期刊文献+
共找到553,615篇文章
< 1 2 250 >
每页显示 20 50 100
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
1
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
2
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
3
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
4
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
5
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
6
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Conditional Generative Adversarial Network-Based Travel Route Recommendation
7
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
8
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
RE-UKAN:A Medical Image Segmentation Network Based on Residual Network and Efficient Local Attention
9
作者 Bo Li Jie Jia +2 位作者 Peiwen Tan Xinyan Chen Dongjin Li 《Computers, Materials & Continua》 2026年第3期2184-2200,共17页
Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual infor... Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual information.Although the subsequent U-KAN model enhances nonlinear representation capabilities,it still faces challenges such as gradient vanishing during deep network training and spatial detail loss during feature downsampling,resulting in insufficient segmentation accuracy for edge structures and minute lesions.To address these challenges,this paper proposes the RE-UKAN model,which innovatively improves upon U-KAN.Firstly,a residual network is introduced into the encoder to effectively mitigate gradient vanishing through cross-layer identity mappings,thus enhancing modelling capabilities for complex pathological structures.Secondly,Efficient Local Attention(ELA)is integrated to suppress spatial detail loss during downsampling,thereby improving the perception of edge structures and minute lesions.Experimental results on four public datasets demonstrate that RE-UKAN outperforms existing medical image segmentation methods across multiple evaluation metrics,with particularly outstanding performance on the TN-SCUI 2020 dataset,achieving IoU of 88.18%and Dice of 93.57%.Compared to the baseline model,it achieves improvements of 3.05%and 1.72%,respectively.These results fully demonstrate RE-UKAN’s superior detail retention capability and boundary recognition accuracy in complex medical image segmentation tasks,providing a reliable solution for clinical precision segmentation. 展开更多
关键词 Image segmentation U-KAN residual network ELA
在线阅读 下载PDF
Analysis of DC Aging Characteristics of Stable ZnO Varistors Based on Voronoi Network and Finite Element Simulation Model
10
作者 ZHANG Ping LU Mingtai +1 位作者 LU Tiantian YUE Yinghu 《材料导报》 北大核心 2026年第2期20-28,共9页
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i... In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors. 展开更多
关键词 ZnO varistors Voronoi network DC aging finite element method(FEM) current distribution double Schottky barrier theory
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
11
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
State Space Guided Spatio-Temporal Network for Efficient Long-Term Traffic Prediction
12
作者 Guangyu Huo Chang Su +2 位作者 Xiaoyu Zhang Xiaohui Cui Lizhong Zhang 《Computers, Materials & Continua》 2026年第2期1242-1264,共23页
Long-term traffic flow prediction is a crucial component of intelligent transportation systems within intelligent networks,requiring predictive models that balance accuracy with low-latency and lightweight computation... Long-term traffic flow prediction is a crucial component of intelligent transportation systems within intelligent networks,requiring predictive models that balance accuracy with low-latency and lightweight computation to optimize trafficmanagement and enhance urban mobility and sustainability.However,traditional predictivemodels struggle to capture long-term temporal dependencies and are computationally intensive,limiting their practicality in real-time.Moreover,many approaches overlook the periodic characteristics inherent in traffic data,further impacting performance.To address these challenges,we introduce ST-MambaGCN,a State-Space-Based Spatio-Temporal Graph Convolution Network.Unlike conventionalmodels,ST-MambaGCN replaces the temporal attention layer withMamba,a state-space model that efficiently captures long-term dependencies with near-linear computational complexity.The model combines Chebyshev polynomial-based graph convolutional networks(GCN)to explore spatial correlations.Additionally,we incorporate a multi-temporal feature capture mechanism,where the final integrated features are generated through the Hadamard product based on learnable parameters.This mechanism explicitly models shortterm,daily,and weekly traffic patterns to enhance the network’s awareness of traffic periodicity.Extensive experiments on the PeMS04 and PeMS08 datasets demonstrate that ST-MambaGCN significantly outperforms existing benchmarks,offering substantial improvements in both prediction accuracy and computational efficiency for long-term traffic flow prediction. 展开更多
关键词 State space model long-term traffic flow prediction graph convolutional network multi-time scale analysis emerging applications at intelligent networks
在线阅读 下载PDF
C-RAN Advanced:From a Network Cooperation Perspective
13
作者 Wang Xiaoyun Zhang Yutong +6 位作者 Wang Sen Sun Qi Wang Hanning Wang Qixing Jin Jing He Jiwei Li Nan 《China Communications》 2026年第2期195-210,共16页
Future mobile networks in the sixth generation(6G)are poised for a paradigm shift from conventional communication services toward comprehensive information services,driving the evolution of radio access network(RAN)ar... Future mobile networks in the sixth generation(6G)are poised for a paradigm shift from conventional communication services toward comprehensive information services,driving the evolution of radio access network(RAN)architectures toward enhanced cooperation,intelligence,and service orientation.Building upon the concept of centralized,collaborative,cloud,and clean RAN(C-RAN),this article proposes a novel cooperative,intelligent,and service-based RAN(CIS-RAN)architecture.Focusing on cooperation,CIS-RAN extends the traditional cooperative communication paradigm by further integrating cooperative sensing and cooperative artificial intelligence(AI).To improve both performance and effectiveness across diverse application scenarios,CIS-RAN enhances network cooperation throughout the entire process of acquisition,transmission,and processing,thereby enabling efficient information acquisition,diverse cooperative interactions,and intelligent fusion decision-making.Key technologies are discussed,with network cooperative multiple-input multiple-output(MIMO)examined as a case study,demonstrating superior performance over traditional architectures,as demonstrated by numerical results.Future research directions are outlined,emphasizing the continued exploration and advancement of the CIS-RAN architecture,particularly in enhancing network cooperation. 展开更多
关键词 CIS-RAN network cooperation RAN architecture 6G
在线阅读 下载PDF
Artificial Neural Network Model for Thermal Conductivity Estimation of Metal Oxide Water-Based Nanofluids
14
作者 Nikhil S.Mane Sheetal Kumar Dewangan +3 位作者 Sayantan Mukherjee Pradnyavati Mane Deepak Kumar Singh Ravindra Singh Saluja 《Computers, Materials & Continua》 2026年第1期316-331,共16页
The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a n... The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a necessary step before their practical application.As these investigations are time and resource-consuming undertakings,an effective prediction model can significantly improve the efficiency of research operations.In this work,an Artificial Neural Network(ANN)model is developed to predict the thermal conductivity of metal oxide water-based nanofluid.For this,a comprehensive set of 691 data points was collected from the literature.This dataset is split into training(70%),validation(15%),and testing(15%)and used to train the ANN model.The developed model is a backpropagation artificial neural network with a 4–12–1 architecture.The performance of the developed model shows high accuracy with R values above 0.90 and rapid convergence.It shows that the developed ANN model accurately predicts the thermal conductivity of nanofluids. 展开更多
关键词 Artificial neural networks nanofluids thermal conductivity PREDICTION
在线阅读 下载PDF
Network perspective on rumination and non-suicidal self-injury among adolescents with depressive disorders
15
作者 Fang-Fang Zhang Rui Guo +3 位作者 Si-Lan Chen Wei Yang Xing-Li Liang Ming-Fang Ma 《World Journal of Psychiatry》 2026年第1期346-355,共10页
BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes tha... BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes that may relate to NSSI through distinct psychological mechanisms.However,how these subtypes interact with specific NSSI behaviors remains unclear.AIM To examine associations between rumination subtypes and specific NSSI behaviors in adolescents.METHODS We conducted a cross-sectional study with 305 hospitalized adolescents diagnosed with depressive disorders.The subjects ranged from 12-18 years in age.Rumi-nation subtypes were assessed using the Ruminative Response Scale,and 12 NSSI behaviors were evaluated using a validated questionnaire.Network analysis was applied to explore symptom-level associations and identify central symptoms.RESULTS The network analysis revealed close connections between rumination subtypes and NSSI behaviors.Brooding was linked to behaviors such as hitting objects and burning.Scratching emerged as the most influential NSSI symptom.Symptomfocused rumination served as a key bridge connecting rumination and NSSI.CONCLUSION Symptom-focused rumination and scratching were identified as potential intervention targets.These findings highlight the psychological significance of specific cognitive-behavioral links in adolescent depression and suggest directions for tailored prevention and treatment.However,the cross-sectional,single-site design limits causal inference and generalizability.Future longitudinal and multi-center studies are needed to confirm causal pathways and verify the generalizability of the findings to broader adolescent populations. 展开更多
关键词 Depressive disorders Adolescents network analysis RUMINATION Non-suicidal self-injury
暂未订购
Recurrent MAPPO for Joint UAV Trajectory and Traffic Offloading in Space-Air-Ground Integrated Networks
16
作者 Zheyuan Jia Fenglin Jin +1 位作者 Jun Xie Yuan He 《Computers, Materials & Continua》 2026年第1期447-461,共15页
This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential g... This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs. 展开更多
关键词 Space-air-ground integrated networks UAV traffic offloading reinforcement learning
在线阅读 下载PDF
Defect Identification Method of Power Grid Secondary Equipment Based on Coordination of Knowledge Graph and Bayesian Network Fusion
17
作者 Jun Xiong Peng Yang +1 位作者 Bohan Chen Zeming Chen 《Energy Engineering》 2026年第1期296-313,共18页
The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermo... The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermoperation.The complex relationship between the defect phenomenon andmulti-layer causes and the probabilistic influence of secondary equipment cannot be described through knowledge extraction and fusion technology by existing methods,which limits the real-time and accuracy of defect identification.Therefore,a defect recognition method based on the Bayesian network and knowledge graph fusion is proposed.The defect data of secondary equipment is transformed into the structured knowledge graph through knowledge extraction and fusion technology.The knowledge graph of power grid secondary equipment is mapped to the Bayesian network framework,combined with historical defect data,and introduced Noisy-OR nodes.The prior and conditional probabilities of the Bayesian network are then reasonably assigned to build a model that reflects the probability dependence between defect phenomena and potential causes in power grid secondary equipment.Defect identification of power grid secondary equipment is achieved by defect subgraph search based on the knowledge graph,and defect inference based on the Bayesian network.Practical application cases prove this method’s effectiveness in identifying secondary equipment defect causes,improving identification accuracy and efficiency. 展开更多
关键词 Knowledge graph Bayesian network secondary equipment defect identification
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
18
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
MRFNet:A Progressive Residual Fusion Network for Blind Multiscale Image Deblurring
19
作者 Wang Zhang Haozhuo Cao Qiangqiang Yao 《Computers, Materials & Continua》 2026年第3期1851-1866,共16页
Recent advances in deep learning have significantly improved image deblurring;however,existing approaches still suffer from limited global context modeling,inadequate detail restoration,and poor texture or edge percep... Recent advances in deep learning have significantly improved image deblurring;however,existing approaches still suffer from limited global context modeling,inadequate detail restoration,and poor texture or edge perception,especially under complex dynamic blur.To address these challenges,we propose the Multi-Resolution Fusion Network(MRFNet),a blind multi-scale deblurring framework that integrates progressive residual connectivity for hierarchical feature fusion.The network employs a three-stage design:(1)TransformerBlocks capture long-range dependencies and reconstruct coarse global structures;(2)Nonlinear Activation Free Blocks(NAFBlocks)enhance local detail representation and mid-level feature fusion;and(3)an optimized residual subnetwork based on gated feature modulation refines texture and edge details for high-fidelity restoration.Extensive experiments demonstrate that MRFNet achieves superior performance compared to state-of-the-art methods.On GoPro,it attains 32.52 dB Peak Signal-to-Noise Ratio(PSNR)and 0.071 Learned Perceptual Image Patch Similarity(LPIPS),outperforming MIMOWNet(32.50 dB,0.075).On HIDE,it achieves 30.25 dB PSNR and 0.945 Structural Similarity Index Measure(SSIM),representing gains of+0.26 dB and+0.015 SSIM over MIMO-UNet(29.99 dB,0.930).On RealBlur-J,it reaches 28.82 dB PSNR and 0.872 SSIM,surpassing MIMO-UNet by+1.19 dB and+0.035 SSIM(27.63 dB,0.837).These results validate the effectiveness of the proposed progressive residual fusion and hybrid attention mechanisms in balancing global context understanding and local detail recovery for blind image deblurring. 展开更多
关键词 Blind deblurring progressive network multi-scale features residual structure
在线阅读 下载PDF
Investigating the potential mechanisms of Wenqing Yin against atopic dermatitis based on network pharmacology,experimental pharmacology,and molecular docking
20
作者 Yi Wang Zhen Liu +3 位作者 Si-Man Li Lin Lin Wei Dai Meng-Yue Ren 《Traditional Medicine Research》 2026年第2期1-11,共11页
Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY o... Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY on AD.Methods:The DNFB-induced mouse models of AD were established to investigate the therapeutic effects of WQY on AD.The symptoms of AD in the ears and backs of the mice were assessed,while inflammatory factors in the ear were quantified using quantitative real-time-polymerase chain reaction(qRT-PCR),and the percentages of CD4^(+)and CD8^(+)cells in the spleen were analyzed through flow cytometry.The compounds in WQY were identified using ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS)analysis and the key targets and pathways of WQY to treat AD were predicted by network pharmacology.Subsequently,the key genes were tested and verified by qRT-PCR,and the potential active components and target proteins were verified by molecular docking.Results:WQY relieved the AD symptoms and histopathological injuries in the ear and back skin of mice with AD.Meanwhile,WQY significantly reduced the levels of inflammatory factors IL-6 and IL-1βin ear tissue,as well as the ratio of CD4^(+)/CD8^(+)cells in spleen.Additionally,a total of 142 compounds were identified from the water extract of WQY by UPLC-Orbitrap-MS/MS.39 key targets related to AD were screened out by network pharmacology methods.The KEGG analysis indicated that the effects of WQY were primarily mediated through pathways associated with Toll-like receptor signaling and T cell receptor signaling.Moreover,the results of qRT-PCR demonstrated that WQY significantly reduced the mRNA expressions of IL-4,IL-10,GATA3 and FOXP3,and molecular docking simulation verified that the active components of WQY had excellent binding abilities with IL-4,IL-10,GATA3 and FOXP3 proteins.Conclusion:The present study demonstrated that WQY effectively relieved AD symptoms in mice,decreased the inflammatory factors levels,regulated the balance of CD4^(+)and CD8^(+)cells,and the mechanism may be associated with the suppression of Th2 and Treg cell immune responses. 展开更多
关键词 Wenqing Yin atopic dermatitis mouse model UPLC-Orbitrap-MS/MS network pharmacology
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部