期刊文献+
共找到14,690篇文章
< 1 2 250 >
每页显示 20 50 100
Wellbore breakouts in heavily fractured rocks:A coupled discrete fracture network-distinct element method analysis 被引量:1
1
作者 Yongcun Feng Yaoran Wei +4 位作者 Zhenlai Tan Tianyu Yang Xiaorong Li Jincai Zhang Jingen Deng 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第3期1685-1699,共15页
Wellbore breakout is one of the critical issues in drilling due to the fact that the related problems result in additional costs and impact the drilling scheme severely.However,the majority of such wellbore breakout a... Wellbore breakout is one of the critical issues in drilling due to the fact that the related problems result in additional costs and impact the drilling scheme severely.However,the majority of such wellbore breakout analyses were based on continuum mechanics.In addition to failure in intact rocks,wellbore breakouts can also be initiated along natural discontinuities,e.g.weak planes and fractures.Furthermore,the conventional models in wellbore breakouts with uniform distribution fractures could not reflect the real drilling situation.This paper presents a fully coupled hydro-mechanical model of the SB-X well in the Tarim Basin,China for evaluating wellbore breakouts in heavily fractured rocks under anisotropic stress states using the distinct element method(DEM)and the discrete fracture network(DFN).The developed model was validated against caliper log measurement,and its stability study was carried out by stress and displacement analyses.A parametric study was performed to investigate the effects of the characteristics of fracture distribution(orientation and length)on borehole stability by sensitivity studies.Simulation results demonstrate that the increase of the standard deviation of orientation when the fracture direction aligns parallel or perpendicular to the principal stress direction aggravates borehole instability.Moreover,an elevation in the average fracture length causes the borehole failure to change from the direction of the minimum in-situ horizontal principal stress(i.e.the direction of wellbore breakouts)towards alternative directions,ultimately leading to the whole wellbore failure.These findings provide theoretical insights for predicting wellbore breakouts in heavily fractured rocks. 展开更多
关键词 Wellbore breakout Discrete fracture network(DFN) Distinct element method(DEM) Heavily fractured rocks
在线阅读 下载PDF
An efficient and accurate numerical method for simulating close-range blast loads of cylindrical charges based on neural network
2
作者 Ting Liu Changhai Chen +2 位作者 Han Li Yaowen Yu Yuansheng Cheng 《Defence Technology(防务技术)》 2025年第2期257-271,共15页
To address the problems of low accuracy by the CONWEP model and poor efficiency by the Coupled Eulerian-Lagrangian(CEL)method in predicting close-range air blast loads of cylindrical charges,a neural network-based sim... To address the problems of low accuracy by the CONWEP model and poor efficiency by the Coupled Eulerian-Lagrangian(CEL)method in predicting close-range air blast loads of cylindrical charges,a neural network-based simulation(NNS)method with higher accuracy and better efficiency was proposed.The NNS method consisted of three main steps.First,the parameters of blast loads,including the peak pressures and impulses of cylindrical charges with different aspect ratios(L/D)at different stand-off distances and incident angles were obtained by two-dimensional numerical simulations.Subsequently,incident shape factors of cylindrical charges with arbitrary aspect ratios were predicted by a neural network.Finally,reflected shape factors were derived and implemented into the subroutine of the ABAQUS code to modify the CONWEP model,including modifications of impulse and overpressure.The reliability of the proposed NNS method was verified by related experimental results.Remarkable accuracy improvement was acquired by the proposed NNS method compared with the unmodified CONWEP model.Moreover,huge efficiency superiority was obtained by the proposed NNS method compared with the CEL method.The proposed NNS method showed good accuracy when the scaled distance was greater than 0.2 m/kg^(1/3).It should be noted that there is no need to generate a new dataset again since the blast loads satisfy the similarity law,and the proposed NNS method can be directly used to simulate the blast loads generated by different cylindrical charges.The proposed NNS method with high efficiency and accuracy can be used as an effective method to analyze the dynamic response of structures under blast loads,and it has significant application prospects in designing protective structures. 展开更多
关键词 Close-range air blast load Cylindrical charge Numerical method Neural network CEL method CONWEP model
在线阅读 下载PDF
An Intelligent Control Method Based on the Artificial Neural Network Model
3
作者 Liangkai Zhou Dan Han +1 位作者 Qinzhe Wang Nv Yang 《Journal of Electronic Research and Application》 2025年第5期299-303,共5页
The topology structure of the artificial neural network is an intelligent control model,which is used for the intelligent vehicle control system and household sweeping robot.When setting the intelligent control system... The topology structure of the artificial neural network is an intelligent control model,which is used for the intelligent vehicle control system and household sweeping robot.When setting the intelligent control system,the connection point of each network is regarded as a neuron in the nervous system,and each connection point has input and output functions.Only when the input of nodes reaches a certain threshold can the output function of nodes be stimulated.Using the networking mode of the artificial neural network model,the mobile node can output in multiple directions.If the input direction of a certain path is the same as that of other nodes,it can choose to avoid and choose another path.The weighted value of each path between nodes is different,which means that the influence of the front node on the current node varies.The control method based on the artificial neural network model can be applied to vehicle control,household sweeping robots,and other fields,and a relatively optimized scheme can be obtained from the aspect of time and energy consumption. 展开更多
关键词 Artificial neural network MODEL Control method Optimization scheme
在线阅读 下载PDF
A study of mechanism-data hybrid-driven method for multibody system via physics-informed neural network
4
作者 Ningning Song Chuanda Wang +1 位作者 Haijun Peng Jian Zhao 《Acta Mechanica Sinica》 2025年第3期129-153,共25页
Numerical simulation plays an important role in the dynamic analysis of multibody system.With the rapid development of computer science,the numerical solution technology has been further developed.Recently,data-driven... Numerical simulation plays an important role in the dynamic analysis of multibody system.With the rapid development of computer science,the numerical solution technology has been further developed.Recently,data-driven method has become a very popular computing method.However,due to lack of necessary mechanism information of the traditional pure data-driven methods based on neural network,its numerical accuracy cannot be guaranteed for strong nonlinear system.Therefore,this work proposes a mechanism-data hybrid-driven strategy for solving nonlinear multibody system based on physics-informed neural network to overcome the limitation of traditional data-driven methods.The strategy proposed in this paper introduces scaling coefficients to introduce the dynamic model of multibody system into neural network,ensuring that the training results of neural network conform to the mechanics principle of the system,thereby ensuring the good reliability of the data-driven method.Finally,the stability,generalization ability and numerical accuracy of the proposed method are discussed and analyzed using three typical multibody systems,and the constrained default situations can be controlled within the range of 10^(-2)-10^(-4). 展开更多
关键词 Mechanism-data hybrid-driven method Differential-algebra equation Multibody system Physics-informed neural network
原文传递
MODIFIED INERTIAL SUBGRADIENT EXTRAGRADIENT METHODS FOR SOLVING A SUPPLY CHAIN NETWORK EQUILIBRIUM MODEL
5
作者 Zhuang SHAN 《Acta Mathematica Scientia》 2025年第3期1223-1234,共12页
Using a modified subgradient extragradient algorithm, this paper proposed a novel approach to solving a supply chain network equilibrium model. The method extends the scope of optimisation and improves the accuracy at... Using a modified subgradient extragradient algorithm, this paper proposed a novel approach to solving a supply chain network equilibrium model. The method extends the scope of optimisation and improves the accuracy at each iteration by incorporating adaptive parameter selection and a more general subgradient projection operator. The advantages of the proposed method are highlighted by the proof of strong convergence presented in the paper. Several concrete examples are given to demonstrate the effectiveness of the algorithm, with comparisons illustrating its superior CPU running time compared to alternative techniques. The practical applicability of the algorithm is also demonstrated by applying it to a realistic supply chain network model. 展开更多
关键词 supply chain network equilibrium model subgradient extragradient algorithm Tseng method variational inequalities strong convergence
在线阅读 下载PDF
Discovery of active compounds and key targets of Thymus quinquecostatus Celak.based on gastrointestinal metabolism and Gut flora-Compound-Target Pathway network with TOPSIS method
6
作者 Xueyang Ren Jiamu Ma +11 位作者 Ying Dong Yuan Zheng Rufeng Wang Chongjun Zhao Wei Liu Mingxia Li Mengyu Sun Feng Zhang Yingyu He Xianxian Li Qingyue Deng Gaimei She 《Food Science and Human Wellness》 2025年第11期4629-4643,共15页
Thymus quinquecostatus Celak.,a traditional aromatic edible plant from Lamiaceae,is widely used as food additive,food condiment,spice,and herbal teas.Polyphenol-rich fraction of T.quinquecostatus(PRF)has been proven t... Thymus quinquecostatus Celak.,a traditional aromatic edible plant from Lamiaceae,is widely used as food additive,food condiment,spice,and herbal teas.Polyphenol-rich fraction of T.quinquecostatus(PRF)has been proven to be effective protective effect for cerebral ischemia reperfusion injury(CIRI)in our previous study.In this study,we developed a novel“Gut flora-Compound-Target-Pathway”(GCTP)network based on network pharmacology coupled with gastrointestinal metabolism for screening bio-active components,key targets and gut floras through the classical technique for order preference by similarity to ideal solution(TOPSIS).This compensates for the lack of gut floras and gastrointestinal metabolism in network pharmacology.Firstly,four incubation models covering simulated gastric juice,simulated intestinal juice,gut floras of normal and transient middle cerebral artery occlusion(tMCAO)rat in vitro were applied to PRF.The 109 proto-components and 64 metabolites were elucidated by ultra-high performance liquid chromatography Q exactive orbitrap-mass spectrometry(UPLC-QE-Orbitrap-MS).Then,the key targets of matrix metalloproteinase 9(MMP9),prostaglandin-endoperoxide synthase 2(PTGS2),tyrosine-protein kinase fyn(FYN),estrogen receptor 1(ESR1),amyloid precursor protein(APP),and epidermal growth factor receptor(EGFR),and gut floras of Enterococcus avium LY1 were selected.Moreover,the selected key proto components were rosmarinic acid,daidzein,quercetin,luteolin,apigenin,methyl rosmarinate,kaempferol,luteoloside,and caffeic acid,and the key metabolites were isokaempferide,isorhamnetin,isoquercetin,and mangiferin.Binding of compounds to the key proteins was analyzed by molecular docking,and also verified though an 2,2'-azobis(2-amidinopropane)dihydrochloride(AAPH)induced oxidative stress zebrafish model and real-time quantitative polymerase chain reaction(RT-qPCR)assays.This study provides a new idea and a better understanding of PRF for its protective effects on CIRI and its underlying mechanisms. 展开更多
关键词 Thymus quinquecostatus Celak. Gastrointestinal metabolism Gut flora Technique for order preference by similarity to ideal solution method Cerebral ischemia reperfusion injury network pharmacology
暂未订购
Analysis of identification methods of key nodes in transportation network 被引量:12
7
作者 Qiang Lai Hong-Hao Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期782-789,共8页
The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be diff... The identification of key nodes plays an important role in improving the robustness of the transportation network.For different types of transportation networks,the effect of the same identification method may be different.It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks.Based on the knowledge of complex networks,the metro networks and the bus networks are selected as the objects,and the key nodes are identified by the node degree identification method,the neighbor node degree identification method,the weighted k-shell degree neighborhood identification method(KSD),the degree k-shell identification method(DKS),and the degree k-shell neighborhood identification method(DKSN).Take the network efficiency and the largest connected subgraph as the effective indicators.The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance. 展开更多
关键词 transportation network key node identification KSD identification method network efficiency
原文传递
Identifying influential spreaders in complex networks based on entropy weight method and gravity law 被引量:11
8
作者 Xiao-Li Yan Ya-Peng Cui Shun-Jiang Ni 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第4期582-590,共9页
In complex networks,identifying influential spreader is of great significance for improving the reliability of networks and ensuring the safe and effective operation of networks.Nowadays,it is widely used in power net... In complex networks,identifying influential spreader is of great significance for improving the reliability of networks and ensuring the safe and effective operation of networks.Nowadays,it is widely used in power networks,aviation networks,computer networks,and social networks,and so on.Traditional centrality methods mainly include degree centrality,closeness centrality,betweenness centrality,eigenvector centrality,k-shell,etc.However,single centrality method is onesided and inaccurate,and sometimes many nodes have the same centrality value,namely the same ranking result,which makes it difficult to distinguish between nodes.According to several classical methods of identifying influential nodes,in this paper we propose a novel method that is more full-scaled and universally applicable.Taken into account in this method are several aspects of node’s properties,including local topological characteristics,central location of nodes,propagation characteristics,and properties of neighbor nodes.In view of the idea of the multi-attribute decision-making,we regard the basic centrality method as node’s attribute and use the entropy weight method to weigh different attributes,and obtain node’s combined centrality.Then,the combined centrality is applied to the gravity law to comprehensively identify influential nodes in networks.Finally,the classical susceptible-infected-recovered(SIR)model is used to simulate the epidemic spreading in six real-society networks.Our proposed method not only considers the four topological properties of nodes,but also emphasizes the influence of neighbor nodes from the aspect of gravity.It is proved that the new method can effectively overcome the disadvantages of single centrality method and increase the accuracy of identifying influential nodes,which is of great significance for monitoring and controlling the complex networks. 展开更多
关键词 complex networks influential NODES ENTROPY WEIGHT method GRAVITY LAW
原文传递
Virtual sensing method for monitoring vibration of continuously variable configuration structures using long short-term memory networks 被引量:4
9
作者 Zhenjiang YUE Li LIU +1 位作者 Teng LONG Yuanchen MA 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2020年第1期244-254,共11页
Vibration monitoring by virtual sensing methods has been well developed for linear timeinvariant structures with limited sensors.However,few methods are proposed for Time-Varying(TV)structures which are inevitable in ... Vibration monitoring by virtual sensing methods has been well developed for linear timeinvariant structures with limited sensors.However,few methods are proposed for Time-Varying(TV)structures which are inevitable in aerospace engineering.The core of vibration monitoring for TV structures is to describe the TV structural dynamic characteristics with accuracy and efficiency.This paper propose a new method using the Long Short-Term Memory(LSTM)networks for Continuously Variable Configuration Structures(CVCSs),which is an important subclass of TV structures.The configuration parameters are used to represent the time-varying dynamic characteristics by the‘‘freezing"method.The relationship between TV dynamic characteristics and vibration responses is established by LSTM,and can be generalized to estimate the responses with unknown TV processes benefiting from the time translation invariance of LSTM.A numerical example and a liquid-filled pipe experiment are used to test the performance of the proposed method.The results demonstrate that the proposed method can accurately estimate the unmeasured responses for CVCSs to reveal the actual characteristics in time-domain and modal-domain.Besides,the average one-step estimation time of responses is less than the sampling interval.Thus,the proposed method is promising to on-line estimate the important responses of TV structures. 展开更多
关键词 Data-based method RECURRENT neural networkS Time-varying structure VIBRATION MONITORING Virtual sensing
原文传递
Linearization Learning Method of BP Neural Networks 被引量:4
10
作者 Zhou Shaoqian Ding Lixin +1 位作者 Zhang Jian Tang Xinhua 《Wuhan University Journal of Natural Sciences》 CAS 1997年第1期37-41,共5页
Feedforward multi layer neural networks have very strong mapping capability that is based on the non linearity of the activation function, however, the non linearity of the activation function can cause the multiple ... Feedforward multi layer neural networks have very strong mapping capability that is based on the non linearity of the activation function, however, the non linearity of the activation function can cause the multiple local minima on the learning error surfaces, which affect the learning rate and solving optimal weights. This paper proposes a learning method linearizing non linearity of the activation function and discusses its merits and demerits theoretically. 展开更多
关键词 BP neural networks activation function linearization method
在线阅读 下载PDF
Load Reduction Test Method of Similarity Theory and BP Neural Networks of Large Cranes 被引量:4
11
作者 YANG Ruigang DUAN Zhibin +2 位作者 LU Yi WANG Lei XU Gening 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第1期145-151,共7页
Static load tests are an important means of supervising and detecting a crane's lift capacity. Due to space restrictions, however, there are difficulties and potential danger when testing large bridge cranes. To solv... Static load tests are an important means of supervising and detecting a crane's lift capacity. Due to space restrictions, however, there are difficulties and potential danger when testing large bridge cranes. To solve the loading problems of large-tonnage cranes during testing, an equivalency test is proposed based on the similarity theory and BP neural networks. The maximum stress and displacement of a large bridge crane is tested in small loads, combined with the training neural network of a similar structure crane through stress and displacement data which is collected by a physics simulation progressively loaded to a static load test load within the material scope of work. The maximum stress and displacement of a crane under a static load test load can be predicted through the relationship of stress, displacement, and load. By measuring the stress and displacement of small tonnage weights, the stress and displacement of large loads can be predicted, such as the maximum load capacity, which is 1.25 times the rated capacity. Experimental study shows that the load reduction test method can reflect the lift capacity of large bridge cranes. The load shedding predictive analysis for Sanxia 1200 t bridge crane test data indicates that when the load is 1.25 times the rated lifting capacity, the predicted displacement and actual displacement error is zero. The method solves the problem that lifting capacities are difficult to obtain and testing accidents are easily possible when 1.25 times related weight loads are tested for large tonnage cranes. 展开更多
关键词 similarity theory BP neural network large bridge crane load reduction equivalent test method
在线阅读 下载PDF
Characterizing the influence of stress-induced microcracks on the laboratory strength and fracture development in brittle rocks using a finite-discrete element method-micro discrete fracture network FDEM-μDFN approach 被引量:6
12
作者 Pooya Hamdi Doug Stead Davide Elmo 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2015年第6期609-625,共17页
Heterogeneity is an inherent component of rock and may be present in different forms including mineralheterogeneity, geometrical heterogeneity, weak grain boundaries and micro-defects. Microcracks areusually observed ... Heterogeneity is an inherent component of rock and may be present in different forms including mineralheterogeneity, geometrical heterogeneity, weak grain boundaries and micro-defects. Microcracks areusually observed in crystalline rocks in two forms: natural and stress-induced; the amount of stressinducedmicrocracking increases with depth and in-situ stress. Laboratory results indicate that thephysical properties of rocks such as strength, deformability, P-wave velocity and permeability areinfluenced by increase in microcrack intensity. In this study, the finite-discrete element method (FDEM)is used to model microcrack heterogeneity by introducing into a model sample sets of microcracks usingthe proposed micro discrete fracture network (mDFN) approach. The characteristics of the microcracksrequired to create mDFN models are obtained through image analyses of thin sections of Lac du Bonnetgranite adopted from published literature. A suite of two-dimensional laboratory tests including uniaxial,triaxial compression and Brazilian tests is simulated and the results are compared with laboratory data.The FDEM-mDFN models indicate that micro-heterogeneity has a profound influence on both the mechanicalbehavior and resultant fracture pattern. An increase in the microcrack intensity leads to areduction in the strength of the sample and changes the character of the rock strength envelope. Spallingand axial splitting dominate the failure mode at low confinement while shear failure is the dominantfailure mode at high confinement. Numerical results from simulated compression tests show thatmicrocracking reduces the cohesive component of strength alone, and the frictional strength componentremains unaffected. Results from simulated Brazilian tests show that the tensile strength is influenced bythe presence of microcracks, with a reduction in tensile strength as microcrack intensity increases. Theimportance of microcrack heterogeneity in reproducing a bi-linear or S-shape failure envelope and itseffects on the mechanisms leading to spalling damage near an underground opening are also discussed. 展开更多
关键词 Finite-discrete element method(FDEM) Micro discrete fracture network(μDFN) Brittle fracture
在线阅读 下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
13
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
在线阅读 下载PDF
Adaptive Backstepping Terminal Sliding Mode Control Method Based on Recurrent Neural Networks for Autonomous Underwater Vehicle 被引量:15
14
作者 Chao Yang Feng Yao Ming-Jun Zhang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2018年第6期228-243,共16页
The trajectory tracking control problem is addressed for autonomous underwater vehicle(AUV) in marine environ?ment, with presence of the influence of the uncertain factors including ocean current disturbance, dynamic ... The trajectory tracking control problem is addressed for autonomous underwater vehicle(AUV) in marine environ?ment, with presence of the influence of the uncertain factors including ocean current disturbance, dynamic modeling uncertainty, and thrust model errors. To improve the trajectory tracking accuracy of AUV, an adaptive backstepping terminal sliding mode control based on recurrent neural networks(RNN) is proposed. Firstly, considering the inaccu?rate of thrust model of thruster, a Taylor’s polynomial is used to obtain the thrust model errors. And then, the dynamic modeling uncertainty and thrust model errors are combined into the system model uncertainty(SMU) of AUV; through the RNN, the SMU and ocean current disturbance are classified, approximated online. Finally, the weights of RNN and other control parameters are adjusted online based on the backstepping terminal sliding mode controller. In addition, a chattering?reduction method is proposed based on sigmoid function. In chattering?reduction method, the sigmoid function is used to realize the continuity of the sliding mode switching function, and the sliding mode switching gain is adjusted online based on the exponential form of the sliding mode function. Based on the Lyapu?nov theory and Barbalat’s lemma, it is theoretically proved that the AUV trajectory tracking error can quickly converge to zero in the finite time. This research proposes a trajectory tracking control method of AUV, which can e ectively achieve high?precision trajectory tracking control of AUV under the influence of the uncertain factors. The feasibility and e ectiveness of the proposed method is demonstrated with trajectory tracking simulations and pool?experi?ments of AUV. 展开更多
关键词 Autonomous underwater vehicle(AUV) Trajectory tracking Neural networks Backstepping method Terminal sliding mode Adaptive control
在线阅读 下载PDF
Prediction of Flash Point Temperature of Organic Compounds Using a Hybrid Method of Group Contribution + Neural Network + Particle Swarm Optimization 被引量:8
15
作者 Juan A. Lazzus 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2010年第5期817-823,共7页
The flash points of organic compounds were estimated using a hybrid method that includes a simple group contribution method (GCM) implemented in an artificial neural network (ANN) with particle swarm optimization (PSO... The flash points of organic compounds were estimated using a hybrid method that includes a simple group contribution method (GCM) implemented in an artificial neural network (ANN) with particle swarm optimization (PSO). Different topologies of a multilayer neural network were studied and the optimum architecture was determined. Property data of 350 compounds were used for training the network. To discriminate different substances the molecular structures defined by the concept of the classical group contribution method were given as input variables. The capabilities of the network were tested with 155 substances not considered in the training step. The study shows that the proposed GCM+ANN+PSO method represent an excellent alternative for the estimation of flash points of organic compounds with acceptable accuracy (AARD = 1.8%; AAE = 6.2 K). 展开更多
关键词 flash point group contribution method artificial neural networks particle swarm optimization property estimation
在线阅读 下载PDF
Recursion-transform method and potential formulae of the m×n cobweb and fan networks 被引量:12
16
作者 谭志中 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第9期82-90,共9页
In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found ... In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found the exact potential formulae of arbitrary m × n cobweb and fan networks by the RT method, and the potential formulae of infinite and semi-infinite networks are derived. As applications, a series of interesting corollaries of potential formulae are given by using the general formula, the equivalent resistance formula is deduced by using the potential formula, and we find a new trigonometric identity by comparing two equivalence results with different forms. 展开更多
关键词 recursion-transform method network model potential formula exact solution
原文传递
Sampling Methods for Efficient Training of Graph Convolutional Networks:A Survey 被引量:5
17
作者 Xin Liu Mingyu Yan +3 位作者 Lei Deng Guoqi Li Xiaochun Ye Dongrui Fan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第2期205-234,共30页
Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other meth... Graph convolutional networks(GCNs)have received significant attention from various research fields due to the excellent performance in learning graph representations.Although GCN performs well compared with other methods,it still faces challenges.Training a GCN model for large-scale graphs in a conventional way requires high computation and storage costs.Therefore,motivated by an urgent need in terms of efficiency and scalability in training GCN,sampling methods have been proposed and achieved a significant effect.In this paper,we categorize sampling methods based on the sampling mechanisms and provide a comprehensive survey of sampling methods for efficient training of GCN.To highlight the characteristics and differences of sampling methods,we present a detailed comparison within each category and further give an overall comparative analysis for the sampling methods in all categories.Finally,we discuss some challenges and future research directions of the sampling methods. 展开更多
关键词 Efficient training graph convolutional networks(GCNs) graph neural networks(GNNs) sampling method
在线阅读 下载PDF
An Isolation Principle Based Distributed Anomaly Detection Method in Wireless Sensor Networks 被引量:3
18
作者 Zhi-Guo Ding Da-Jun Du Min-Rui Fei 《International Journal of Automation and computing》 EI CSCD 2015年第4期402-412,共11页
Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collect... Anomaly detection plays an important role in ensuring the data quality in wireless sensor networks(WSNs).The main objective of the paper is to design a light-weight and distributed algorithm to detect the data collected from WSNs effectively.This is achieved by proposing a distributed anomaly detection algorithm based on ensemble isolation principle.The new method offers distinctive advantages over the existing methods.Firstly,it does not require any distance or density measurement,which reduces computational burdens significantly.Secondly,considering the spatial correlation characteristic of node deployment in WSNs,local sub-detector is built in each sensor node,which is broadcasted simultaneously to neighbor sensor nodes.A global detector model is then constructed by using the local detector model and the neighbor detector model,which possesses a distributed nature and decreases communication burden.The experiment results on the labeled dataset confirm the effectiveness of the proposed method. 展开更多
关键词 Distributed anomaly detection isolation principle light-weight method ensemble learning wireless sensor networks(WSNs)
原文传递
Packet Cache-Forward Method Based on Improved Bayesian Outlier Detection for Mobile Handover in Satellite Networks 被引量:4
19
作者 Hefei Hu Dongming Yuan +1 位作者 Mingxia Liao Yuan'an Liu 《China Communications》 SCIE CSCD 2016年第6期167-177,共11页
In this paper, we propose a Packet Cache-Forward(PCF) method based on improved Bayesian outlier detection to eliminate out-of-order packets caused by transmission path drastically degradation during handover events in... In this paper, we propose a Packet Cache-Forward(PCF) method based on improved Bayesian outlier detection to eliminate out-of-order packets caused by transmission path drastically degradation during handover events in the moving satellite networks, for improving the performance of TCP. The proposed method uses an access node satellite to cache all received packets in a short time when handover occurs and forward them out in order. To calculate the cache time accurately, this paper establishes the Bayesian based mixture model for detecting delay outliers of the entire handover scheme. In view of the outliers' misjudgment, an updated classification threshold and the sliding window has been suggested to correct category collections and model parameters for the purpose of quickly identifying exact compensation delay in the varied network load statuses. Simulation shows that, comparing to average processing delay detection method, the average accuracy rate was scaled up by about 4.0%, and there is about 5.5% cut in error rate in the meantime. It also behaves well even though testing with big dataset. Benefiting from the advantage of the proposed scheme in terms of performance, comparing to conventional independent handover and network controlled synchronizedhandover in simulated LEO satellite networks, the proposed independent handover with PCF eliminates packet out-of-order issue to get better improvement on congestion window. Eventually the average delay decreases more than 70% and TCP performance has improved more than 300%. 展开更多
关键词 satellite networks HANDOVER bayesian method outlier detection
在线阅读 下载PDF
A New Method for Identifying Influential Nodes and Important Edges in Complex Networks 被引量:2
20
作者 ZHANG Wei XU Jia LI Yuanyuan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第3期267-276,共10页
The identification of the influential nodes in a network is of great significance for understanding the features of the network and controlling the complexity of networks in society and in biology. In this paper, we ... The identification of the influential nodes in a network is of great significance for understanding the features of the network and controlling the complexity of networks in society and in biology. In this paper, we propose a novel centrality measure for a node by considering the importance of edges and compare the performance of this method with existing seven topological-based ranking methods on the Susceptible-Infected-Recovered (SIR) model. The simulation results for four different types of real networks show that the proposed method is robust and exhibits excellent performance in identifying the most influential nodes when spreading starting from both single origin and multipleorigins simultaneously. 展开更多
关键词 complex networks influential nodes centrality methods
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部