期刊文献+
共找到550,762篇文章
< 1 2 250 >
每页显示 20 50 100
A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection
1
作者 Zheng Zhang Jie Hao +2 位作者 Liquan Chen Tianhao Hou Yanan Liu 《Computers, Materials & Continua》 2026年第1期1119-1140,共22页
With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion det... With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID. 展开更多
关键词 network intrusion detection class imbalance problem deep learning
在线阅读 下载PDF
基于CNN-BiLSTM-SSA的锅炉再热器壁温预测模型
2
作者 徐世明 何至谦 +6 位作者 彭献永 商忠宝 范景玮 王俊略 曲舒杨 刘洋 周怀春 《动力工程学报》 北大核心 2026年第1期121-130,共10页
针对锅炉高温再热器壁温动态特点,提出了一种基于稀疏自注意力(SSA)、卷积神经网络(CNN)及双向长短期记忆神经网络(BiLSTM)相融合的再热器壁温软测量模型。首先,采用核主成分分析(KPCA)算法对原始候选变量进行筛选降维,选择前26个主成... 针对锅炉高温再热器壁温动态特点,提出了一种基于稀疏自注意力(SSA)、卷积神经网络(CNN)及双向长短期记忆神经网络(BiLSTM)相融合的再热器壁温软测量模型。首先,采用核主成分分析(KPCA)算法对原始候选变量进行筛选降维,选择前26个主成分变量作为模型的最终输入。其次,考虑利用CNN捕捉局部相关性,BiLSTM学习数据的长期序列依赖性的优势,使用卷积神经网络-双向长短期记忆神经网络(CNN-BiLSTM)捕捉时序数据中的短期和长期依赖关系,引入稀疏自注意力SSA机制,通过为不同特征部分分配自适应权重,从而增强CNN-BiLSTM模型的特征提取与建模能力,最后利用在役1000 MW超超临界锅炉的历史数据进行仿真实验。结果表明:CNN-BiLSTM-SSA模型在高温再热器壁温预测中的均方根误差(RMSE)、平均绝对误差(MAE)及平均绝对百分比误差(MAPE)分别为4.92℃、3.81℃和0.6241%,相应的指标均优于CNN、LSTM、BiLSTM、CNN-LSTM和CNN-BiLSTM模型。 展开更多
关键词 再热器壁温软测量 深度学习 卷积神经网络 长短期记忆网络 注意力机制 核主成分分析 cnn-bilstm
在线阅读 下载PDF
考虑谐波激励的电工钢片SAMCNN-BiLSTM磁致伸缩特性精细预测方法
3
作者 肖飞 杨北超 +4 位作者 王瑞田 范学鑫 陈俊全 张新生 王崇 《中国电机工程学报》 北大核心 2026年第3期1274-1285,I0034,共13页
针对不同磁密幅值、频率、谐波组合等复杂激励工况下磁致伸缩建模面临的精准性问题,该文利用空间注意力机制(spatial attention mechanism,SAM)对传统的卷积神经网络(convolutional neural network,CNN)进行改进,将SAM嵌套入CNN网络中,... 针对不同磁密幅值、频率、谐波组合等复杂激励工况下磁致伸缩建模面临的精准性问题,该文利用空间注意力机制(spatial attention mechanism,SAM)对传统的卷积神经网络(convolutional neural network,CNN)进行改进,将SAM嵌套入CNN网络中,建立SAMCNN改进型网络。再结合双向长短期记忆(bidirectional long short-term memory,BiLSTM)网络,提出电工钢片SAMCNN-BiLSTM磁致伸缩模型。首先,利用灰狼优化算法(grey wolf optimization,GWO)寻优神经网络结构的参数,实现复杂工况下磁致伸缩效应的准确表征;然后,建立中低频范围单频与叠加谐波激励等复杂工况下的磁致伸缩应变数据库,开展数据预处理与特征分析;最后,对SAMCNN-BiLSTM模型开展对比验证。对比叠加3次谐波激励下的磁致伸缩应变频谱主要分量,SAMCNN-BiLSTM模型计算值最大相对误差为3.70%,其比Jiles-Atherton-Sablik(J-A-S)、二次畴转等模型能更精确地表征电工钢片的磁致伸缩效应。 展开更多
关键词 磁致伸缩效应 谐波激励 卷积神经网络 空间注意力机制 双向长短期记忆网络
原文传递
基于CNN-BiLSTM的猪咳嗽声识别方法
4
作者 付小朋 周昕 +6 位作者 王星博 徐杏 吴越 谢荣辉 单颖 叶春林 周卫东 《河南农业科学》 北大核心 2026年第2期144-155,共12页
呼吸道疾病是规模猪场常见高发疫病之一,及时准确发现猪呼吸道疾病典型临床症状如咳嗽声对于实现早期预警、预防至关重要。以怀孕中期母猪咳嗽、尖叫、打呼噜声音为研究对象,提出了基于卷积神经网络和双向长短期记忆网络(CNN-BiLSTM)融... 呼吸道疾病是规模猪场常见高发疫病之一,及时准确发现猪呼吸道疾病典型临床症状如咳嗽声对于实现早期预警、预防至关重要。以怀孕中期母猪咳嗽、尖叫、打呼噜声音为研究对象,提出了基于卷积神经网络和双向长短期记忆网络(CNN-BiLSTM)融合的猪咳嗽声识别模型,通过四阶巴特沃斯带通滤波器降噪、一阶高通滤波器预加重、短时能量端点检测等方法预处理猪声数据,采用分帧、加窗、快速傅里叶变换等方法提取预处理后声音数据的梅尔频率倒谱系数(MFCC)特征参数,并对模型识别性能进行评价。结果表明,采用四阶巴特沃斯带通滤波器降噪处理可明显降低猪咳嗽声、尖叫声和打呼噜声的背景噪音,且波形无失真,猪声信号的主要能量保留完整;一阶高通滤波器预加重可明显增强高频区域能量,减弱低频区域能量,缩小区域范围;端点检测可快速标出猪声的有效语音段,减少无关信息对识别模型的干扰;通过提取预处理声音数据的MFCC特征参数可较好地反映猪声的声学特性,将MFCC系数作为特征输入用于模型的识别。融合卷积神经网络与双向长短期记忆网络的深度神经网络(CNN-BiLSTM)模型具有良好的收敛性,混淆矩阵显示,猪咳嗽声、尖叫声和打呼噜声正确识别率分别为83.67%、85.19%和81.58%,说明模型具有良好的泛化能力;五折交叉验证显示,平均准确率为84.03%(82.79%~85.31%);CNN-BiLSTM模型在测试集上的准确率为83.93%,优于Transformer、CNN、LSTM和BiLSTM模型。由此,所提出的CNN-BiLSTM模型在识别猪咳嗽声上具有良好的性能,能够为猪只呼吸道疾病早期检测提供新的方法。 展开更多
关键词 猪咳嗽声 cnn-bilstm识别模型 特征参数 混淆矩阵 五折交叉验证
在线阅读 下载PDF
CNN-BiLSTM残差网络的抗体抗原相互作用预测模型
5
作者 周宇 胡俊 周晓根 《小型微型计算机系统》 北大核心 2026年第1期73-79,共7页
抗体与抗原之间的相互作用是免疫系统识别和对抗病原体的核心机制,同时也是抗体药物设计的关键环节.近年来涌现出一些基于深度学习的方法来提升抗体抗原相互作用预测的效率和精度.为进一步提高预测性能,本文提出了一种新型深度学习模型C... 抗体与抗原之间的相互作用是免疫系统识别和对抗病原体的核心机制,同时也是抗体药物设计的关键环节.近年来涌现出一些基于深度学习的方法来提升抗体抗原相互作用预测的效率和精度.为进一步提高预测性能,本文提出了一种新型深度学习模型CBAAI.该模型整合了卷积神经网络(CNN)、双向长短时记忆网络(BiLSTM)以及残差网络的优势.具体而言,CBAAI首先将抗体和抗原序列输入蛋白质语言模型,提取高质量的序列特征嵌入.然后,通过基于CNN和BiLSTM的残差单元对序列特征进行融合,以构建抗体抗原相互作用预测模型.在HIV和SARS-CoV-2两个独立测试集上的实验结果表明,与当前的主流方法相比,CBAAI在多个评估指标上均取得了显著的性能提升. 展开更多
关键词 抗体 抗原 蛋白质语言模型 卷积神经网络 双向长短时记忆网络
在线阅读 下载PDF
基于CNN-BiLSTM-ATT 混合模型的高校高考录取分数预测研究
6
作者 马沅号 王红梅 +2 位作者 刘浩强 陈建辉 刘星宇 《现代信息科技》 2026年第4期24-31,共8页
高考录取分数线的预测对考生、家长及教育机构具有重要意义,但由于受高考试题难度、高校招生策略、考生规模等多重因素影响,该项预测工作具有较大挑战。为此,文章提出一种基于CNN-BiLSTM-ATT的混合模型用于高校录取分数线的预测。该模... 高考录取分数线的预测对考生、家长及教育机构具有重要意义,但由于受高考试题难度、高校招生策略、考生规模等多重因素影响,该项预测工作具有较大挑战。为此,文章提出一种基于CNN-BiLSTM-ATT的混合模型用于高校录取分数线的预测。该模型首先利用卷积神经网络(CNN)提取高校录取分数线的局部特征,再通过双向长短期记忆网络(BiLSTM)学习时间序列中的长期依赖关系,最后引入注意力机制(ATT)增强模型对关键年份数据的关注,以提升预测性能。实验结果表明,CNN-BiLSTM-ATT模型在高校录取分数线预测方面具备较高的准确性及泛化能力,相较于其他对比模型,能够更有效地捕捉分数线的变化趋势,取得更优的评估指标,可为高考志愿填报提供有价值的参考。 展开更多
关键词 cnn-bilstm-ATT 高考录取分数 预测 神经网络
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
7
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
8
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
9
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
10
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
11
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
12
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
13
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Multi-Label Classification Model Using Graph Convolutional Neural Network for Social Network Nodes
14
作者 Junmin Lyu Guangyu Xu +4 位作者 Feng Bao Yu Zhou Yuxin Liu Siyu Lu Wenfeng Zheng 《Computer Modeling in Engineering & Sciences》 2026年第2期1235-1256,共22页
Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relati... Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relationships among nodes.This paper proposes a novel graph coupling convolutional model that introduces an adaptive weighting mechanism to assign distinct importance to neighboring nodes based on their similarity to the central node.Unlike traditional methods,the proposed coupling strategy enhances the interpretability of node interactions while maintaining competitive classification performance.The model operates in the spatial domain,utilizing adjacency list structures for efficient convolution and addressing the limitations of weight sharing through a coupling-based similarity computation.Extensive experiments are conducted on five graph-structured datasets,including Cora,Citeseer,PubMed,Reddit,and BlogCatalog,as well as a custom topology dataset constructed from the Open University Learning Analytics Dataset(OULAD)educational platform.Results demonstrate that the proposed model achieves good classification accuracy,while significantly reducing training time through direct second-order neighbor fusion and data preprocessing.Moreover,analysis of neighborhood order reveals that considering third-order neighbors offers limited accuracy gains but introduces considerable computational overhead,confirming the efficiency of first-and second-order convolution in practical applications.Overall,the proposed graph coupling model offers a lightweight,interpretable,and effective framework for multi-label node classification in complex networks. 展开更多
关键词 GNN social networks nodes multi-label classification model graphic convolution neural network coupling principle
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
15
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
Conditional Generative Adversarial Network-Based Travel Route Recommendation
16
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
RE-UKAN:A Medical Image Segmentation Network Based on Residual Network and Efficient Local Attention
17
作者 Bo Li Jie Jia +2 位作者 Peiwen Tan Xinyan Chen Dongjin Li 《Computers, Materials & Continua》 2026年第3期2184-2200,共17页
Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual infor... Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual information.Although the subsequent U-KAN model enhances nonlinear representation capabilities,it still faces challenges such as gradient vanishing during deep network training and spatial detail loss during feature downsampling,resulting in insufficient segmentation accuracy for edge structures and minute lesions.To address these challenges,this paper proposes the RE-UKAN model,which innovatively improves upon U-KAN.Firstly,a residual network is introduced into the encoder to effectively mitigate gradient vanishing through cross-layer identity mappings,thus enhancing modelling capabilities for complex pathological structures.Secondly,Efficient Local Attention(ELA)is integrated to suppress spatial detail loss during downsampling,thereby improving the perception of edge structures and minute lesions.Experimental results on four public datasets demonstrate that RE-UKAN outperforms existing medical image segmentation methods across multiple evaluation metrics,with particularly outstanding performance on the TN-SCUI 2020 dataset,achieving IoU of 88.18%and Dice of 93.57%.Compared to the baseline model,it achieves improvements of 3.05%and 1.72%,respectively.These results fully demonstrate RE-UKAN’s superior detail retention capability and boundary recognition accuracy in complex medical image segmentation tasks,providing a reliable solution for clinical precision segmentation. 展开更多
关键词 Image segmentation U-KAN residual network ELA
在线阅读 下载PDF
Analysis of DC Aging Characteristics of Stable ZnO Varistors Based on Voronoi Network and Finite Element Simulation Model
18
作者 ZHANG Ping LU Mingtai +1 位作者 LU Tiantian YUE Yinghu 《材料导报》 北大核心 2026年第2期20-28,共9页
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i... In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors. 展开更多
关键词 ZnO varistors Voronoi network DC aging finite element method(FEM) current distribution double Schottky barrier theory
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
19
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Recyclable,reprocessable,and biodegradable cellulosic bioplastics enabled by a reactive eutectic network
20
作者 Huanhuan Wu Ren’ai Li 《Science China Materials》 2026年第3期1665-1676,共12页
Growing demand for sustainable,high-performance materials is driving research to replace petroleumbased plastics with abundant biomass,especially cellulose.However,the effective modification and functionalization of c... Growing demand for sustainable,high-performance materials is driving research to replace petroleumbased plastics with abundant biomass,especially cellulose.However,the effective modification and functionalization of cellulose is often impeded by complex processing requirements and limited performance tunability.Here,an innovative“active”green medium strategy based on an ethyl cellulose/thymol eutectic system is reported,enabling in situ chemical modification of eutectic components and the construction of dynamic self-adaptive networks without external catalysts or initiators.Through precise molecular design,dynamic boroxine networks and acrylate crosslinking networks are synergistically integrated into the cellulosic bioplastic(CBP)matrix.The resulting CBP-A2B8 exhibits exceptional optical transparency(~85%),superior mechanical properties(tensile strength~30 MPa),facile thermal processability,and closed-loop recyclability.Its chemical structure and mechanical performance remain highly stable even after 20 hot-compression recycling cycles.Complete biodegradation occurs under natural environmental conditions within approximately 100 days.Furthermore,the bioplastic,when combined with silver nanowires,forms high-performance flexible transparent conductive films successfully applied in customizable electroluminescent devices.Post-lifecycle,device components(silver nanowires and CBP matrix)are efficiently separated and recycled using a straightforward solvent-based method.This eutectic system-mediated strategy offers a novel pathway for the development of sustainable,high-performance bioplastics with a closed-loop lifecycle. 展开更多
关键词 cellulosic bioplastics eutectic system self-adaptive networks biodegradation RECYCLABILITY
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部