期刊文献+
共找到28,310篇文章
< 1 2 250 >
每页显示 20 50 100
可解释的轻量化无人机网络入侵检测方法
1
作者 王鹏 郭相科 +1 位作者 宋亚飞 王晓丹 《空军工程大学学报》 北大核心 2026年第1期106-116,共11页
针对无人机算力有限、存储空间小和实时性高的特点,提出一种基于Kolmogorov-Arnold Networks(KAN)的可解释的无人机网络入侵检测方法KIDS。受Kolmogorov-Arnold表示定理的启发,KAN利用样条参数化的单变量函数取代了传统的线性权重,从而... 针对无人机算力有限、存储空间小和实时性高的特点,提出一种基于Kolmogorov-Arnold Networks(KAN)的可解释的无人机网络入侵检测方法KIDS。受Kolmogorov-Arnold表示定理的启发,KAN利用样条参数化的单变量函数取代了传统的线性权重,从而动态地学习激活模式,能够有效提取流量序列数据特征并以更轻量化的网络结构实现优异的无人机网络入侵性能。此外,可视化参数化的样条函数能够进一步探索和解释模型在流量特征提取阶段的决策过程,从而增强模型应用的可信度。最后,在真实无人机网络流量数据集UAV-IDS-2020进行广泛实验。结果表明,KIDS以更低的模型复杂度实现了优异的检测性能,且在跨机型入侵检测任务中表现出显著的泛化性能。 展开更多
关键词 无人机网络入侵检测 Kolmogorov-Arnold Networks 可解释性 网络安全
在线阅读 下载PDF
基于空洞因果卷积的学生成绩预测及分析方法
2
作者 赖英旭 张亚薇 +1 位作者 庄俊玺 刘静 《北京工业大学学报》 北大核心 2026年第3期252-267,共16页
针对使用循环神经网络对学生长序列行为数据进行特征提取存在梯度消失或爆炸、长期依赖关系提取能力不足、深度学习模型缺乏可解释性等问题,提出一种面向长序列数据的空洞因果卷积(dilated causal convolution,DCC)成绩预测及分析方法... 针对使用循环神经网络对学生长序列行为数据进行特征提取存在梯度消失或爆炸、长期依赖关系提取能力不足、深度学习模型缺乏可解释性等问题,提出一种面向长序列数据的空洞因果卷积(dilated causal convolution,DCC)成绩预测及分析方法。首先,采用生成对抗网络(generative adversarial network,GAN)生成符合少数类学生原始行为数据分布规律的新样本,并将新样本加入学生数据集中以达到均衡数据集的目的;然后,提出一种基于DCC的成绩预测模型,DCC和门控循环单元(gated recurrent unit,GRU)相结合的结构提高了模型对长序列数据依赖关系的提取能力;最后,使用沙普利加性解释(Shapley additive explanations,SHAP)方法并结合三因素理论对影响学生成绩的因素进行重要性分析和解释。在公开数据集上的实验结果表明,在成绩预测任务中提出的方法与基线方法相比,加权F1分数提高了约6个百分点,并进一步验证了所提方法中关键模块的有效性和模型的泛化能力。此外,通过对比优秀学生和风险学生的学习特点发现,良好的学习习惯、课堂学习的主动性以及不同行为环境等因素会对学生成绩产生重要影响。 展开更多
关键词 学生成绩预测 空洞因果卷积(dilated causal convolution DCC) 不均衡数据 生成对抗网络(generative adversarial network GAN) 沙普利加性解释(Shapley additive explanations SHAP)方法 成绩影响因素分析
在线阅读 下载PDF
基于树形决策卷积神经网络的滚动轴承故障分层诊断
3
作者 杨旭 吴程飞 +1 位作者 黄健 赵鹰昊 《北京工业大学学报》 北大核心 2026年第1期64-74,共11页
针对传统滚动轴承故障诊断中故障层次信息利用不充分、诊断精度不足的问题,提出一种带有树形决策层的卷积神经网络(convolutional neural network,CNN)方法以实现故障位置与严重程度的逐层诊断。该模型同时具备CNN的特征提取能力和决策... 针对传统滚动轴承故障诊断中故障层次信息利用不充分、诊断精度不足的问题,提出一种带有树形决策层的卷积神经网络(convolutional neural network,CNN)方法以实现故障位置与严重程度的逐层诊断。该模型同时具备CNN的特征提取能力和决策树的层次结构及分层决策特性。首先,采用共享网络层和2个任务特定的分支全连接层分别提取与故障位置和故障严重程度有关的特征;然后,将2个全连接层的分类结果输入到树形决策层,并使用加权层次分类损失调整模型权重参数,从而实现模型对故障层次信息的自学习;最后,应用帕德博恩大学轴承数据集进行算法性能测试。实验结果表明,该模型的平均分类准确率可达99.15%,与领域内其他的诊断模型相比,实现了更准确的故障位置和严重性的分类。 展开更多
关键词 故障诊断 分层诊断 滚动轴承 卷积神经网络(convolutional neural network CNN) 决策树 集成模型
在线阅读 下载PDF
融合注意力增强CNN与Transformer的电网关键节点识别
4
作者 黎海涛 乔禄 +2 位作者 杨艳红 谢冬雪 高文浩 《北京工业大学学报》 北大核心 2026年第2期117-129,共13页
为了精确识别电网关键节点以保障电力系统的可靠运行,提出一种基于融合拓扑特征与电气特征的双重自注意力卷积神经网络(convolutional neural network,CNN)的电网关键节点识别方法。首先,构建包含节点的局部拓扑特征、半局部拓扑特征、... 为了精确识别电网关键节点以保障电力系统的可靠运行,提出一种基于融合拓扑特征与电气特征的双重自注意力卷积神经网络(convolutional neural network,CNN)的电网关键节点识别方法。首先,构建包含节点的局部拓扑特征、半局部拓扑特征、电气距离及节点电压的多维特征集;然后,利用压缩-激励(squeeze-and-excitation,SE)自注意力机制改进CNN以增强对节点特征的提取能力,并引入多头自注意力的Transformer编码器以实现拓扑特征与电气特征的深度融合。结果表明:在IEEE 30节点和IEEE 118节点的标准测试系统上,该方法识别关键节点的准确性更高,并且在节点影响力评估和网络鲁棒性方面,得到的电网关键节点对网络的影响更大,鲁棒性更好,为电网的安全稳定运行提供了有效的决策支持。 展开更多
关键词 复杂网络 电网 关键节点识别 卷积神经网络(convolutional neural network CNN) 注意力 特征融合
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
5
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
6
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
Molecular dataset based on paraffin oxidative pyrolysis
7
作者 YANG Lin YANG Yanfang LU Kuan 《燃料化学学报(中英文)》 北大核心 2026年第3期180-186,共7页
As a key component of shale oil,petroleum fractions,and chemical products,the oxidative pyrolysis behavior of paraffin directly influences energy conversion efficiency and the direction of process optimization.A deep ... As a key component of shale oil,petroleum fractions,and chemical products,the oxidative pyrolysis behavior of paraffin directly influences energy conversion efficiency and the direction of process optimization.A deep understanding of its oxidative pyrolysis mechanism is crucial for addressing wax deposition in oil and gas extraction,enhancing product selectivity in cracking processes,and advancing novel clean fuel technologies.Traditional experimental methods face challenges in capturing transient free-radical reaction pathways at high temperatures,whereas molecular dynamics simulations offer a powerful approach to bridge the research gap in elucidating atomic-scale dynamic mechanisms.This database is constructed based on high-precision molecular dynamics simulations,comprising oxidative pyrolysis trajectory data for three paraffin models featuring different straight-chain hydrocarbon distributions within the temperature range of 2100-2500 K.The COMPASS force field was employed to optimize the initial structures,and the ReaxFF reactive force field was used to simulate the oxidative pyrolysis process.The database includes atomic trajectories,species evolution information,and reaction network analysis results for both heating and isothermal cracking processes,with a total data volume of approximately 141 GB(including 150000 atomic configuration frames).The data is stored in a hierarchical directory structure,supporting multi-scale oxidative pyrolysis mechanism studies and providing atomic-scale dynamic evidence for revealing carbon chain length effects and temperature sensitivity. 展开更多
关键词 paraffin oxidative pyrolysis molecular dynamics ReaxFF force field reaction network
在线阅读 下载PDF
Intelligent Parameter Decision-Making and Multi-objective Prediction for Multi-layer and Multi-pass LDED Process
8
作者 Li Yaguan Nie Zhenguo +2 位作者 Li Huilin Wang Tao Huang Qingxue 《稀有金属材料与工程》 北大核心 2026年第1期47-58,共12页
The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical m... The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical model height.The Taguchi method was employed to establish the correlations between process parameter combinations and multi-objective characterization of metal deposition morphology(height error and roughness).Results show that using the signal-to-noise ratio and grey relational analysis,the optimal parameter combination for multi-layer and multi-pass deposition is determined as follows:laser power of 800 W,powder feeding rate of 0.3 r/min,step distance of 1.6 mm,and scanning speed of 20 mm/s.Subsequently,a Genetic Bayesian-back propagation(GB-BP)network is constructed to predict multi-objective responses.Compared with the traditional back propagation network,the GB-back propagation network improves the prediction accuracy of height error and surface roughness by 43.14%and 71.43%,respectively.This network can accurately predict the multi-objective characterization of morphological quality of multi-layer and multi-pass metal deposited parts. 展开更多
关键词 multi-layer and multi-pass laser cladding Taguchi method grey relational analysis GB-BP network
原文传递
Analysis of DC Aging Characteristics of Stable ZnO Varistors Based on Voronoi Network and Finite Element Simulation Model
9
作者 ZHANG Ping LU Mingtai +1 位作者 LU Tiantian YUE Yinghu 《材料导报》 北大核心 2026年第2期20-28,共9页
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i... In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors. 展开更多
关键词 ZnO varistors Voronoi network DC aging finite element method(FEM) current distribution double Schottky barrier theory
在线阅读 下载PDF
Intervention effect and mechanism of Compound Herba Gueldenstaedtiae in a mouse model of breast hyperplasia
10
作者 Wu Yilin Tian Hongying +8 位作者 Sun Jiale Jiao Jiajia Zhao Zihan Shao Jinhuan Zhao Kaiyue Zhou Min Li Qian Li Zexin Yue Changwu 《中国组织工程研究》 北大核心 2026年第17期4377-4389,共13页
BACKGROUND:Breast hyperplasia is a common benign breast disease mainly caused by endocrine disorders,manifested as abnormal hyperplasia of breast tissue.In recent years,traditional Chinese medicine compounds and probi... BACKGROUND:Breast hyperplasia is a common benign breast disease mainly caused by endocrine disorders,manifested as abnormal hyperplasia of breast tissue.In recent years,traditional Chinese medicine compounds and probiotics have shown good potential in regulating the endocrine system and improving the intestinal microecology,providing new ideas for the treatment of breast hyperplasia.OBJECTIVE:To explore the effects and mechanisms of traditional Chinese medicine compounds and fermented probiotic compounds on breast hyperplasia in mice,providing new theoretical and experimental bases for the clinical treatment and prevention of breast hyperplasia.METHODS:(1)Network pharmacology tools were used to predict the anti-breast-hyperplasia activity of Herba Gueldenstaedtiae(Euphorbia humifusa),as well as its potential targets and signaling pathways.The databases included:TCMSP,OMIM,GeneCards database,UniProt website,Venny2.1.0 website,Metascape,HERB website,and STRING database,all of which are open-access databases.Network pharmacology can predict and screen key information such as the targets corresponding to the active ingredients of traditional Chinese medicine,disease targets,and action pathways through network analysis and computer-system analysis.Therefore,it has been increasingly widely used in the research of traditional Chinese medicine.(2)A breast hyperplasia model was induced in mice by injecting estrogen and progesterone.Mice in the normal blank group were injected intraperitoneally with normal saline every day.Mice in the model group and drugadministration groups were injected intraperitoneally with estradiol benzoate injection at a concentration of 0.5 mg/kg every day for 25 days.From the 26th day,the injection of estradiol benzoate injection was stopped.Mice in the normal blank group were injected intramuscularly with normal saline every day,and mice in the model group and drug-administration groups were injected intramuscularly with progesterone injection at a concentration of 5 mg/kg for 5 days.After the model was established,each group was given drugs respectively.The normal blank group and the model group were gavaged with 0.2 mL/d of normal saline;the positive blank group(Xiaozheng Pill group)was gavaged with an aqueous solution of Xiaozheng Pill at 0.9 mg/g;the low-,medium-and high-dose groups of Compound Herba Gueldenstaedtiae were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively;the low-,medium-and high-dose groups of traditional Chinese medicine-bacteria fermentation were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively.The administration was continuous for 30 days.RESULTS AND CONCLUSION:(1)The results of network pharmacology research showed that the Compound Herba Gueldenstaedtiae(Euphorbia humifusa)contained 46 active ingredients,which were related to 1213 potential targets.After comparison with 588 known breast-hyperplasia targets,it was speculated that 50 of these targets might be related to the direct effect of the compound on breast hyperplasia.(2)After drug intervention,there was no significant change in the high-dose group of Compound Herba Gueldenstaedtiae compared with the normal blank group.The liver indicators of the other intervention groups all significantly decreased(P<0.05).(3)In terms of kidney and uterine indicators,the medium-dose group of Compound Herba Gueldenstaedtiae decreased significantly compared with the normal blank group(P<0.05).In terms of the uterine index,the model group increased significantly compared with the normal blank group(P<0.01).(4)After 1-month drug treatment,the number of lobules and acini in the breast tissue of the Xiaozheng Pill group,the low,medium,and high-dose group of Compound Herba Gueldenstaedtiae,the low,medium,and highdose groups of traditional Chinese medicine-bacteria fermentation decreased,and the duct openings narrowed.With the increase of drug dose,diffuse hyperplasia of breast tissue was significantly improved.(5)The ELISA results showed that compared with the model group,the estrogen level was lower in the medium-dose group of traditional Chinese medicine-bacteria fermentation after the intervention(P<0.05).In addition,the follicle-stimulating hormone level in the low-dose group of Compound Herba Gueldenstaedtiae was lower than that of the model group(P<0.05).(6)The intervention in the mouse model led to changes in the abundance of short chain fatty acids and intestinal flora in all groups.To conclude,the Compound Herba Gueldenstaedtiae and its probiotic fermentation products significantly improved mammary gland hyperplasia in mice by regulating hormone levels,improving the structure of the gut microbiota,and increasing the content of shortchain fatty acids,providing new ideas and potential sources of drugs for the treatment of breast hyperplasia. 展开更多
关键词 Herba Gueldenstaedtiae traditional Chinese medicine compound mice with breast hyperplasia microbial fermentation gut microbiota network pharmacology short-chain fatty acids hormone levels inflammatory response endocrine disorders
暂未订购
基于深度学习的水果智能分拣系统设计与实现
11
作者 刘兴伟 张涛涛 +2 位作者 张文辉 李学斌 王宗奇 《数学的实践与认识》 北大核心 2026年第1期252-262,共11页
针对果实分拣中存在识别精度低、耗时长等问题,设计实现了一种基于深度学习的智能水果分拣系统.首先,该系统采用残差网络(Residual network,ResNet)模型,通过引入动态残差门控机制优化梯度传播有效解决了深层网络训练中的梯度消失和爆... 针对果实分拣中存在识别精度低、耗时长等问题,设计实现了一种基于深度学习的智能水果分拣系统.首先,该系统采用残差网络(Residual network,ResNet)模型,通过引入动态残差门控机制优化梯度传播有效解决了深层网络训练中的梯度消失和爆炸问题,使得网络能够通过跳跃连接学习到更有效的特征表示;其次,对ResNet-18模型进行了轻量化设计,利用交叉熵损失函数(CrossEntropy loss,CELoss)和Adam优化器(Adaptive moment estimation,Adam)来进行模型的训练;最后,对数据集peach-split进行实验分析,结果表明构建的智能分拣系统对提高水果分拣精度研究具有一定的实用价值. 展开更多
关键词 深度学习 ResNet-18模型 卷积神经网络(Convolutional neural network CNN) 水果分拣 轻量化模型
原文传递
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
12
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Intrusion Detection Systems in Industrial Control Systems:Landscape,Challenges and Opportunities
13
作者 Tong Wu Dawei Zhou +1 位作者 Qingyu Ou Fang Luo 《Computers, Materials & Continua》 2026年第3期162-200,共39页
The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has dri... The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations. 展开更多
关键词 Industrial control system industrial control system network security intrusion detection cyberspace security ICS network network security
在线阅读 下载PDF
The Missing Data Recovery Method Based on Improved GAN
14
作者 Su Zhang Song Deng Qingsheng Liu 《Computers, Materials & Continua》 2026年第4期1111-1128,共18页
Accurate and reliable power system data are fundamental for critical operations such as gridmonitoring,fault diagnosis,and load forecasting,underpinned by increasing intelligentization and digitalization.However,data ... Accurate and reliable power system data are fundamental for critical operations such as gridmonitoring,fault diagnosis,and load forecasting,underpinned by increasing intelligentization and digitalization.However,data loss and anomalies frequently compromise data integrity in practical settings,significantly impacting system operational efficiency and security.Most existing data recovery methods require complete datasets for training,leading to substantial data and computational demands and limited generalization.To address these limitations,this study proposes a missing data imputation model based on an improved Generative Adversarial Network(BAC-GAN).Within the BAC-GAN framework,the generator utilizes Bidirectional Long Short-Term Memory(BiLSTM)networks and Multi-Head Attention mechanisms to capture temporal dependencies and complex relationships within power system data.The discriminator employs a Convolutional Neural Network(CNN)architecture to integrate local features with global structures,effectivelymitigating the generation of implausible imputations.Experimental results on two public datasets demonstrate that the BAC-GAN model achieves superior data recovery accuracy compared to five state-of-the-art and classical benchmarkmethods,with an average improvement of 17.7%in reconstruction accuracy.The proposedmethod significantly enhances the accuracy of grid fault diagnosis and provides reliable data support for the stable operation of smart grids,showing great potential for practical applications in power systems. 展开更多
关键词 Power system data recovery generative adversarial network bidirectional long short-term memory network multi-head attention mechanism convolutional neural network
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
15
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
GNN:Core Branches,Integration Strategies and Applications
16
作者 Wenfeng Zheng Guangyu Xu +3 位作者 SiyuLu Junmin Lyu Feng Bao Lirong Yin 《Computer Modeling in Engineering & Sciences》 2026年第1期156-190,共35页
Graph Neural Networks(GNNs),as a deep learning framework specifically designed for graph-structured data,have achieved deep representation learning of graph data through message passing mechanisms and have become a co... Graph Neural Networks(GNNs),as a deep learning framework specifically designed for graph-structured data,have achieved deep representation learning of graph data through message passing mechanisms and have become a core technology in the field of graph analysis.However,current reviews on GNN models are mainly focused on smaller domains,and there is a lack of systematic reviews on the classification and applications of GNN models.This review systematically synthesizes the three canonical branches of GNN,Graph Convolutional Network(GCN),Graph Attention Network(GAT),and Graph Sampling Aggregation Network(GraphSAGE),and analyzes their integration pathways from both structural and feature perspectives.Drawing on representative studies,we identify three major integration patterns:cascaded fusion,where heterogeneous modules such as Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and GraphSAGE are sequentially combined for hierarchical feature learning;parallel fusion,where multi-branch architectures jointly encode complementary graph features;and feature-level fusion,which employs concatenation,weighted summation,or attention-based gating to adaptively merge multi-source embeddings.Through these patterns,integrated GNNs achieve enhanced expressiveness,robustness,and scalability across domains including transportation,biomedicine,and cybersecurity. 展开更多
关键词 Graph neural network(GNN) Graph convolutional network(GCN) Graph attention network(GAT) Graph sampling aggregation network(GraphSAGE) integration
在线阅读 下载PDF
Graph-Based Intrusion Detection with Explainable Edge Classification Learning
17
作者 Jaeho Shin Jaekwang Kim 《Computers, Materials & Continua》 2026年第1期610-635,共26页
Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to ... Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to changing attack patterns and complex network environments.In addition,it is difficult to explain the detection results logically using artificial intelligence.We propose a method for classifying network attacks using graph models to explain the detection results.First,we reconstruct the network packet data into a graphical structure.We then use a graph model to predict network attacks using edge classification.To explain the prediction results,we observed numerical changes by randomly masking and calculating the importance of neighbors,allowing us to extract significant subgraphs.Our experiments on six public datasets demonstrate superior performance with an average F1-score of 0.960 and accuracy of 0.964,outperforming traditional machine learning and other graph models.The visual representation of the extracted subgraphs highlights the neighboring nodes that have the greatest impact on the results,thus explaining detection.In conclusion,this study demonstrates that graph-based models are suitable for network attack detection in complex environments,and the importance of graph neighbors can be calculated to efficiently analyze the results.This approach can contribute to real-world network security analyses and provide a new direction in the field. 展开更多
关键词 Intrusion detection graph neural network explainable AI network attacks GraphSAGE
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
18
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
19
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部