期刊文献+
共找到558,074篇文章
< 1 2 250 >
每页显示 20 50 100
2022年云南红河M_(S)5.0地震震源参数测定
1
作者 李姣 姜金钟 +1 位作者 顾慧冬 叶泵 《地震研究》 北大核心 2026年第2期177-189,共13页
针对2022年云南红河M_(S)5.0地震震源深度测定结果存在显著差异的问题,基于云南地震台网记录的宽频带数字波形和区域一维速度模型,利用CAP方法反演了红河地震序列中M_(S)5.0和M_(S)3.5两次地震的震源机制解和最佳震源深度,然后采用sPL... 针对2022年云南红河M_(S)5.0地震震源深度测定结果存在显著差异的问题,基于云南地震台网记录的宽频带数字波形和区域一维速度模型,利用CAP方法反演了红河地震序列中M_(S)5.0和M_(S)3.5两次地震的震源机制解和最佳震源深度,然后采用sPL深度震相进一步测定其震源深度,最后综合震源深度、震源机制解和区域构造地质情况初步探讨了此次地震的发震机理。结果表明:2022年红河M_(S)5.0地震是以右旋走滑型为主、兼具少量逆冲分量的地震,最佳双力偶机制解为节面Ⅰ:33°/75°/18°,节面Ⅱ:298°/73°/164°,震源深度为3~4 km;M_(S)3.5地震最佳双力偶机制解为节面Ⅰ:31°/83°/7°,节面Ⅱ:300°/83°/173°,震源深度为7~8 km。综合此次M_(S)5.0主震震源深度较浅,以及红河断裂带南段断层构造相对北段较为简单等因素,初步分析认为是上地壳断层浅部区域应力积累导致M_(S)5.0主震的发生,主震后的应力调整导致了较深处的M_(S)3.5余震的发生,同时,由于震源区断层构造较为平直简单、应力积累区域较为集中,两次较大地震发生后余震很少。 展开更多
关键词 红河M_(S)5.0地震 震源深度 震源机制解 sPL震相 构造意义
在线阅读 下载PDF
探讨5.0 T MRI非增强3D-FLAIR序列对内耳内淋巴积水的诊断价值
2
作者 刘梦秋 刘影 +1 位作者 周裔翠 管锐瑞 《临床放射学杂志》 北大核心 2026年第4期596-600,共5页
目的评估5.0 T MRI非增强3D-FLAIR序列在内耳内淋巴积水诊断中的价值。方法前瞻性纳入临床确诊梅尼埃病的25例患者[男12例,女13例,平均年龄(57.42±12.66)岁],均接受5.0 T内耳磁共振钆造影检查。扫描序列包括:常规内耳MRI平扫(T1WI... 目的评估5.0 T MRI非增强3D-FLAIR序列在内耳内淋巴积水诊断中的价值。方法前瞻性纳入临床确诊梅尼埃病的25例患者[男12例,女13例,平均年龄(57.42±12.66)岁],均接受5.0 T内耳磁共振钆造影检查。扫描序列包括:常规内耳MRI平扫(T1WI轴位、T2WI抑脂轴位以及T2WI抑脂冠状位)、内耳水成像序列以及3D-FLAIR平扫检查;双倍剂量对比剂注射4 h后行增强3D-FLAIR和薄层T1WI脂肪抑制序列检查。由两名具有10年经验的头颈部放射科医师对非增强3D-FLAIR及增强3D-FLAIR序列进行独立阅片,对耳蜗、前庭有无内淋巴积水进行独立评判,如有分歧则通过协商达成一致。两种方法对内淋巴积水诊断的一致性检验采用McNemar精确检验。结果以增强3D-FLAIR序列的诊断结果为参考标准,25例患者均检出不同部位及程度的内淋巴积水,25例患者共50侧耳,其中19侧左耳存在耳蜗内淋巴积水,18侧右耳存在耳蜗内淋巴积水;9侧左前庭存在内淋巴积水,6侧右前庭存在内淋巴积水。15侧耳的前庭内淋巴积水均可在非增强3D-FLAIR观察到同样的影像表现,37侧耳蜗内淋巴积水,非增强序列可观察到34例。非增强3D-FLAIR对前庭积水的诊断一致性为100%,对耳蜗积水的诊断一致性为91.9%(34/37)。两种方法对内淋巴积水诊断的一致性检验差异无统计学意义。结论5.0 T非增强3D-FLAIR在内淋巴积水诊断中具有较高的准确性,可用于不能耐受增强检查的梅尼埃患者。 展开更多
关键词 5.0 T磁共振成像 内耳钆造影 梅尼埃病 内淋巴积水
原文传递
2025年2月5日新疆库车M_(S)5.0地震异常分析
3
作者 赵鹏毕 钱才 +1 位作者 向元 聂晓红 《内陆地震》 2026年第1期32-41,共10页
对2025年2月5日新疆库车M_(S)5.0地震震前出现的异常现象进行梳理和总结,发现震前存在2项测震学和3项定点地球物理观测异常,测震学异常主要有天山中段M_(S)≥3.0地震增强和M_(S)3.0~4.9地震增强区。震前前兆定点形变异常存在背景异常和... 对2025年2月5日新疆库车M_(S)5.0地震震前出现的异常现象进行梳理和总结,发现震前存在2项测震学和3项定点地球物理观测异常,测震学异常主要有天山中段M_(S)≥3.0地震增强和M_(S)3.0~4.9地震增强区。震前前兆定点形变异常存在背景异常和短期异常。背景异常为库尔勒水平摆,呈现出明显的趋势转折;短期异常:(1)库车钻孔倾斜EW分量自2024年12月12日出现大幅度加速E倾现象,2024年12月16日异常结束;(2)库尔勒垂直摆NS分量2025年1月1日出现S倾速率加速异常。通过对比2020年1月16日库车M_(S)5.6震前异常特征,定点形变异常项主要位于库尔勒地震台,两次地震震前都存在背景异常,中期和临震异常的空间演化呈现由近场向外围迁移的现象。进一步对比天山中段M_(S)≥5.0地震定点形变异常数量变化演化特征可以发现,中短期异常数量有明显集群性特征,发震前异常数量迅速增加或者迅速减少,与库车M_(S)5.0地震震前异常数量进程演化形态类似。 展开更多
关键词 库车M_(S)5.0地震 地震活动性 钻孔倾斜 异常特征
在线阅读 下载PDF
社会5.0背景下日本博士生教育改革的动因、内容与启示
4
作者 肖月 王梦怡 《黑龙江高教研究》 北大核心 2026年第1期110-116,共7页
日本是博士生教育改革的积极推动国之一,但其博士生教育仍然存在博士人才数量匮乏、博士就业形势低迷、博士人才创新活力不足等问题。随着日本为提升国际竞争力实施了“社会5.0”的国家战略,博士生教育的改革方向发生重大变化。2024年... 日本是博士生教育改革的积极推动国之一,但其博士生教育仍然存在博士人才数量匮乏、博士就业形势低迷、博士人才创新活力不足等问题。随着日本为提升国际竞争力实施了“社会5.0”的国家战略,博士生教育的改革方向发生重大变化。2024年日本在总结过去博士生教育改革政策经验的基础上,以服务日本“社会5.0”国家战略为指引,出台了新一期博士生教育改革政策《博士人才活跃计划》。通过梳理日本博士生教育的内外困境,以深入分析日本新一期博士生教育改革政策《博士人才活跃计划》为主要内容,为我国进一步深化博士生教育高质量发展提供借鉴参考。 展开更多
关键词 博士生教育 模式转型 社会5.0 博士人才活跃计划 日本
在线阅读 下载PDF
2009-2010年西南地区干旱影响下的陆面模式CLM5.0植被生长模拟评估
5
作者 邴嘉玮 王黎欢 吕雅琼 《高原气象》 北大核心 2026年第2期339-358,共20页
受全球变化影响,原本湿润的西南地区自21世纪以来干旱事件频发,已对区域内植被生长造成了不同程度的抑制,威胁西南生态屏障安全。本研究采用标准化降水蒸散指数分析了西南地区2001-2016年极端干旱事件的频率和特征,选择了持续时间最长... 受全球变化影响,原本湿润的西南地区自21世纪以来干旱事件频发,已对区域内植被生长造成了不同程度的抑制,威胁西南生态屏障安全。本研究采用标准化降水蒸散指数分析了西南地区2001-2016年极端干旱事件的频率和特征,选择了持续时间最长、影响范围最广的2009-2010年极端干旱事件,利用CLM5.0陆面过程模式(Community Land Model version 5.0)对2009-2010年极端干旱事件下植被生长进行数值模拟,并将模拟结果与三套遥感数据[Global Inventory Modeling and Mapping Studies(GIMMS),Global Land Surface Satellite(GLASS),Global Mapping(GLOBMAP)]进行对比验证CLM5.0对西南地区植被对干旱响应的模拟适用性。结果表明,2001-2016年,中国西南地区发生3例持续时间超过6个月的极端干旱事件,其中持续时间最长、最严重的干旱发生在2009-2010年。模拟发现在2009-2010年极端干旱期间,CLM5.0对植被与干旱的相关性、滞后响应、累积效应以及抵抗力和恢复力的模拟效果较好,植被对干旱的响应强度呈从东南向西北递减的特征,68.66%的区域植被对干旱表现出滞后响应,且滞后响应(78.02%)、累积效应(89.17%)与干旱均呈现较大面积的正相关,与多源遥感的描述有较高的一致性。在对不同植被类型的干旱抵抗力和恢复力的模拟方面,CLM5.0的模拟表现也较为出色,森林比灌木和草甸有更强的干旱抵抗力,且森林的干旱抵抗力和恢复力呈现明显的相反趋势。本研究使用CLM5.0模型模拟与多源遥感验证的方法,为理解西南地区植被对干旱的多方面响应提供了一个补充视角,有助于较全面地评估和预测西南干旱对植被活动的影响。 展开更多
关键词 CLM5.0 极端干旱 干旱响应 叶面积指数 总初级生产力
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
6
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
7
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
Underwater Image Enhancement Based on Depthwise Separable Convolution-Based Generative Adversarial Network
8
作者 ZENG Jun-yang SI Zhan-jun 《印刷与数字媒体技术研究》 北大核心 2026年第1期60-66,共7页
The existence of absorption and reflection of light underwater leads to problems such as color distortion and blue-green bias in underwater images.In this study,a depthwise separable convolution-based generative adver... The existence of absorption and reflection of light underwater leads to problems such as color distortion and blue-green bias in underwater images.In this study,a depthwise separable convolution-based generative adversarial network(GAN)algorithm was proposed.Taking GAN as the basic framework,it combined a depthwise separable convolution module,attention mechanism,and reconstructed convolution module to realize the enhancement of underwater degraded images.Multi-scale features were captured by the depthwise separable convolution module,and the attention mechanism was utilized to enhance attention to important features.The reconstructed convolution module further extracts and fuses local and global features.Experimental results showed that the algorithm performs well in improving the color bias and blurring of underwater images,with PSNR reaching 27.835,SSIM reaching 0.883,UIQM reaching 3.205,and UCIQE reaching 0.713.The enhanced image outperforms the comparison algorithm in both subjective and objective metrics. 展开更多
关键词 Underwater image enhancement Generating adversarial network Depthwise separable convolution
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
9
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Networked Predictive Control:A Survey
10
作者 Zhong-Hua Pang Tong Mu +3 位作者 Yi Yu Haibin Guo Guo-Ping Liu Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期3-20,共18页
Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induc... Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induced delays,packet dropouts,and packet disorders.Despite significant advancements,the increasing complexity and dynamism of network environments,along with the growing complexity of systems,pose new challenges for NPC.These challenges include difficulties in system modeling,cyber attacks,component faults,limited network bandwidth,and the necessity for distributed collaboration.This survey aims to provide a comprehensive review of NPC strategies.It begins with a summary of the primary challenges faced by NCSs,followed by an introduction to the control structure and core concepts of NPC.The survey then discusses several typical NPC schemes and examines their extensions in the areas of secure control,fault-tolerant control,distributed coordinated control,and event-triggered control.Moreover,it reviews notable works that have implemented these schemes.Finally,the survey concludes by exploring typical applications of NPC schemes and highlighting several challenging issues that could guide future research efforts. 展开更多
关键词 Communication constraints cyber attacks networked control systems networked multi-agent systems networked predictive control
在线阅读 下载PDF
Effects of Urbanization on Amphibian Predation Networks in Kunming
11
作者 Qisheng LI Pili WU +3 位作者 Yingzhi YAN Zhongping XIONG Yunfei MA Jielong ZHOU 《Asian Herpetological Research》 2026年第1期53-61,共9页
Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requiremen... Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requirements are complex.The present study investigated the effects of urbanization on amphibian predation networks in suburban Kunming in Yunnan,China and aimed to understand how predation network structure and stability vary with urbanization level.We constructed predation networks by analyzing the stomach contents of amphibians from 12d istinct urbanization gradients.We used the bipartite package in R to evaluate network robustness metrics such as modularity,nestedness,connectivity,and average shortest path length(ASPL).We found that urbanization level is negatively correlated with predation network connectivity(R=−0.67,Ρ=0.02),but there were no significant correlations between urbanization level and nestedness,modularity,or ASPL.Removal of the keystone species destabilized the predation networks at certain locations.The present work highlighted that maintaining prey quantity and diversity preserves predation network connectivity and stabilizes the overall network in urbanizing landscapes.It also underscored the critical role that keystone species play in sustaining network robustness.The results of this research provided insights into the ecological consequences of urbanization.They also suggested that conservation measures should protect the key species and habitats of amphibian predation networks and mitigate the negative impact of urban development on them. 展开更多
关键词 AMPHIBIAN network robustness predation network URBANIZATION
原文传递
Multi-responsive Hydrogel Featuring Synergistic Regulation of AIE and Mechanical Behaviors via Dynamic Hydrogen Bonding Network
12
作者 ZHANG Yangdaiyi SHAO Yan JIANG Shimei 《高等学校化学学报》 北大核心 2026年第4期141-152,共12页
A multi-stimuli-responsive hydrogel,P(VI-co-MAAC-NE),was successfully constructed by covalently integrating the aggregation-induced emission(AIE)moiety(Z)-N-(4-(1-cyano-2-(4-(diethylamino)phenyl)vinyl)-phenyl)methacry... A multi-stimuli-responsive hydrogel,P(VI-co-MAAC-NE),was successfully constructed by covalently integrating the aggregation-induced emission(AIE)moiety(Z)-N-(4-(1-cyano-2-(4-(diethylamino)phenyl)vinyl)-phenyl)methacrylamide(NE)into a dynamic hydrogen-bonding network composed of 1-vinylimidazole(VI)and methacrylic acid(MAAC)groups.The dense hydrogen-bonding network not only provides enhanced mechanical robustness,but also significantly enhances the AIE effect of NE by restricting its molecular motion.Under various external stimuli,the hydrogen bonds within the hydrogel network undergo reversible dissociation and reformation,thus enabling synergistic modulation of the hydrogel’s mechanical properties and luminescence behavior.Specifically,organic solvents disrupt the hydrogen-bonding network and the aggregation of the AIE moiety NE,resulting in macroscopic swelling and fluorescence quenching of the hydrogel.In strongly acidic conditions,protonation of NE molecules suppresses the intramolecular charge transfer(ICT)process,yielding a blue-shifted emission band accompanied by intense blue fluorescence;in highly alkaline environments,deprotonation of carboxyl groups induces hydrogel swelling and disperses NE aggregates,leading to pronounced fluorescence quenching.Moreover,the system exhibits thermally activated shape-memory behavior:heating above the glass transition temperature(T_(g):ca.62℃)softens the hydrogel to allow programmable reshaping,and subsequent hydrogen bond reformation at ambient conditions locks in the resultant geometries without sacrificing the hydrogel’s fluorescence performance.By capitalizing on these multi-stimuli-responsive characteristics and shape-memory behavior,the potential of hydrogel P(VI-co-MAAC-NE)for advanced information encryption and anti-counterfeiting applications is demonstrated.This work not only provides a versatile material platform for sensing and information storage,but also offers new insights into the design of intelligent soft materials integrating AIE features with dynamically regulated supramolecular network structures. 展开更多
关键词 Aggregation-induced emission(AIE) Multi-responsive hydrogel Mechanical properties Hydrogen bonds network
在线阅读 下载PDF
NetVerifier:Scalable Verification for Programmable Networks
13
作者 Ying Yao Le Tian +1 位作者 Yuxiang Hu Pengshuai Cui 《Computers, Materials & Continua》 2026年第5期1830-1848,共19页
In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their ... In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively. 展开更多
关键词 Programmable network network verification symbolic execution SCALABILITY
在线阅读 下载PDF
A multi-attention mechanism U-Net neural network for image correction of PbS quantum dot focal plane detectors
14
作者 WANG Han-Ting DI Yun-Xiang +10 位作者 QI Xing-Yu SHA Ying-Zhe WANG Ya-Hui YE Ling-Feng TANG Wei-Yi BA Kun WANG Xu-Dong HUANG Zhang-Cheng CHU Jun-Hao SHEN Hong WANG Jian-Lu 《红外与毫米波学报》 北大核心 2026年第1期148-156,共9页
Near-infrared image sensors are widely used in fields such as material identification,machine vision,and autonomous driving.Lead sulfide colloidal quantum dot-based infrared photodiodes can be integrated with sil⁃icon... Near-infrared image sensors are widely used in fields such as material identification,machine vision,and autonomous driving.Lead sulfide colloidal quantum dot-based infrared photodiodes can be integrated with sil⁃icon-based readout circuits in a single step.Based on this,we propose a photodiode based on an n-i-p structure,which removes the buffer layer and further simplifies the manufacturing process of quantum dot image sensors,thus reducing manufacturing costs.Additionally,for the noise complexity in quantum dot image sensors when capturing images,traditional denoising and non-uniformity methods often do not achieve optimal denoising re⁃sults.For the noise and stripe-type non-uniformity commonly encountered in infrared quantum dot detector imag⁃es,a network architecture has been developed that incorporates multiple key modules.This network combines channel attention and spatial attention mechanisms,dynamically adjusting the importance of feature maps to en⁃hance the ability to distinguish between noise and details.Meanwhile,the residual dense feature fusion module further improves the network's ability to process complex image structures through hierarchical feature extraction and fusion.Furthermore,the pyramid pooling module effectively captures information at different scales,improv⁃ing the network's multi-scale feature representation ability.Through the collaborative effect of these modules,the network can better handle various mixed noise and image non-uniformity issues.Experimental results show that it outperforms the traditional U-Net network in denoising and image correction tasks. 展开更多
关键词 PbS quantum dot focal plane detector convolutional neural networks image denoising U-Net
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
15
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
16
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
17
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
18
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Tensor Low-Rank Orthogonal Compression for Convolutional Neural Networks
19
作者 Yaping He Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期227-229,共3页
Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression... Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices. 展开更多
关键词 model compression convolutional neural network cnn which tensor low rank orthogonal compression deep neural network dnn models embedded devices convolutional neural networks
在线阅读 下载PDF
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks
20
作者 Daozhong Feng Jiajian Lai +1 位作者 Wenxuan Wei Bin Hao 《Digital Communications and Networks》 2026年第1期101-118,共18页
Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status.However,the presentation of the data lacks structural information.Existing single-netwo... Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status.However,the presentation of the data lacks structural information.Existing single-network description technologies are ineffective in representing the temporal and spatial characteristics simultaneously.Therefore,there is a need for complementary methods to address these deficiencies.To address these limitations,this paper proposes an approach that combines Network Snapshots and Temporal Paths for the scheduled system.A dual information network is constructed to assess the degree of operational deviation considering the planning tasks.To validate the effectiveness,discussions are conducted through a modified cosine similarity calculation on theoretical analysis,delay level description,and the ability to identify abnormal dates.Compared to some state-of-the-art methods,the proposed method achieves an average Spearman delay correlation of 0.847 and a relative distance of 3.477.Furthermore,case analyses are invested in regions of China's Mainland,Europe,and the United States,investigating both the overall and sub-regional network fluctuations.To represent the impact of network fluctuations in sub-regions,a response loss value was developed.The times that are prone to fluctuations are also discussed through the classification of time series data.The research can offer a novel approach to system monitoring,providing a research direction that utilizes individual data combined to represent macroscopic states.Our code will be released at https://github.com/daozhong/STPN.git. 展开更多
关键词 Intelligent transportation system Air traffic network Deviation measurement Spatial-temporal path networks Operational monitoring
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部