期刊文献+
共找到1,051,210篇文章
< 1 2 250 >
每页显示 20 50 100
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
1
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Multi-Phase Modeling for Vulnerability Detection & Patch Management: An Analysis Using Numerical Methods
2
作者 Adarsh Anand Div ya +1 位作者 Deepti Aggrawal Omar H.Alhazmi 《Computers, Materials & Continua》 2025年第7期1529-1544,共16页
Software systems are vulnerable to security breaches as they expand in complexity and functionality.The confidentiality,integrity,and availability of data are gravely threatened by flaws in a system’s design,implemen... Software systems are vulnerable to security breaches as they expand in complexity and functionality.The confidentiality,integrity,and availability of data are gravely threatened by flaws in a system’s design,implementation,or configuration.To guarantee the durability&robustness of the software,vulnerability identification and fixation have become crucial areas of focus for developers,cybersecurity experts and industries.This paper presents a thorough multi-phase mathematical model for efficient patch management and vulnerability detection.To uniquely model these processes,the model incorporated the notion of the learning phenomenon in describing vulnerability fixation using a logistic learning function.Furthermore,the authors have used numerical methods to approximate the solution of the proposed framework where an analytical solution is difficult to attain.The suggested systematic architecture has been demonstrated through statistical analysis using patch datasets,which offers a solid basis for the research conclusions.According to computational research,learning dynamics improves security response and results in more effective vulnerability management.The suggested model offers a systematic approach to proactive vulnerability mitigation and has important uses in risk assessment,software maintenance,and cybersecurity.This study helps create more robust software systems by increasing patch management effectiveness,which benefits developers,cybersecurity experts,and sectors looking to reduce security threats in a growing digital world. 展开更多
关键词 Learning phenomenon numerical method PATCHING two-phase modelling vulnerability
在线阅读 下载PDF
A spatial building damage inventory of the 2022 Luding Earthquake and its preliminary vulnerability analysis
3
作者 TANG Chenxiao FENG Xuan 《Journal of Mountain Science》 2025年第5期1691-1706,共16页
Spatial seismic vulnerability assessments are primally conducted at the community and grid level,using heuristic and empirical approaches.Building-based spatial statistical vulnerability models are rare because of dat... Spatial seismic vulnerability assessments are primally conducted at the community and grid level,using heuristic and empirical approaches.Building-based spatial statistical vulnerability models are rare because of data limitations.Generating open-access spatial inventories that document seismic damage and building attributes and test their effectiveness in assessing damage would promote the advancement of spatial vulnerability assessment.The 2022 Mw 6.7 Luding earthquake in the western Sichuan Province of China provides an opportunity to validate this approach.The local government urgently dispatched experts to survey building damage,marking all buildings with damage class stickers.In this work,we sampled 2889 buildings as GPS points and documented the damage classes and building attributes,including structure type,number of floors,and age.A polygon-based digital inventory was generated by digitizing the rooftops of the sampled buildings and importing the attributes.Statistical regressions were created by plotting damage against shaking intensity and PGA,and Random Forest modeling was carried out considering not only buildings and seismic parameters but also environmental factors.The result indicates that statistical regressions have notable uncertainties,and the Random Forest model shows a≥79%accuracy.Topographical factors showed notable importance in the Random Forest modeling.This work provides an open-access seismic building damage inventory and demonstrates its potential for damage prediction and vulnerability assessment. 展开更多
关键词 EARTHQUAKE vulnerability Building damage Building performance Spatial data
原文传递
Longitudinal structural vulnerability analysis of shield tunnels under adjacent excavation disturbances
4
作者 PENG Zhu SHI Cheng-hua +2 位作者 WANG Zu-xian LEI Ming-feng PENG Li-min 《Journal of Central South University》 2025年第6期2256-2272,共17页
This paper proposes a longitudinal vulnerability-based analysis method to evaluate the impact of foundation pit excavation on shield tunnels,accounting for geological uncertainties.First,the shield tunnel is modeled a... This paper proposes a longitudinal vulnerability-based analysis method to evaluate the impact of foundation pit excavation on shield tunnels,accounting for geological uncertainties.First,the shield tunnel is modeled as an Euler Bernoulli beam resting on the Pasternak foundation incorporating variability in subgrade parameters along the tunnel’s length.A random analysis method using random field theory is introduced to evaluate the tunnel’s longitudinal responses to excavation.Next,a risk assessment index system is established.The normalized relative depth between the excavation and the shield tunnel is used as a risk index,while the maximum longitudinal deformation,the maximum circumferential opening,and the maximum longitudinal bending moment serve as performance indicators.Based on these,a method for analyzing the longitudinal fragility of shield tunnels under excavation-induced disturbances is proposed.Finally,the technique is applied to a case study involving a foundation pit excavation above a shield tunnel,which is the primary application scenario of this method.Vulnerability curves for different performance indicators are derived,and the effects of tunnel stiffness and subgrade stiffness on the tunnel vulnerability are explored.The results reveal significant differences in vulnerability curves depending on the performance index used.Compared to the maximum circumferential opening and the maximum longitudinal bending moment,selecting the maximum longitudinal deformation as the control index better ensures the tunnel’s usability and safety under excavation disturbances.The longitudinal vulnerability of the shield tunnel nonlinearly decreases with the increase of the tunnel stiffness and subgrade stiffness,and the subgrade stiffness has a more pronounced effect.Parametric analyses suggest that actively reinforcing the substratum is more effective on reducing the risk of tunnel failure due to adjacent excavations than passive reinforcement of the tunnel structure. 展开更多
关键词 shield tunnel foundation pit excavation foundation variability random field vulnerability
在线阅读 下载PDF
Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis
5
作者 Ra-Yeon Choi Yeji Song +3 位作者 Minsoo Jang Taekyung Kim Jinhyun Ahn Dong-Hyuk Im 《Computers, Materials & Continua》 2025年第4期785-801,共17页
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,... Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity.However,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain security.Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract scenarios.Furthermore,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural vulnerabilities.To address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability detection.Our approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart contracts.Each graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the code.The extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities effectivel.Experimental results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities. 展开更多
关键词 Blockchain smart contract vulnerability detection large language model
在线阅读 下载PDF
Changes in border-associated macrophages after stroke: Single-cell sequencing analysis 被引量:2
6
作者 Ning Yu Yang Zhao +3 位作者 Peng Wang Fuqiang Zhang Cuili Wen Shilei Wang 《Neural Regeneration Research》 2026年第1期346-356,共11页
Border-associated macrophages are located at the interface between the brain and the periphery, including the perivascular spaces, choroid plexus, and meninges. Until recently, the functions of border-associated macro... Border-associated macrophages are located at the interface between the brain and the periphery, including the perivascular spaces, choroid plexus, and meninges. Until recently, the functions of border-associated macrophages have been poorly understood and largely overlooked. However, a recent study reported that border-associated macrophages participate in stroke-induced inflammation, although many details and the underlying mechanisms remain unclear. In this study, we performed a comprehensive single-cell analysis of mouse border-associated macrophages using sequencing data obtained from the Gene Expression Omnibus(GEO) database(GSE174574 and GSE225948). Differentially expressed genes were identified, and enrichment analysis was performed to identify the transcription profile of border-associated macrophages. CellChat analysis was conducted to determine the cell communication network of border-associated macrophages. Transcription factors were predicted using the ‘pySCENIC' tool. We found that, in response to hypoxia, borderassociated macrophages underwent dynamic transcriptional changes and participated in the regulation of inflammatory-related pathways. Notably, the tumor necrosis factor pathway was activated by border-associated macrophages following ischemic stroke. The pySCENIC analysis indicated that the activity of signal transducer and activator of transcription 3(Stat3) was obviously upregulated in stroke, suggesting that Stat3 inhibition may be a promising strategy for treating border-associated macrophages-induced neuroinflammation. Finally, we constructed an animal model to investigate the effects of border-associated macrophages depletion following a stroke. Treatment with liposomes containing clodronate significantly reduced infarct volume in the animals and improved neurological scores compared with untreated animals. Taken together, our results demonstrate comprehensive changes in border-associated macrophages following a stroke, providing a theoretical basis for targeting border-associated macrophages-induced neuroinflammation in stroke treatment. 展开更多
关键词 border-associated macrophages CLODRONATE hypoxia ISCHEMIA-REPERFUSION ischemic stroke liposomes neuroinflammation single-cell sequencing analysis STAT3 tumor necrosis factor
暂未订购
Ecological vulnerability assessment and driving force analysis of small watersheds in Hilly Regions using sensitivity-resilience-pressure modeling
7
作者 Jing-tao Shi Ge Gao +6 位作者 Jun-jian Liu Yu-ge Jiang Bo Li Xiao-yan Hao Jun-chao Zhang Zhao-yi Li Huan Sun 《Journal of Groundwater Science and Engineering》 2025年第3期209-224,共16页
Pingquan City,the origin of five rivers,serves as the core water conservation zone for the Beijing-Tianjin-Hebei region and exemplifies the characteristics of small watersheds in hilly areas.In recent years,excessive ... Pingquan City,the origin of five rivers,serves as the core water conservation zone for the Beijing-Tianjin-Hebei region and exemplifies the characteristics of small watersheds in hilly areas.In recent years,excessive mining and intensified human activities have severely disrupted the local ecosystem,creating an urgent need for ecological vulnerability assessment to enhance water conservation functions.This study employed the sensitivity-resilience-pressure model,integrating various data sources,including regional background,hydro-meteorological data,field investigations,remote sensing analysis,and socio-economic data.The weights of the model indices were determined using an entropy weighting model that combines principal component analysis and the analytic hierarchy process.Using the ArcGIS platform,the spatial distribution and driving forces of ecological vulnerability in 2020 were analyzed,providing valuable insights for regional ecological restoration.The results indicated that the overall Ecological Vulnerability Index(EVI)was 0.389,signifying moderate ecological vulnerability,with significant variation between watersheds.The Daling River Basin had a high EVI,with ecological vulnerability primarily in levels IV and V,indicating high ecological pressure,whereas the Laoniu River Basin had a low EVI,reflecting minimal ecological pressure.Soil type was identified as the primary driving factor,followed by elevation,temperature,and soil erosion as secondary factors.It is recommended to focus on key regions and critical factors while conducting comprehensive monitoring and assessment to ensure the long-term success of ecological management efforts. 展开更多
关键词 Beijing-Tianjin-Hebei water conservation zone Spatital analysis SRP model GIS Watershed variation
在线阅读 下载PDF
Crystal structure,thermal analysis,and luminescence properties of six heterocyclic lanthanide complexes
8
作者 SONG Zihe ZHAO Jinjin +1 位作者 REN Ning ZHANG Jianjun 《无机化学学报》 北大核心 2026年第1期181-192,共12页
Six new lanthanide complexes:[Ln(3,4-DEOBA)3(4,4'-DM-2,2'-bipy)]2·2C_(2)H_(5)OH,[Ln=Dy(1),Eu(2),Tb(3),Sm(4),Ho(5),Gd(6);3,4-DEOBA-=3,4-diethoxybenzoate,4,4'-DM-2,2'-bipy=4,4'-dimethyl-2,2'... Six new lanthanide complexes:[Ln(3,4-DEOBA)3(4,4'-DM-2,2'-bipy)]2·2C_(2)H_(5)OH,[Ln=Dy(1),Eu(2),Tb(3),Sm(4),Ho(5),Gd(6);3,4-DEOBA-=3,4-diethoxybenzoate,4,4'-DM-2,2'-bipy=4,4'-dimethyl-2,2'-bipyridine]were successfully synthesized by the volatilization of the solution at room temperature.The crystal structures of six complexes were determined by single-crystal X-ray diffraction technology.The results showed that the complexes all have a binuclear structure,and the structures contain free ethanol molecules.Moreover,the coordination number of the central metal of each structural unit is eight.Adjacent structural units interact with each other through hydrogen bonds and further expand to form 1D chain-like and 2D planar structures.After conducting a systematic study on the luminescence properties of complexes 1-4,their emission and excitation spectra were obtained.Experimental results indicated that the fluorescence lifetimes of complexes 2 and 3 were 0.807 and 0.845 ms,respectively.The emission spectral data of complexes 1-4 were imported into the CIE chromaticity coordinate system,and their corre sponding luminescent regions cover the yellow light,red light,green light,and orange-red light bands,respectively.Within the temperature range of 299.15-1300 K,the thermal decomposition processes of the six complexes were comprehensively analyzed by using TG-DSC/FTIR/MS technology.The hypothesis of the gradual loss of ligand groups during the decomposition process was verified by detecting the escaped gas,3D infrared spectroscopy,and ion fragment information detected by mass spectrometry.The specific decomposition path is as follows:firstly,free ethanol molecules and neutral ligands are removed,and finally,acidic ligands are released;the final product is the corresponding metal oxide.CCDC:2430420,1;2430422,2;2430419,3;2430424,4;2430421,5;2430423,6. 展开更多
关键词 lanthanide complexes fluorescence property crystal structure thermal analysis
在线阅读 下载PDF
Assessment of Thermal Vulnerability and Analysis of Influencing Factors in Urban Functional Areas of Foshan City,China
9
作者 WANG Xinyue YANG Jun +4 位作者 ZHANG Rui XIN Jiaxing YU Wenbo REN Jiayi XIAO Xiangming 《Chinese Geographical Science》 2025年第4期852-866,共15页
To adapt to national climate change strategies,understanding the thermal vulnerability of urban functional zones(UFZs)is critical for enhancing the livability and sustainable development of cities.We address the limit... To adapt to national climate change strategies,understanding the thermal vulnerability of urban functional zones(UFZs)is critical for enhancing the livability and sustainable development of cities.We address the limitations of existing thermal vulnerability assessments by incorporating human perception into the analysis.Specifically,we introduce the sky openness index to reflect human perception of the thermal environment and examine variations in thermal vulnerability across different UFZs.Using the Extreme Gradient Boosting(XGBoost)-SHapley Additive exPlanations(SHAP)model,we analyze the contributions of 2D and 3D urban form indicators to thermal vulnerability and link these contributions to the unique needs and vulnerability characteristics of UFZs of Foshan City,China in 2023.The results reveal that:1)high-value heat-fragile areas(1.74–2.00]constitute 10.42%of Foshan City;2)traffic zone and publiccommercial zone exhibit the highest levels of thermal vulnerability;and 3)building height and the normalized building index are the most influential factors,with contributions of|0.06|and|0.03|,respectively.We provide a scientific foundation for developing governance strategies to promote urban resilience. 展开更多
关键词 heat vulnerability urban functional zones Extreme Gradient Boosting(XGBoost)-SHapley Additive exPlanations(SHAP)model urban thermal environment urban morphological indicators Foshan City China
在线阅读 下载PDF
Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks
10
作者 Haoxin Sun XiaoYu +5 位作者 Jiale Li Yitong Xu JieYu Huanhuan Li Yuanzhang Li Yu-An Tan 《Computers, Materials & Continua》 2026年第2期1474-1488,共15页
Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequ... Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities. 展开更多
关键词 Smart contracts graph neural networks symbolic execution vulnerability detection
在线阅读 下载PDF
Vulnerability assessment in fractured aquifer using improved vulnerability index:Applied to Gabes aquifer,Southeastern Tunisia
11
作者 Mounir Atoui Belgacem Agoubi 《Journal of Groundwater Science and Engineering》 2026年第1期69-82,共14页
The Gabes aquifer system,located in southeastern Tunisia,is a crucial resource for supporting local socio-economic activities.Due to its dual porosity structure,is particularly vulnerable to pollution.This study aims ... The Gabes aquifer system,located in southeastern Tunisia,is a crucial resource for supporting local socio-economic activities.Due to its dual porosity structure,is particularly vulnerable to pollution.This study aims to develop a hybrid model that combines the Fracture Aquifer Index(FAI)with the conventional GOD(Groundwater occurrence,Overall lithology,Depth to water table)method,to assess groundwater vulnerability in fractured aquifer.To develop the hybrid model,the classical GOD method was integrated with FAI to produce a single composite index.Each parameter within both GOD and FAI was scored,and a final index was calculated to delineate vulnerable areas.The results show that the study area can be classified into four vulnerability levels:Very low,low,moderate,and high,indicating that approximately 8%of the area exhibits very low vulnerability,29%has low vulnerability,25%falls into the moderate category,and 38%is considered highly vulnerable.The FAI-GOD model further incorporates fracture network characteristics.This refinement reduces the classification to three vulnerability classes:Low,medium,and high.The outcomes demonstrate that 46%of the area is highly vulnerable due to a dense concentration of fractures,while 17%represents an intermediate zone characterized by either shallow or deeper fractures.In contrast,37%corresponds to areas with lightly fractured rock,where the impact on vulnerability is minimal.Multivariate statistical analysis was employed using Principal Components Analysis(PCA)and Hierarchical Cluster Analysis(HCA)on 24 samples across six variables.The first three components account for over 76%of the total variance,reinforcing the significance of fracture dynamics in classifying vulnerability levels.The FAI-GOD model removes the very-low-vulnerability class and expands the spatial extent of low-and high-vulnerability zones,reflecting the dominant influence of fracture networks on aquifer sensitivity.While both indices use a five-class system,FAI-GOD redistributes vulnerability by eliminating very-low-vulnerability areas and amplifying low/high categories,highlighting the critical role of fractures.A strong correlation(R2=0.94)between the GOD and FAI-GOD indices,demonstrated through second-order polynomial regression,confirms the robustness of the FAI-GOD model in accurately predicting vulnerability to pollution.This model provides a useful framework for assessing the vulnerability of complex aquifers and serves as a decision-making tool for groundwater managers in similar areas. 展开更多
关键词 GROUNDWATER Aquifer vulnerability Fractured media FAI-GOD index GOD index GIS
在线阅读 下载PDF
Dynamic psychological vulnerability and adaptation in rheumatoid arthritis:Trajectories,predictors,and interventions
12
作者 Xue-Meng Chen Xian Cheng Wei Wu 《World Journal of Psychiatry》 2026年第1期32-46,共15页
Rheumatoid arthritis(RA)patients face significant psychological challenges alongside physical symptoms,necessitating a comprehensive understanding of how psychological vulnerability and adaptation patterns evolve thro... Rheumatoid arthritis(RA)patients face significant psychological challenges alongside physical symptoms,necessitating a comprehensive understanding of how psychological vulnerability and adaptation patterns evolve throughout the disease course.This review examined 95 studies(2000-2025)from PubMed,Web of Science,and CNKI databases including longitudinal cohorts,randomized controlled trials,and mixed-methods research,to characterize the complex interplay between biological,psychological,and social factors affecting RA patients’mental health.Findings revealed three distinct vulnerability trajectories(45%persistently low,30%fluctuating improvement,25%persistently high)and four adaptation stages,with critical intervention periods occurring 3-6 months postdiagnosis and during disease flares.Multiple factors significantly influence psychological outcomes,including gender(females showing 1.8-fold increased risk),age(younger patients experiencing 42%higher vulnerability),pain intensity,inflammatory markers,and neuroendocrine dysregulation(48%showing cortisol rhythm disruption).Early psychological intervention(within 3 months of diagnosis)demonstrated robust benefits,reducing depression incidence by 42%with effects persisting 24-36 months,while different modalities showed complementary advantages:Cognitive behavioral therapy for depression(Cohen’s d=0.68),mindfulness for pain acceptance(38%improvement),and peer support for meaning reconstruction(25.6%increase).These findings underscore the importance of integrating routine psychological assessment into standard RA care,developing stage-appropriate interventions,and advancing research toward personalized biopsychosocial approaches that address the dynamic psychological dimensions of the disease. 展开更多
关键词 Rheumatoid arthritis Psychological vulnerability Disease adaptation ability Dynamic changes Mental health
暂未订购
Cavity ring-down spectroscopy CO gas sensor integrating principal component analysis with savitzky-golay filtering
13
作者 GUO Zi-long SHI Cheng-rui +4 位作者 DONG Yuan-yuan ZHANG Lei SUN Xiao-yuan SUN Jing-jing ZHOU Sheng 《中国光学(中英文)》 北大核心 2026年第1期179-189,共11页
The Savitzky-Golay(SG)filter,which employs polynomial least-squares approximations to smooth data and estimate derivatives,is widely used for processing noisy data.However,noise suppression by the SG filter is recogni... The Savitzky-Golay(SG)filter,which employs polynomial least-squares approximations to smooth data and estimate derivatives,is widely used for processing noisy data.However,noise suppression by the SG filter is recognized to be limited at data boundaries and high frequencies,which can significantly reduce the signal-to-noise ratio(SNR).To solve this problem,a novel method synergistically integrating Principal Component Analysis(PCA)with SG filtering is proposed in this paper.This approach avoids the is-sue of excessive smoothing associated with larger window sizes.The proposed PCA-SG filtering algorithm was applied to a CO gas sensing system based on Cavity Ring-Down Spectroscopy(CRDS).The perform-ance of the PCA-SG filtering algorithm is demonstrated through comparison with Moving Average Filtering(MAF),Wavelet Transformation(WT),Kalman Filtering(KF),and the SG filter.The results demonstrate that the proposed algorithm exhibits superior noise reduction capabilities compared to the other algorithms evaluated.The SNR of the ring-down signal was improved from 11.8612 dB to 29.0913 dB,and the stand-ard deviation of the extracted ring-down time constant was reduced from 0.037μs to 0.018μs.These results confirm that the proposed PCA-SG filtering algorithm effectively improves the smoothness of the ring-down curve data,demonstrating its feasibility. 展开更多
关键词 cavity ring-down spectroscopy CO gas sensor principal component analysis Savitzky-Golay filter
在线阅读 下载PDF
Syntax-Aware Hierarchical Attention Networks for Code Vulnerability Detection
14
作者 Yongbo Jiang Shengnan Huang +1 位作者 Tao Feng Baofeng Duan 《Computers, Materials & Continua》 2026年第1期2252-2273,共22页
In the context of modern software development characterized by increasing complexity and compressed development cycles,traditional static vulnerability detection methods face prominent challenges including high false ... In the context of modern software development characterized by increasing complexity and compressed development cycles,traditional static vulnerability detection methods face prominent challenges including high false positive rates and missed detections of complex logic due to their over-reliance on rule templates.This paper proposes a Syntax-Aware Hierarchical Attention Network(SAHAN)model,which achieves high-precision vulnerability detection through grammar-rule-driven multi-granularity code slicing and hierarchical semantic fusion mechanisms.The SAHAN model first generates Syntax Independent Units(SIUs),which slices the code based on Abstract Syntax Tree(AST)and predefined grammar rules,retaining vulnerability-sensitive contexts.Following this,through a hierarchical attention mechanism,the local syntax-aware layer encodes fine-grained patterns within SIUs,while the global semantic correlation layer captures vulnerability chains across SIUs,achieving synergistic modeling of syntax and semantics.Experiments show that on benchmark datasets like QEMU,SAHAN significantly improves detection performance by 4.8%to 13.1%on average compared to baseline models such as Devign and VulDeePecker. 展开更多
关键词 vulnerability detection abstract syntax tree syntax rule slicing hierarchical attention mechanism deep learning
在线阅读 下载PDF
Global,regional,and national burdens of acute respiratory infections among children and adolescents from 1990 to 2021:A systematic analysis
15
作者 Xiang Meng Sijie Li +4 位作者 Meiyan Li Husheng Xiong Xuejuan Chen Yonghui Zhong Dingmei Zhang 《Asian Pacific Journal of Tropical Medicine》 2026年第2期51-60,I0001-I0061,共71页
Objective:To evaluate the global,regional,and national burden and determinants of Acute Respiratory Infections(ARIs)among children and adolescents from 1990 to 2021.Methods:We analysed ARI mortality and disability-adj... Objective:To evaluate the global,regional,and national burden and determinants of Acute Respiratory Infections(ARIs)among children and adolescents from 1990 to 2021.Methods:We analysed ARI mortality and disability-adjusted life years(DALYs),stratified by age,sex,and economic development level based on data retrieved from the Global Burden of Disease study 2021.Decomposition and frontier analyses were employed to identify key drivers of burden variation and visualize potential reductions based on development levels.Results:Between 1990 and 2021,the global burden of ARIs showed a significant decline in both achievable age-standardized DALYs rate and age-standardized mortality rates(EAPC=-3.87 and-3.81,respectively).Different age groups and sex witnessed different levels of ARI burden,males experienced heavier burden than females and the 0-4 years-old group experienced heavier burden than other study age groups.Most of the 204 countries and territories experienced a downward trend of ARI burden,with slight increases observed only in Lesotho and Dominica.A negative correlation was found between the Socio-demographic Index and ARI burden.Decomposition analysis indicated that the significant decreases in deaths and DALYs were primarily driven by epidemiological changes.Conclusions:The global burden of ARIs among children and adolescents has declined over the past three decades,but substantial regional disparities persist.Targeted public health strategies are needed to address the continued ARI burden in high-risk regions and vulnerable age groups. 展开更多
关键词 Respiratory infection Global disease burden Decomposition analysis Frontier analysis
暂未订购
Artificial intelligence-assisted non-metallic inclusion particle analysis in advanced steels using machine learning:A review
16
作者 Gonghao Lian Xiaoming Liu +3 位作者 Qiang Wang Chunguang Shen Yi Wang Wangzhong Mu 《International Journal of Minerals,Metallurgy and Materials》 2026年第2期401-416,共16页
The detection and characterization of non-metallic inclusions are essential for clean steel production.Recently,imaging analysis combined with high-dimensional data processing of metallic materials using artificial in... The detection and characterization of non-metallic inclusions are essential for clean steel production.Recently,imaging analysis combined with high-dimensional data processing of metallic materials using artificial intelligence(AI)-based machine learning(ML)has developed rapidly.This technique has achieved impressive results in the field of inclusion classification in process metallurgy.The present study surveys the ML modeling of inclusion prediction in advanced steels,including the detection,classification,and feature prediction of inclusions in different steel grades.Studies on clean steel with different features based on data and image analysis via ML are summarized.Regarding the data analysis,the inclusion prediction methodology based on ML establishes a connection between the experimental parameters and inclusion characteristics and analyzes the importance of the experimental parameters.Regarding the image analysis,the focus is placed on the classification of different types of inclusions via deep learning,in comparison with data analysis.Finally,further development of inclusion analyses using ML-based methods is recommended.This work paves the way for the application of AIbased methodologies for ultraclean-steel studies from a sustainable metallurgy perspective. 展开更多
关键词 machine learning inclusion classification image analysis data analysis clean steel
在线阅读 下载PDF
Integrated transcriptome and metabolome analysis reveals light induction of anthocyanin rapid accumulation in red-fleshed peach after pre-harvest bagging
17
作者 Jia Wei Fengjie He +6 位作者 Kexin Sun Li Wang Yiming Yin Junbei Ni Songling Bai Yuanwen Teng Huijuan Jia 《Horticultural Plant Journal》 2026年第3期539-554,共16页
Red-fleshed fruits are valued for their vibrant color and high anthocyanin content.Pre-harvest fruit bagging enhances fruit peel pigmentation,but its effect on flesh coloration remains poorly characterized.This study ... Red-fleshed fruits are valued for their vibrant color and high anthocyanin content.Pre-harvest fruit bagging enhances fruit peel pigmentation,but its effect on flesh coloration remains poorly characterized.This study revealed that removing bags from‘Gengcunyangtao’red-fleshed peach fruits triggers the rapid and uniform accumulation of anthocyanins in the flesh,resulting in anthocyanin levels that exceed those in unbagged fruits.The exposure to light after bag removal triggered significant increases in anthocyanin levels within 24 h.This was accompanied by the rapid upregulation of light-responsive and flavonoid biosynthetic gene expression levels within 6 h.A metabolomic analysis indicated that anthocyanin precursors,especially p-coumaric acid,accumulated before bag removal,thereby increasing substrate availability for rapid anthocyanin synthesis.On the basis of a weighted gene co-expression network analysis,MYB transcription factors,anthocyanin transporters,glutathione S-transferase,and multidrug and toxic compound extrusion(MATE)were identified as key regulators that coordinate precursor storage along with light-induced transcriptional activation.Notably,PpMYB4 binds to the promoter of PpGSTF14 and activates its expression,thereby promoting anthocyanin accumulation.The study findings elucidated the temporal coordination of metabolic priming and light-responsive transcriptional regulation driving rapid anthocyanin biosynthesis,with possible implications for improving peach fruit flesh coloration. 展开更多
关键词 Red-fleshed peach ANTHOCYANIN Pre-harvest fruit bagging Light exposure Transcriptome analysis Metabolome analysis
在线阅读 下载PDF
Comprehensive pan-cancer analysis of the receptor-interacting protein kinase family expression,genomic alterations,and functional implications
18
作者 Wan-Rong Li Xin Li Jian Wang 《Life Research》 2026年第1期35-44,共10页
Background:Receptor-interacting protein kinases(RIPKs)regulate cell death,inflammation,and immune responses,yet their roles in cancer are not fully understood.This study investigates the expression,genomic alterations... Background:Receptor-interacting protein kinases(RIPKs)regulate cell death,inflammation,and immune responses,yet their roles in cancer are not fully understood.This study investigates the expression,genomic alterations,and functional implications of RIPK family members across various cancers.Methods:We collected multi-omics data from The Cancer Genome Atlas and other public databases,including gene expression,copy number variation(CNV),mutation,methylation,tumor mutation burden(TMB),and microsatellite instability(MSI).Differential expression and survival analyses were performed using DESeq2 and Cox proportional hazards models.CNV and mutation data were analyzed with GISTIC2 and Mutect2,and methylation data with the ChAMP package.Correlations with TMB and MSI were assessed using Pearson coefficients,and gene set enrichment analysis was conducted with the MSigDB Hallmark gene sets.Results:RIPK family members show significant differential expression in various cancers,with RIPK1 and RIPK4 frequently altered.Survival analysis reveals heterogeneous impacts on overall survival.CNV and mutation analyses identify high alteration frequencies for RIPK2 and RIPK7,affecting gene expression.RIPK1 and RIPK7 are hypermethylated in several cancers,inversely correlating with RIPK3 expression.RIPK1,RIPK2,RIPK5,RIPK6,and RIPK7 correlate positively with TMB,while RIPK3 shows negative correlations in some cancers.MSI analysis indicates associations with DNA mismatch repair.G ene set enrichment analysis highlights immune-related pathway enrichment for RIPK1,RIPK2,RIPK3,and RIPK6,and cell proliferation and DNA repair pathways for RIPK4 and RIPK5.RIPK family members showed heterogeneous alterations across cancers:for example,RIPK7 was mutated in up to~15%of u terine c orpus e ndometrial c arcinoma and l ung s quamous c ell c arcinoma cases,and RIPK1 and RIPK7 exhibited frequent promoter hypermethylation in multiple tumor types.Several genes displayed context-dependent associations with overall survival and with TMB/MSI.Conclusion:This pan-cancer analysis of the RIPK family reveals their diverse roles and potential as biomarkers and therapeutic targets.The findings emphasize the importance of RIPK genes in tumorigenesis and suggest context-dependent functions across cancer types.Further studies are needed to explore their mechanisms in cancer development and clinical applications. 展开更多
关键词 RIPK family pan-cancer analysis tumor mutation burden microsatellite instability gene set enrichment analysis
暂未订购
Motion Performance Analysis of Offshore Lifting for Wind-Fishery Integrated Aquaculture Net Cage Considering Multi-Body Coupling Effects
19
作者 WANG Wanqi YU Tongshun +2 位作者 LU Peng ZHAO Hui TAO Wei 《南方能源建设》 2026年第1期1-15,共15页
[Objective]This study aims to investigate the multi-body hydrodynamic interaction mechanisms during offshore lifting operations of aquaculture net cages in wind-fishery integration systems.By integrating numerical sim... [Objective]This study aims to investigate the multi-body hydrodynamic interaction mechanisms during offshore lifting operations of aquaculture net cages in wind-fishery integration systems.By integrating numerical simulations and dynamic analysis methods,this study systematically investigates the coupled dynamic response characteristics during the cage-carrier vessel separation process to reveal its dynamic evolution patterns and key influence mechanisms.[Method]Based on potential flow theory,a fully coupled dynamic analysis model of crane vessel-net cage-semi-submersible barge was established for a marine ranch project in Guangdong.The complete lifting process was dynamically simulated using SESAM software.Five typical operating sea states were configured to investigate the influence of wave parameters on the system's motion response under combined wave-current-wind actions.[Result]The results demonstrate that wave period dominates the system stability.Under short-period conditions,the system maintains stable motion with relatively small horizontal relative displacements,while long-period conditions excite low-frequency resonance,leading to significant slow-drift motions.Vertical response analysis reveals that long-period waves cause severe relative displacement fluctuations between the cage and semi-submersible vessel,with actual displacement amplitudes doubling the preset safety target of 2.045 m.Quantitative analysis further indicates that when significant wave height increases from 1.0 m to 1.5 m,the actual displacement amplitude increases by approximately 20%relative to the target displacement of 2.045 m,demonstrating that its influence is significantly weaker than the displacement variations induced by wave period changes.The complete dynamic simulation successfully captures the continuous dynamic response characteristics during the lifting process.[Conclusion]This research clarifies the influence mechanisms of wave parameters on the cage lifting process,identifying wave period as the crucial factor for operational safety.An operation window assessment method incorporating multi-body coupling effects is established,proposing a safety criterion with peak period not exceeding six seconds as the core requirement.The findings provide theoretical foundation for safe installation of marine ranch net cages and offer valuable references for similar offshore lifting operations. 展开更多
关键词 wind-fishery integration offshore lifting hydrodynamic analysis multi-body coupling analysis motion response safe operation window
在线阅读 下载PDF
Advanced isoconversional kinetic analysis of lepidolite sulfation product decomposition reactions for selectively extracting lithium
20
作者 Yubo Liu Baozhong Ma +4 位作者 Jiahui Cheng Xiang Li Hui Yang Chengyan Wang Yongqiang Chen 《International Journal of Minerals,Metallurgy and Materials》 2026年第1期217-227,共11页
The sulfation and decomposition process has proven effective in selectively extracting lithium from lepidolite.It is essential to clarify the thermochemical behavior and kinetic parameters of decomposition reactions.A... The sulfation and decomposition process has proven effective in selectively extracting lithium from lepidolite.It is essential to clarify the thermochemical behavior and kinetic parameters of decomposition reactions.Accordingly,comprehensive kinetic study by employing thermalgravimetric analysis at various heating rates was presented in this paper.Two main weight loss regions were observed during heating.The initial region corresponded to the dehydration of crystal water,whereas the subsequent region with overlapping peaks involved complex decomposition reactions.The overlapping peaks were separated into two individual reaction peaks and the activation energy of each peak was calculated using isoconversional kinetics methods.The activation energy of peak 1 exhibited a continual increase as the reaction conversion progressed,while that of peak 2 steadily decreased.The optimal kinetic models,identified as belonging to the random nucleation and subsequent growth category,provided valuable insights into the mechanism of the decomposition reactions.Furthermore,the adjustment factor was introduced to reconstruct the kinetic mechanism models,and the reconstructed models described the kinetic mechanism model more accurately for the decomposition reactions.This study enhanced the understanding of the thermochemical behavior and kinetic parameters of the lepidolite sulfation product decomposition reactions,further providing theoretical basis for promoting the selective extraction of lithium. 展开更多
关键词 LITHIUM LEPIDOLITE decomposition reactions KINETICS isoconversional analysis
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部