The landscape of financial transactions has grown increasingly complex due to the expansion of global economic integration and advancements in information technology.This complexity poses greater challenges in detecti...The landscape of financial transactions has grown increasingly complex due to the expansion of global economic integration and advancements in information technology.This complexity poses greater challenges in detecting and managing financial fraud.This review explores the role of Graph Neural Networks(GNNs)in addressing these challenges by proposing a unified framework that categorizes existing GNN methodologies applied to financial fraud detection.Specifically,by examining a series of detailed research questions,this review delves into the suitability of GNNs for financial fraud detection,their deployment in real-world scenarios,and the design considerations that enhance their effectiveness.This review reveals that GNNs are exceptionally adept at capturing complex relational patterns and dynamics within financial networks,significantly outperforming traditional fraud detection methods.Unlike previous surveys that often overlook the specific potentials of GNNs or address them only superficially,our review provides a comprehensive,structured analysis,distinctly focusing on the multifaceted applications and deployments of GNNs in financial fraud detection.This review not only highlights the potential of GNNs to improve fraud detection mechanisms but also identifies current gaps and outlines future research directions to enhance their deployment in financial systems.Through a structured review of over 100 studies,this review paper contributes to the understanding of GNN applications in financial fraud detection,offering insights into their adaptability and potential integration strategies.展开更多
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based...With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not only reflects the time characteristics of the packet but also strengthens the relationship between the client or server packets. According to FMG, a Traffic Mapping Classification model (TMC-GCN) is designed, which can automatically capture and learn the characteristics and structure information of the top vertex in FMG. The TMC-GCN model is used to classify the encrypted traffic. The encryption stream classification problem is transformed into a graph classification problem, which can effectively deal with data from different data sources and application scenarios. By comparing the performance of TMC-GCN with other classical models in four public datasets, including CICIOT2023, ISCXVPN2016, CICAAGM2017, and GraphDapp, the effectiveness of the FMG algorithm is verified. The experimental results show that the accuracy rate of the TMC-GCN model is 96.13%, the recall rate is 95.04%, and the F1 rate is 94.54%.展开更多
为解决财务人员数字技术应用能力不足、传统财务流程中数据采集质量差导致重复返工、人工数据处理效率低等问题,设计开发了财务共享辅助系统。采用机器人流程自动化(RPA,Robotic Process Automation)和图检索增强生成(Graph RAG,Graph-b...为解决财务人员数字技术应用能力不足、传统财务流程中数据采集质量差导致重复返工、人工数据处理效率低等问题,设计开发了财务共享辅助系统。采用机器人流程自动化(RPA,Robotic Process Automation)和图检索增强生成(Graph RAG,Graph-based Retrieval-Augmented Generation)技术,实现数据填报收集、RPA自动化处理、智能问答等功能,显著提升财务报账效率,为铁路局集团公司财务共享中心的建设提供支撑。展开更多
This paper investigates the challenges associated with Unmanned Aerial Vehicle (UAV) collaborative search and target tracking in dynamic and unknown environments characterized by limited field of view. The primary obj...This paper investigates the challenges associated with Unmanned Aerial Vehicle (UAV) collaborative search and target tracking in dynamic and unknown environments characterized by limited field of view. The primary objective is to explore the unknown environments to locate and track targets effectively. To address this problem, we propose a novel Multi-Agent Reinforcement Learning (MARL) method based on Graph Neural Network (GNN). Firstly, a method is introduced for encoding continuous-space multi-UAV problem data into spatial graphs which establish essential relationships among agents, obstacles, and targets. Secondly, a Graph AttenTion network (GAT) model is presented, which focuses exclusively on adjacent nodes, learns attention weights adaptively and allows agents to better process information in dynamic environments. Reward functions are specifically designed to tackle exploration challenges in environments with sparse rewards. By introducing a framework that integrates centralized training and distributed execution, the advancement of models is facilitated. Simulation results show that the proposed method outperforms the existing MARL method in search rate and tracking performance with less collisions. The experiments show that the proposed method can be extended to applications with a larger number of agents, which provides a potential solution to the challenging problem of multi-UAV autonomous tracking in dynamic unknown environments.展开更多
The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are cr...The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics.展开更多
Negative logarithm of the acid dissociation constant(pK_(a))significantly influences the absorption,dis-tribution,metabolism,excretion,and toxicity(ADMET)properties of molecules and is a crucial indicator in drug rese...Negative logarithm of the acid dissociation constant(pK_(a))significantly influences the absorption,dis-tribution,metabolism,excretion,and toxicity(ADMET)properties of molecules and is a crucial indicator in drug research.Given the rapid and accurate characteristics of computational methods,their role in predicting drug properties is increasingly important.Although many pK_(a) prediction models currently exist,they often focus on enhancing model precision while neglecting interpretability.In this study,we present GraFpKa,a pK_(a) prediction model using graph neural networks(GNNs)and molecular finger-prints.The results show that our acidic and basic models achieved mean absolute errors(MAEs)of 0.621 and 0.402,respectively,on the test set,demonstrating good predictive performance.Notably,to improve interpretability,GraFpKa also incorporates Integrated Gradients(IGs),providing a clearer visual description of the atoms significantly affecting the pK_(a) values.The high reliability and interpretability of GraFpKa ensure accurate pKa predictions while also facilitating a deeper understanding of the relation-ship between molecular structure and pK_(a) values,making it a valuable tool in the field of pK_(a) prediction.展开更多
Identifying key nodes in complex networks is crucial for understanding and controlling their dynamics. Traditional centrality measures often fall short in capturing the multifaceted roles of nodes within these network...Identifying key nodes in complex networks is crucial for understanding and controlling their dynamics. Traditional centrality measures often fall short in capturing the multifaceted roles of nodes within these networks. The Page Rank algorithm, widely recognized for ranking web pages, offers a more nuanced approach by considering the importance of connected nodes. However, existing methods generally overlook the geometric properties of networks, which can provide additional insights into their structure and functionality. In this paper, we propose a novel method named Curv-Page Rank(C-PR), which integrates network curvature and Page Rank to identify influential nodes in complex networks. By leveraging the geometric insights provided by curvature alongside structural properties, C-PR offers a more comprehensive measure of a node's influence. Our approach is particularly effective in networks with community structures, where it excels at pinpointing bridge nodes critical for maintaining connectivity and facilitating information flow. We validate the effectiveness of C-PR through extensive experiments. The results demonstrate that C-PR outperforms traditional centrality-based and Page Rank methods in identifying critical nodes. Our findings offer fresh insights into the structural importance of nodes across diverse network configurations, highlighting the potential of incorporating geometric properties into network analysis.展开更多
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu...Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments.展开更多
Traditional Chinese medicine(TCM)serves as a treasure trove of ancient knowledge,holding a crucial position in the medical field.However,the exploration of TCM's extensive information has been hindered by challeng...Traditional Chinese medicine(TCM)serves as a treasure trove of ancient knowledge,holding a crucial position in the medical field.However,the exploration of TCM's extensive information has been hindered by challenges related to data standardization,completeness,and accuracy,primarily due to the decen-tralized distribution of TCM resources.To address these issues,we developed a platform for TCM knowledge discovery(TCMKD,https://cbcb.cdutcm.edu.cn/TCMKD/).Seven types of data,including syndromes,formulas,Chinese patent drugs(CPDs),Chinese medicinal materials(CMMs),ingredients,targets,and diseases,were manually proofread and consolidated within TCMKD.To strengthen the integration of TCM with modern medicine,TCMKD employs analytical methods such as TCM data mining,enrichment analysis,and network localization and separation.These tools help elucidate the molecular-level commonalities between TCM and contemporary scientific insights.In addition to its analytical capabilities,a quick question and answer(Q&A)system is also embedded within TCMKD to query the database efficiently,thereby improving the interactivity of the platform.The platform also provides a TCM text annotation tool,offering a simple and efficient method for TCM text mining.Overall,TCMKD not only has the potential to become a pivotal repository for TCM,delving into the pharmaco-logical foundations of TCM treatments,but its flexible embedded tools and algorithms can also be applied to the study of other traditional medical systems,extending beyond just TCM.展开更多
In underground mining,especially in entry-type excavations,the instability of surrounding rock structures can lead to incalculable losses.As a crucial tool for stability analysis in entry-type excavations,the critical...In underground mining,especially in entry-type excavations,the instability of surrounding rock structures can lead to incalculable losses.As a crucial tool for stability analysis in entry-type excavations,the critical span graph must be updated to meet more stringent engineering requirements.Given this,this study introduces the support vector machine(SVM),along with multiple ensemble(bagging,adaptive boosting,and stacking)and optimization(Harris hawks optimization(HHO),cuckoo search(CS))techniques,to overcome the limitations of the traditional methods.The analysis indicates that the hybrid model combining SVM,bagging,and CS strategies has a good prediction performance,and its test accuracy reaches 0.86.Furthermore,the partition scheme of the critical span graph is adjusted based on the CS-BSVM model and 399 cases.Compared with previous empirical or semi-empirical methods,the new model overcomes the interference of subjective factors and possesses higher interpretability.Since relying solely on one technology cannot ensure prediction credibility,this study further introduces genetic programming(GP)and kriging interpolation techniques.The explicit expressions derived through GP can offer the stability probability value,and the kriging technique can provide interpolated definitions for two new subclasses.Finally,a prediction platform is developed based on the above three approaches,which can rapidly provide engineering feedback.展开更多
Traditional Chinese medicine formula(TCMF)represents a fundamental component of Chinese medical practice,incorporating medical knowledge and practices from both Han Chinese and various ethnic minorities,while providin...Traditional Chinese medicine formula(TCMF)represents a fundamental component of Chinese medical practice,incorporating medical knowledge and practices from both Han Chinese and various ethnic minorities,while providing comprehensive insights into health and disease.The foundation of TCMF lies in its holistic approach,manifested through herbal compatibility theory,which has emerged from extensive clinical experience and evolved into a highly refined knowledge system.Within this framework,Chinese herbal medicines exhibit intricated characteristics,including multi-component interactions,diverse target sites,and varied biological pathways.These complexities pose significant challenges for understanding their molecular mechanisms.Contemporary advances in artificial intelligence(AI)are reshaping research in traditional Chinese medicine(TCM),offering immense potential to transform our understanding of the molecular mechanisms underlying TCMFs.This review explores the application of AI in uncovering these mechanisms,highlighting its role in compound absorption,distribution,metabolism,and excretion(ADME)prediction,molecular target identification,compound and target synergy recognition,pharmacological mechanisms exploration,and herbal formula optimization.Furthermore,the review discusses the challenges and opportunities in AI-assisted research on TCMF molecular mechanisms,promoting the modernization and globalization of TCM.展开更多
In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shippi...In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shipping is characterized by a vast array of document types, filled with complex, large-scale, and often chaotic knowledge and relationships. Effectively managing these documents is crucial for developing a Large Language Model (LLM) in the maritime domain, enabling practitioners to access and leverage valuable information. A Knowledge Graph (KG) offers a state-of-the-art solution for enhancing knowledge retrieval, providing more accurate responses and enabling context-aware reasoning. This paper presents a framework for utilizing maritime and shipping documents to construct a knowledge graph using GraphRAG, a hybrid tool combining graph-based retrieval and generation capabilities. The extraction of entities and relationships from these documents and the KG construction process are detailed. Furthermore, the KG is integrated with an LLM to develop a Q&A system, demonstrating that the system significantly improves answer accuracy compared to traditional LLMs. Additionally, the KG construction process is up to 50% faster than conventional LLM-based approaches, underscoring the efficiency of our method. This study provides a promising approach to digital intelligence in shipping, advancing knowledge accessibility and decision-making.展开更多
Modern aircraft tend to use fuel thermal management systems to cool onboard heat sources.However,the design of heat transfer architectures for fuel thermal management systems relies on the experience of the engineers ...Modern aircraft tend to use fuel thermal management systems to cool onboard heat sources.However,the design of heat transfer architectures for fuel thermal management systems relies on the experience of the engineers and lacks theoretical guidance.This paper proposes a concise graph representation method based on graph theory for fuel thermal management systems,which can represent all possible connections between subsystems.A generalized optimization algorithm is proposed for fuel thermal management system architecture to minimize the heat sink.This algorithm can autonomously arrange subsystems with heat production differences and efficiently utilize the architecture of the fuel heat sink.At the same time,two evaluation indices are proposed from the perspective of subsystems.These indices intuitively and clearly show that the reason for the high efficiency of heat sink utilization is the balanced and moderate cooling of each subsystem and verify the rationality of the architecture optimization method.A set of simulations are also conducted,which demonstrate that the fuel tank temperature has no effect on the performance of the architecture.This paper provides a reference for the architectural design of aircraft fuel thermal management systems.The metrics used in this paper can also be utilized to evaluate the existing architecture.展开更多
基金supported by the National Key R&D Program of China(No.2022YFB4501704)the National Natural Science Foundation of China(Grant No.62102287)the Shanghai Science and Technology Innovation Action Plan Project(Nos.22YS1400600 and 22511100700).
文摘The landscape of financial transactions has grown increasingly complex due to the expansion of global economic integration and advancements in information technology.This complexity poses greater challenges in detecting and managing financial fraud.This review explores the role of Graph Neural Networks(GNNs)in addressing these challenges by proposing a unified framework that categorizes existing GNN methodologies applied to financial fraud detection.Specifically,by examining a series of detailed research questions,this review delves into the suitability of GNNs for financial fraud detection,their deployment in real-world scenarios,and the design considerations that enhance their effectiveness.This review reveals that GNNs are exceptionally adept at capturing complex relational patterns and dynamics within financial networks,significantly outperforming traditional fraud detection methods.Unlike previous surveys that often overlook the specific potentials of GNNs or address them only superficially,our review provides a comprehensive,structured analysis,distinctly focusing on the multifaceted applications and deployments of GNNs in financial fraud detection.This review not only highlights the potential of GNNs to improve fraud detection mechanisms but also identifies current gaps and outlines future research directions to enhance their deployment in financial systems.Through a structured review of over 100 studies,this review paper contributes to the understanding of GNN applications in financial fraud detection,offering insights into their adaptability and potential integration strategies.
基金supported by the National Key Research and Development Program of China No.2023YFA1009500.
文摘With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not only reflects the time characteristics of the packet but also strengthens the relationship between the client or server packets. According to FMG, a Traffic Mapping Classification model (TMC-GCN) is designed, which can automatically capture and learn the characteristics and structure information of the top vertex in FMG. The TMC-GCN model is used to classify the encrypted traffic. The encryption stream classification problem is transformed into a graph classification problem, which can effectively deal with data from different data sources and application scenarios. By comparing the performance of TMC-GCN with other classical models in four public datasets, including CICIOT2023, ISCXVPN2016, CICAAGM2017, and GraphDapp, the effectiveness of the FMG algorithm is verified. The experimental results show that the accuracy rate of the TMC-GCN model is 96.13%, the recall rate is 95.04%, and the F1 rate is 94.54%.
基金supported by the National Natural Science Foundation of China(Nos.12272104,U22B2013).
文摘This paper investigates the challenges associated with Unmanned Aerial Vehicle (UAV) collaborative search and target tracking in dynamic and unknown environments characterized by limited field of view. The primary objective is to explore the unknown environments to locate and track targets effectively. To address this problem, we propose a novel Multi-Agent Reinforcement Learning (MARL) method based on Graph Neural Network (GNN). Firstly, a method is introduced for encoding continuous-space multi-UAV problem data into spatial graphs which establish essential relationships among agents, obstacles, and targets. Secondly, a Graph AttenTion network (GAT) model is presented, which focuses exclusively on adjacent nodes, learns attention weights adaptively and allows agents to better process information in dynamic environments. Reward functions are specifically designed to tackle exploration challenges in environments with sparse rewards. By introducing a framework that integrates centralized training and distributed execution, the advancement of models is facilitated. Simulation results show that the proposed method outperforms the existing MARL method in search rate and tracking performance with less collisions. The experiments show that the proposed method can be extended to applications with a larger number of agents, which provides a potential solution to the challenging problem of multi-UAV autonomous tracking in dynamic unknown environments.
文摘The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics.
基金upported by the National Key Research and Development Program of China(Grant No.:2023YFF1204904)the National Natural Science Foundation of China(Grant Nos.:U23A20530 and 82173746)Shanghai Frontiers Science Center of Optogenetic Techniques for Cell Metabolism(Shanghai Municipal Education Commission,China).
文摘Negative logarithm of the acid dissociation constant(pK_(a))significantly influences the absorption,dis-tribution,metabolism,excretion,and toxicity(ADMET)properties of molecules and is a crucial indicator in drug research.Given the rapid and accurate characteristics of computational methods,their role in predicting drug properties is increasingly important.Although many pK_(a) prediction models currently exist,they often focus on enhancing model precision while neglecting interpretability.In this study,we present GraFpKa,a pK_(a) prediction model using graph neural networks(GNNs)and molecular finger-prints.The results show that our acidic and basic models achieved mean absolute errors(MAEs)of 0.621 and 0.402,respectively,on the test set,demonstrating good predictive performance.Notably,to improve interpretability,GraFpKa also incorporates Integrated Gradients(IGs),providing a clearer visual description of the atoms significantly affecting the pK_(a) values.The high reliability and interpretability of GraFpKa ensure accurate pKa predictions while also facilitating a deeper understanding of the relation-ship between molecular structure and pK_(a) values,making it a valuable tool in the field of pK_(a) prediction.
基金Project partially supported by the National Natural Science Foundation of China (Grant Nos. 61672298 and 62373197)the Major Project of Philosophy and Social Science Research in Colleges and Universities in Jiangsu Province,China (Grant No. 2018SJZDI142)the Postgraduate Research & Practice Innovation Program of Jiangsu Province,China (Grant No. KYCX23 1045)。
文摘Identifying key nodes in complex networks is crucial for understanding and controlling their dynamics. Traditional centrality measures often fall short in capturing the multifaceted roles of nodes within these networks. The Page Rank algorithm, widely recognized for ranking web pages, offers a more nuanced approach by considering the importance of connected nodes. However, existing methods generally overlook the geometric properties of networks, which can provide additional insights into their structure and functionality. In this paper, we propose a novel method named Curv-Page Rank(C-PR), which integrates network curvature and Page Rank to identify influential nodes in complex networks. By leveraging the geometric insights provided by curvature alongside structural properties, C-PR offers a more comprehensive measure of a node's influence. Our approach is particularly effective in networks with community structures, where it excels at pinpointing bridge nodes critical for maintaining connectivity and facilitating information flow. We validate the effectiveness of C-PR through extensive experiments. The results demonstrate that C-PR outperforms traditional centrality-based and Page Rank methods in identifying critical nodes. Our findings offer fresh insights into the structural importance of nodes across diverse network configurations, highlighting the potential of incorporating geometric properties into network analysis.
基金funded by the Youth Fund of the National Natural Science Foundation of China(Grant No.42261070).
文摘Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments.
基金supported by Natural Science Foundation of Sichuan,China(Grant No.:2024ZDZX0019).
文摘Traditional Chinese medicine(TCM)serves as a treasure trove of ancient knowledge,holding a crucial position in the medical field.However,the exploration of TCM's extensive information has been hindered by challenges related to data standardization,completeness,and accuracy,primarily due to the decen-tralized distribution of TCM resources.To address these issues,we developed a platform for TCM knowledge discovery(TCMKD,https://cbcb.cdutcm.edu.cn/TCMKD/).Seven types of data,including syndromes,formulas,Chinese patent drugs(CPDs),Chinese medicinal materials(CMMs),ingredients,targets,and diseases,were manually proofread and consolidated within TCMKD.To strengthen the integration of TCM with modern medicine,TCMKD employs analytical methods such as TCM data mining,enrichment analysis,and network localization and separation.These tools help elucidate the molecular-level commonalities between TCM and contemporary scientific insights.In addition to its analytical capabilities,a quick question and answer(Q&A)system is also embedded within TCMKD to query the database efficiently,thereby improving the interactivity of the platform.The platform also provides a TCM text annotation tool,offering a simple and efficient method for TCM text mining.Overall,TCMKD not only has the potential to become a pivotal repository for TCM,delving into the pharmaco-logical foundations of TCM treatments,but its flexible embedded tools and algorithms can also be applied to the study of other traditional medical systems,extending beyond just TCM.
基金supported by the National Natural Science Foundation of China(Grant No.42177164)the Distinguished Youth Science Foundation of Hunan Province of China(Grant No.2022JJ10073)the Outstanding Youth Project of Hunan Provincial Department of Education,China(Grant No.23B0008).
文摘In underground mining,especially in entry-type excavations,the instability of surrounding rock structures can lead to incalculable losses.As a crucial tool for stability analysis in entry-type excavations,the critical span graph must be updated to meet more stringent engineering requirements.Given this,this study introduces the support vector machine(SVM),along with multiple ensemble(bagging,adaptive boosting,and stacking)and optimization(Harris hawks optimization(HHO),cuckoo search(CS))techniques,to overcome the limitations of the traditional methods.The analysis indicates that the hybrid model combining SVM,bagging,and CS strategies has a good prediction performance,and its test accuracy reaches 0.86.Furthermore,the partition scheme of the critical span graph is adjusted based on the CS-BSVM model and 399 cases.Compared with previous empirical or semi-empirical methods,the new model overcomes the interference of subjective factors and possesses higher interpretability.Since relying solely on one technology cannot ensure prediction credibility,this study further introduces genetic programming(GP)and kriging interpolation techniques.The explicit expressions derived through GP can offer the stability probability value,and the kriging technique can provide interpolated definitions for two new subclasses.Finally,a prediction platform is developed based on the above three approaches,which can rapidly provide engineering feedback.
基金supported by the National Key R&D Program of China(No.2022YFC3502005)the three-year Action Plan for Shanghai TCM Development and Inheritance Program[No.ZY(2021-2023)-0401]the National Natural Science Foundation of China(No.82104521)。
文摘Traditional Chinese medicine formula(TCMF)represents a fundamental component of Chinese medical practice,incorporating medical knowledge and practices from both Han Chinese and various ethnic minorities,while providing comprehensive insights into health and disease.The foundation of TCMF lies in its holistic approach,manifested through herbal compatibility theory,which has emerged from extensive clinical experience and evolved into a highly refined knowledge system.Within this framework,Chinese herbal medicines exhibit intricated characteristics,including multi-component interactions,diverse target sites,and varied biological pathways.These complexities pose significant challenges for understanding their molecular mechanisms.Contemporary advances in artificial intelligence(AI)are reshaping research in traditional Chinese medicine(TCM),offering immense potential to transform our understanding of the molecular mechanisms underlying TCMFs.This review explores the application of AI in uncovering these mechanisms,highlighting its role in compound absorption,distribution,metabolism,and excretion(ADME)prediction,molecular target identification,compound and target synergy recognition,pharmacological mechanisms exploration,and herbal formula optimization.Furthermore,the review discusses the challenges and opportunities in AI-assisted research on TCMF molecular mechanisms,promoting the modernization and globalization of TCM.
文摘In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shipping is characterized by a vast array of document types, filled with complex, large-scale, and often chaotic knowledge and relationships. Effectively managing these documents is crucial for developing a Large Language Model (LLM) in the maritime domain, enabling practitioners to access and leverage valuable information. A Knowledge Graph (KG) offers a state-of-the-art solution for enhancing knowledge retrieval, providing more accurate responses and enabling context-aware reasoning. This paper presents a framework for utilizing maritime and shipping documents to construct a knowledge graph using GraphRAG, a hybrid tool combining graph-based retrieval and generation capabilities. The extraction of entities and relationships from these documents and the KG construction process are detailed. Furthermore, the KG is integrated with an LLM to develop a Q&A system, demonstrating that the system significantly improves answer accuracy compared to traditional LLMs. Additionally, the KG construction process is up to 50% faster than conventional LLM-based approaches, underscoring the efficiency of our method. This study provides a promising approach to digital intelligence in shipping, advancing knowledge accessibility and decision-making.
文摘Modern aircraft tend to use fuel thermal management systems to cool onboard heat sources.However,the design of heat transfer architectures for fuel thermal management systems relies on the experience of the engineers and lacks theoretical guidance.This paper proposes a concise graph representation method based on graph theory for fuel thermal management systems,which can represent all possible connections between subsystems.A generalized optimization algorithm is proposed for fuel thermal management system architecture to minimize the heat sink.This algorithm can autonomously arrange subsystems with heat production differences and efficiently utilize the architecture of the fuel heat sink.At the same time,two evaluation indices are proposed from the perspective of subsystems.These indices intuitively and clearly show that the reason for the high efficiency of heat sink utilization is the balanced and moderate cooling of each subsystem and verify the rationality of the architecture optimization method.A set of simulations are also conducted,which demonstrate that the fuel tank temperature has no effect on the performance of the architecture.This paper provides a reference for the architectural design of aircraft fuel thermal management systems.The metrics used in this paper can also be utilized to evaluate the existing architecture.