applications.
文摘Red chilli powder(RCP)is a versatile spice accepted globally in diverse culinary products due to its distinct pungent characteristics and red colour.The higher market demand makes the spice vulnerable to unethical mixing,so its quality assessment is crucial.The non-destructive application of computer vision for measuring food adulteration has always attracted researchers and industry due to its robustness and feasibility.Following the current era of Food Quality 4.0 and artificial intelligence,this study follows an approach based on 1D-convolutional neural networks(CNN)and 2D-CNN models for detecting RCP adulteration.The performance evaluation metrics are used to analyse the efficiency of these models.The histogram features from the Lab colour space trained on the 1D-CNN model(BS-40 and Epoch 100)show an accuracy of 84.56%.On the other hand,the 2D-CNN model DenseNet-121(AdamW and BS-30)also shows a test accuracy of 84.62%.From the observations of this study,it is concluded that CNN models can be a promising tool for solving the adulteration detection problem in food quality evaluation.Further,internet of things-based systems can be developed to aid the industry and government agencies in monitoring the quality of RCP to harness the unethical practices of food adulteration.
文摘This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs.
基金financially supported by the National Key R&D Program of China(2024YFE0111900)The National Natural Science Foundation of China(U2468214,52378370,52278372)+1 种基金The National Ten Thousand Talent Program for Young Top-notch Talents(2022QB04978)The Science and Technology Program of Hebei Province(2023HBQZYCSB004)。
文摘Global climate change is intensifying the impact of slope hazards,particularly rainfall-induced landslide hazards(RILH),on mountain road networks(MRNs).However,effective quantitative models for dynamically assessing MRNs vulnerability under RILH disturbances are still lacking.To bridge this gap,this study develops a Cascading Failure Model for Rainfall-Induced Landslide Hazard(CFM-RILH).Validation via a case study of the GarzêTibetan Autonomous Prefecture Road Network(GTPRNs)reveals key characteristics of MRNs system vulnerability under RILH disturbances:(1)Under the disturbance effects of RILH,the vulnerability of the MRNs system follows a nonlinear phase transition law that intensifies with increasing disturbance intensity,exhibiting a distinct critical threshold.When the disturbance intensity exceeds this threshold,the system undergoes a global cascading failure phenomenon analogous to an“avalanche.”(2)Under RILH disturbances,the robustness of the MRNs system possesses a distinct safety boundary.Exceeding this boundary not only fails to improve hazard resistance but instead substantially elevates the risk of large-scale cascading failure.(3)Increasing network redundancy may be considered one of the primary engineering measures for enhancing MRNs resilience against such disturbances.Based on these findings,we propose a“Two-Stage Emergency Response and Hierarchical Fortification”strategy specifically to improve the resilience of GTPRNs impacted by RILH.The CFM-RILH model provides an effective tool for assessing road network vulnerability under such hazards.Furthermore,its modeling framework can also inform vulnerability assessment and resilience strategy development for road networks affected by other types of slope hazards.
基金supported by the General Program of the National Natural Science Foundation of China (Grant No.62575116)the National Natural Science Foundation of China (Grant No.62262005)+1 种基金the High-level Innovative Talents in Guizhou Province (Grant No.GCC[2023]033)the Open Project of the Text Computing and Cognitive Intelligence Ministry of Education Engineering Research Center(Grant No.TCCI250208)。
文摘The node labels collected from real-world applications are often accompanied by the occurrence of in-distribution noise(seen class nodes with wrong labels) and out-of-distribution noise(unseen class nodes with seen class labels), which significantly degrade the superior performance of recently emerged open-set graph neural networks(GNN). Nowadays, only a few researchers have attempted to introduce sample selection strategies developed in non-graph areas to limit the influence of noisy node labels. These studies often neglect the impact of inaccurate graph structure relationships, invalid utilization of noisy nodes and unlabeled nodes self-supervision information for noisy node labels constraint. More importantly, simply enhancing the accuracy of graph structure relationships or the utilization of nodes' self-supervision information still cannot minimize the influence of noisy node labels for open-set GNN. In this paper, we propose a novel RT-OGNN(robust training of open-set GNN) framework to solve the above-mentioned issues. Specifically, an effective graph structure learning module is proposed to weaken the impact of structure noise and extend the receptive field of nodes. Then, the augmented graph is sent to a pair of peer GNNs to accurately distinguish noisy node labels of labeled nodes. Third, the label propagation and multilayer perceptron-based decoder modules are simultaneously introduced to discover more supervision information from remaining nodes apart from clean nodes. Finally, we jointly optimize the above modules and open-set GNN in an end-to-end way via consistency regularization loss and cross-entropy loss, which minimizes the influence of noisy node labels and provides more supervision guidance for open-set GNN optimization.Extensive experiments on three benchmarks and various noise rates validate the superiority of RT-OGNN over state-of-the-art models.
基金supported by the Fundamental Forward-looking Major Project of PetroChina(Grant No.2023ZZ02)the National Natural Science Foundation of China(Grant No.U22B600002).
文摘Basins in western China produce hydrocarbons from 8,000 m deep and have been penetrated to 10,000 m,but the mechanical and petrophysical properties of deep and ultra-deep rocks are unclear and the origins of porosity and permeability remain a mystery.Our research used core samples from a depth of 7,600 m and mechanical tests to document the likely structural and porosity evolution of sandstone due to burial to 10,000 m.During triaxial tests,we characterized microstructure evolution using micro-CT scanning images and acoustic emissions and monitored stress and strain characteristics in high-temperature and high-pressure fluid environments.Under ultra deep-burial conditions,our samples deformed by pore collapse and pore distortion and brittle and ductile fracture,independently or concurrently.Under increasing triaxial stress,temperature and fluid pressure,sandstones initially lose porosity and permeability by pore collapse and compaction then develop a network of interconnected pores and fractures.Consequently,porosity can reach 8% to 18%,possibly accounting for fluid storage and flow capacity at depths of 10,000 m.Samples from 7,600 m lack substantial quartz,calcite cement and rapid burial for our samples and rocks at 10,000 m and quartz,calcite accumulation systematics suggests that though subject to temperatures of as much as 200°C,porosity loss and gain in sandstones at 10,000 m may be primarily due to compaction.Our tests show that due to pore collapse and grain fracture,sandstones having high initial porosity and permeability have a greater increase of porosity and permeability due to loading.
基金Under the auspices of the National Natural Science Foundation of China(No.42371222,41971167)Fundamental Scientific Research Funds of Central China Normal University(No.CCNU24ZZ120)。
文摘Owing to intensified globalization and informatization,the structures of the urban scale hierarchy and urban networks between cities have become increasingly intertwined,resulting in different spatial effects.Therefore,this paper analyzes the spatial interaction between urban scale hierarchy and urban networks in China from 2019 to 2023,drawing on Baidu migration data and employing a spatial simultaneous equation model.The results reveal a significant positive spatial correlation between cities with higher hierarchy and those with greater network centrality.Within a static framework,we identify a positive interaction between urban scale hierarchy and urban network centrality,while their spatial cross-effects manifest as negative neighborhood interactions based on geographical distance and positive cross-scale interactions shaped by network connections.Within a dynamic framework,changes in urban scale hierarchy and urban networks are mutually reinforcing,thereby widening disparities within the urban hierarchy.Furthermore,an increase in a city’s network centrality had a dampening effect on the population growth of neighboring cities and network-connected cities.This study enhances understanding of the spatial organisation of urban systems and offers insights for coordinated regional development.
基金supported by the National Key Research and Development Program Young Scientist Project(Grant No.2024YFC2911000)the National Natural Science Foundation of China(Grant No.52474103)the Major Basic Research Project of the Natural Science Foundation of Shandong Province(Grant No.ZR2024ZD22).
文摘Internal structural defects in engineering rock masses vary in size,exhibit complex shapes,and are unevenly distributed.Dominant fractures within a rock mass often play a critical to its mechanical behavior,directly affecting the macromechanical properties and failure modes.These fractures affect the instability and failure of the surrounding rock,significantlyimpacting the overall stability of engineering structures.Herein,sand-powder three-dimensional(3D)printing technology was used to prepare rock-like specimens with internal fracture networks.Triaxial compression testing,post-failure fracture mapping,and fractal dimension analysis of the fracture surfaces were conducted to investigate the effects of dominant fracture angles on the strength and deformation of rocks with internal fracture networks under triaxial stress.The results indicate that the dominant fracture angle has a pronounced effect on the mechanical behavior of rock.With increasing angle,both compressive strength and elastic modulus exhibit an initial decline followed by an increase.Moreover,higher confiningpressure significantlyimproves the compressive strength of fractured rock.This enhancement weakens as the confiningpressure further increases.Moreover,with increasing confiningpressure,the differences between the maximum and minimum values of elastic moduli and lateral strain ratios in fractured rock gradually decrease.Thus,the impact of the dominant fracture angle on rock mass deformation decreases with increasing confiningpressure.This research elucidates the effects of dominant fracture angles on the mechanical and failure properties of complex fractured rock masses and the influenceof the confiningpressure on these relationships.It provides valuable theoretical insights and practical guidance for stability analyses in engineering rock masses.
基金supported in part by the National Natural Science Foundation of China(Key Program)under Grant No.62031021。
文摘Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs.
基金supported by the National Natural Science Foundation of China(Nos.12422207 and 12372199).
文摘An efficient data-driven numerical framework is developed for transient heat conduction analysis in thin-walled structures.The proposed approach integrates spectral time discretization with neural network approximation,forming a spectral-integrated neural network(SINN)scheme tailored for problems characterized by long-time evolution.Temporal derivatives are treated through a spectral integration strategy based on orthogonal polynomial expansions,which significantly alleviates stability constraints associated with conventional time-marching schemes.A fully connected neural network is employed to approximate the temperature-related variables,while governing equa-tions and boundary conditions are enforced through a physics-informed loss formulation.Numerical investigations demonstrate that the proposed method maintains high accuracy even when large time steps are adopted,where standard numerical solvers often suffer from instability or excessive computational cost.Moreover,the framework exhibits strong robustness for ultrathin configurations with extreme aspect ratios,achieving relative errors on the order of 10−5 or lower.These results indicate that the SINN framework provides a reliable and efficient alternative for transient thermal analysis of thin-walled structures under challenging computational conditions.
基金supported by the National Natural Science Foundation of China(Nos.52473080,52403167 and 52173079)the Fundamental Research Funds for the Central Universities(Nos.xtr052023001 and xzy012023037)+1 种基金the Postdoctoral Research Project of Shaanxi Province(No.2024BSHSDZZ054)the Shaanxi Laboratory of Advanced Materials(No.2024ZY-JCYJ-04-12).
文摘Shape memory polymers used in 4D printing only had one permanent shape after molding,which limited their applications in requiring multiple reconstructions and multifunctional shapes.Furthermore,the inherent stability of the triazine ring structure within cyanate ester(CE)crosslinked networks after molding posed significant challenges for both recycling,repairing,and degradation of resin.To address these obstacles,dynamic thiocyanate ester(TCE)bonds and photocurable group were incorporated into CE,obtaining the recyclable and 3D printable CE covalent adaptable networks(CANs),denoted as PTCE1.5.This material exhibits a Young's modulus of 810 MPa and a tensile strength of 50.8 MPa.Notably,damaged printed PTCE1.5 objects can be readily repaired through reprinting and interface rejoining by thermal treatment.Leveraging the solid-state plasticity,PTCE1.5 also demonstrated attractive shape memory ability and permanent shape reconfigurability,enabling its reconfigurable 4D printing.The printed PTCE1.5 hinges and a main body were assembled into a deployable and retractable satellite model,validating its potential application as a controllable component in the aerospace field.Moreover,printed PTCE1.5 can be fully degraded into thiol-modified intermediate products.Overall,this material not only enriches the application range of CE resin,but also provides a reliable approach to addressing environmental issue.