Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin...Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks.展开更多
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a...To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application.展开更多
As a key component of shale oil,petroleum fractions,and chemical products,the oxidative pyrolysis behavior of paraffin directly influences energy conversion efficiency and the direction of process optimization.A deep ...As a key component of shale oil,petroleum fractions,and chemical products,the oxidative pyrolysis behavior of paraffin directly influences energy conversion efficiency and the direction of process optimization.A deep understanding of its oxidative pyrolysis mechanism is crucial for addressing wax deposition in oil and gas extraction,enhancing product selectivity in cracking processes,and advancing novel clean fuel technologies.Traditional experimental methods face challenges in capturing transient free-radical reaction pathways at high temperatures,whereas molecular dynamics simulations offer a powerful approach to bridge the research gap in elucidating atomic-scale dynamic mechanisms.This database is constructed based on high-precision molecular dynamics simulations,comprising oxidative pyrolysis trajectory data for three paraffin models featuring different straight-chain hydrocarbon distributions within the temperature range of 2100-2500 K.The COMPASS force field was employed to optimize the initial structures,and the ReaxFF reactive force field was used to simulate the oxidative pyrolysis process.The database includes atomic trajectories,species evolution information,and reaction network analysis results for both heating and isothermal cracking processes,with a total data volume of approximately 141 GB(including 150000 atomic configuration frames).The data is stored in a hierarchical directory structure,supporting multi-scale oxidative pyrolysis mechanism studies and providing atomic-scale dynamic evidence for revealing carbon chain length effects and temperature sensitivity.展开更多
The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical m...The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical model height.The Taguchi method was employed to establish the correlations between process parameter combinations and multi-objective characterization of metal deposition morphology(height error and roughness).Results show that using the signal-to-noise ratio and grey relational analysis,the optimal parameter combination for multi-layer and multi-pass deposition is determined as follows:laser power of 800 W,powder feeding rate of 0.3 r/min,step distance of 1.6 mm,and scanning speed of 20 mm/s.Subsequently,a Genetic Bayesian-back propagation(GB-BP)network is constructed to predict multi-objective responses.Compared with the traditional back propagation network,the GB-back propagation network improves the prediction accuracy of height error and surface roughness by 43.14%and 71.43%,respectively.This network can accurately predict the multi-objective characterization of morphological quality of multi-layer and multi-pass metal deposited parts.展开更多
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i...In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.展开更多
BACKGROUND:Breast hyperplasia is a common benign breast disease mainly caused by endocrine disorders,manifested as abnormal hyperplasia of breast tissue.In recent years,traditional Chinese medicine compounds and probi...BACKGROUND:Breast hyperplasia is a common benign breast disease mainly caused by endocrine disorders,manifested as abnormal hyperplasia of breast tissue.In recent years,traditional Chinese medicine compounds and probiotics have shown good potential in regulating the endocrine system and improving the intestinal microecology,providing new ideas for the treatment of breast hyperplasia.OBJECTIVE:To explore the effects and mechanisms of traditional Chinese medicine compounds and fermented probiotic compounds on breast hyperplasia in mice,providing new theoretical and experimental bases for the clinical treatment and prevention of breast hyperplasia.METHODS:(1)Network pharmacology tools were used to predict the anti-breast-hyperplasia activity of Herba Gueldenstaedtiae(Euphorbia humifusa),as well as its potential targets and signaling pathways.The databases included:TCMSP,OMIM,GeneCards database,UniProt website,Venny2.1.0 website,Metascape,HERB website,and STRING database,all of which are open-access databases.Network pharmacology can predict and screen key information such as the targets corresponding to the active ingredients of traditional Chinese medicine,disease targets,and action pathways through network analysis and computer-system analysis.Therefore,it has been increasingly widely used in the research of traditional Chinese medicine.(2)A breast hyperplasia model was induced in mice by injecting estrogen and progesterone.Mice in the normal blank group were injected intraperitoneally with normal saline every day.Mice in the model group and drugadministration groups were injected intraperitoneally with estradiol benzoate injection at a concentration of 0.5 mg/kg every day for 25 days.From the 26th day,the injection of estradiol benzoate injection was stopped.Mice in the normal blank group were injected intramuscularly with normal saline every day,and mice in the model group and drug-administration groups were injected intramuscularly with progesterone injection at a concentration of 5 mg/kg for 5 days.After the model was established,each group was given drugs respectively.The normal blank group and the model group were gavaged with 0.2 mL/d of normal saline;the positive blank group(Xiaozheng Pill group)was gavaged with an aqueous solution of Xiaozheng Pill at 0.9 mg/g;the low-,medium-and high-dose groups of Compound Herba Gueldenstaedtiae were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively;the low-,medium-and high-dose groups of traditional Chinese medicine-bacteria fermentation were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively.The administration was continuous for 30 days.RESULTS AND CONCLUSION:(1)The results of network pharmacology research showed that the Compound Herba Gueldenstaedtiae(Euphorbia humifusa)contained 46 active ingredients,which were related to 1213 potential targets.After comparison with 588 known breast-hyperplasia targets,it was speculated that 50 of these targets might be related to the direct effect of the compound on breast hyperplasia.(2)After drug intervention,there was no significant change in the high-dose group of Compound Herba Gueldenstaedtiae compared with the normal blank group.The liver indicators of the other intervention groups all significantly decreased(P<0.05).(3)In terms of kidney and uterine indicators,the medium-dose group of Compound Herba Gueldenstaedtiae decreased significantly compared with the normal blank group(P<0.05).In terms of the uterine index,the model group increased significantly compared with the normal blank group(P<0.01).(4)After 1-month drug treatment,the number of lobules and acini in the breast tissue of the Xiaozheng Pill group,the low,medium,and high-dose group of Compound Herba Gueldenstaedtiae,the low,medium,and highdose groups of traditional Chinese medicine-bacteria fermentation decreased,and the duct openings narrowed.With the increase of drug dose,diffuse hyperplasia of breast tissue was significantly improved.(5)The ELISA results showed that compared with the model group,the estrogen level was lower in the medium-dose group of traditional Chinese medicine-bacteria fermentation after the intervention(P<0.05).In addition,the follicle-stimulating hormone level in the low-dose group of Compound Herba Gueldenstaedtiae was lower than that of the model group(P<0.05).(6)The intervention in the mouse model led to changes in the abundance of short chain fatty acids and intestinal flora in all groups.To conclude,the Compound Herba Gueldenstaedtiae and its probiotic fermentation products significantly improved mammary gland hyperplasia in mice by regulating hormone levels,improving the structure of the gut microbiota,and increasing the content of shortchain fatty acids,providing new ideas and potential sources of drugs for the treatment of breast hyperplasia.展开更多
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t...Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.展开更多
The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has dri...The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations.展开更多
Accurate and reliable power system data are fundamental for critical operations such as gridmonitoring,fault diagnosis,and load forecasting,underpinned by increasing intelligentization and digitalization.However,data ...Accurate and reliable power system data are fundamental for critical operations such as gridmonitoring,fault diagnosis,and load forecasting,underpinned by increasing intelligentization and digitalization.However,data loss and anomalies frequently compromise data integrity in practical settings,significantly impacting system operational efficiency and security.Most existing data recovery methods require complete datasets for training,leading to substantial data and computational demands and limited generalization.To address these limitations,this study proposes a missing data imputation model based on an improved Generative Adversarial Network(BAC-GAN).Within the BAC-GAN framework,the generator utilizes Bidirectional Long Short-Term Memory(BiLSTM)networks and Multi-Head Attention mechanisms to capture temporal dependencies and complex relationships within power system data.The discriminator employs a Convolutional Neural Network(CNN)architecture to integrate local features with global structures,effectivelymitigating the generation of implausible imputations.Experimental results on two public datasets demonstrate that the BAC-GAN model achieves superior data recovery accuracy compared to five state-of-the-art and classical benchmarkmethods,with an average improvement of 17.7%in reconstruction accuracy.The proposedmethod significantly enhances the accuracy of grid fault diagnosis and provides reliable data support for the stable operation of smart grids,showing great potential for practical applications in power systems.展开更多
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so...Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.展开更多
Graph Neural Networks(GNNs),as a deep learning framework specifically designed for graph-structured data,have achieved deep representation learning of graph data through message passing mechanisms and have become a co...Graph Neural Networks(GNNs),as a deep learning framework specifically designed for graph-structured data,have achieved deep representation learning of graph data through message passing mechanisms and have become a core technology in the field of graph analysis.However,current reviews on GNN models are mainly focused on smaller domains,and there is a lack of systematic reviews on the classification and applications of GNN models.This review systematically synthesizes the three canonical branches of GNN,Graph Convolutional Network(GCN),Graph Attention Network(GAT),and Graph Sampling Aggregation Network(GraphSAGE),and analyzes their integration pathways from both structural and feature perspectives.Drawing on representative studies,we identify three major integration patterns:cascaded fusion,where heterogeneous modules such as Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and GraphSAGE are sequentially combined for hierarchical feature learning;parallel fusion,where multi-branch architectures jointly encode complementary graph features;and feature-level fusion,which employs concatenation,weighted summation,or attention-based gating to adaptively merge multi-source embeddings.Through these patterns,integrated GNNs achieve enhanced expressiveness,robustness,and scalability across domains including transportation,biomedicine,and cybersecurity.展开更多
Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to ...Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to changing attack patterns and complex network environments.In addition,it is difficult to explain the detection results logically using artificial intelligence.We propose a method for classifying network attacks using graph models to explain the detection results.First,we reconstruct the network packet data into a graphical structure.We then use a graph model to predict network attacks using edge classification.To explain the prediction results,we observed numerical changes by randomly masking and calculating the importance of neighbors,allowing us to extract significant subgraphs.Our experiments on six public datasets demonstrate superior performance with an average F1-score of 0.960 and accuracy of 0.964,outperforming traditional machine learning and other graph models.The visual representation of the extracted subgraphs highlights the neighboring nodes that have the greatest impact on the results,thus explaining detection.In conclusion,this study demonstrates that graph-based models are suitable for network attack detection in complex environments,and the importance of graph neighbors can be calculated to efficiently analyze the results.This approach can contribute to real-world network security analyses and provide a new direction in the field.展开更多
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h...In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.展开更多
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener...The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.展开更多
文摘Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks.
文摘To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application.
基金Supported by Natural Science Foundation of Shanxi Province (202203021221219)Research on the Construction of Scientific and Technological Innovation Think Tank of Shanxi Association for Science and Technology (KXKT202542)Planning Project under Commerce Statistical Society of China (2025STY122)。
文摘As a key component of shale oil,petroleum fractions,and chemical products,the oxidative pyrolysis behavior of paraffin directly influences energy conversion efficiency and the direction of process optimization.A deep understanding of its oxidative pyrolysis mechanism is crucial for addressing wax deposition in oil and gas extraction,enhancing product selectivity in cracking processes,and advancing novel clean fuel technologies.Traditional experimental methods face challenges in capturing transient free-radical reaction pathways at high temperatures,whereas molecular dynamics simulations offer a powerful approach to bridge the research gap in elucidating atomic-scale dynamic mechanisms.This database is constructed based on high-precision molecular dynamics simulations,comprising oxidative pyrolysis trajectory data for three paraffin models featuring different straight-chain hydrocarbon distributions within the temperature range of 2100-2500 K.The COMPASS force field was employed to optimize the initial structures,and the ReaxFF reactive force field was used to simulate the oxidative pyrolysis process.The database includes atomic trajectories,species evolution information,and reaction network analysis results for both heating and isothermal cracking processes,with a total data volume of approximately 141 GB(including 150000 atomic configuration frames).The data is stored in a hierarchical directory structure,supporting multi-scale oxidative pyrolysis mechanism studies and providing atomic-scale dynamic evidence for revealing carbon chain length effects and temperature sensitivity.
基金National Natural Science Foundation of China(52175237)。
文摘The key parameters that characterize the morphological quality of multi-layer and multi-pass metal laser deposited parts are the surface roughness and the error between the actual printing height and the theoretical model height.The Taguchi method was employed to establish the correlations between process parameter combinations and multi-objective characterization of metal deposition morphology(height error and roughness).Results show that using the signal-to-noise ratio and grey relational analysis,the optimal parameter combination for multi-layer and multi-pass deposition is determined as follows:laser power of 800 W,powder feeding rate of 0.3 r/min,step distance of 1.6 mm,and scanning speed of 20 mm/s.Subsequently,a Genetic Bayesian-back propagation(GB-BP)network is constructed to predict multi-objective responses.Compared with the traditional back propagation network,the GB-back propagation network improves the prediction accuracy of height error and surface roughness by 43.14%and 71.43%,respectively.This network can accurately predict the multi-objective characterization of morphological quality of multi-layer and multi-pass metal deposited parts.
文摘In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.
文摘BACKGROUND:Breast hyperplasia is a common benign breast disease mainly caused by endocrine disorders,manifested as abnormal hyperplasia of breast tissue.In recent years,traditional Chinese medicine compounds and probiotics have shown good potential in regulating the endocrine system and improving the intestinal microecology,providing new ideas for the treatment of breast hyperplasia.OBJECTIVE:To explore the effects and mechanisms of traditional Chinese medicine compounds and fermented probiotic compounds on breast hyperplasia in mice,providing new theoretical and experimental bases for the clinical treatment and prevention of breast hyperplasia.METHODS:(1)Network pharmacology tools were used to predict the anti-breast-hyperplasia activity of Herba Gueldenstaedtiae(Euphorbia humifusa),as well as its potential targets and signaling pathways.The databases included:TCMSP,OMIM,GeneCards database,UniProt website,Venny2.1.0 website,Metascape,HERB website,and STRING database,all of which are open-access databases.Network pharmacology can predict and screen key information such as the targets corresponding to the active ingredients of traditional Chinese medicine,disease targets,and action pathways through network analysis and computer-system analysis.Therefore,it has been increasingly widely used in the research of traditional Chinese medicine.(2)A breast hyperplasia model was induced in mice by injecting estrogen and progesterone.Mice in the normal blank group were injected intraperitoneally with normal saline every day.Mice in the model group and drugadministration groups were injected intraperitoneally with estradiol benzoate injection at a concentration of 0.5 mg/kg every day for 25 days.From the 26th day,the injection of estradiol benzoate injection was stopped.Mice in the normal blank group were injected intramuscularly with normal saline every day,and mice in the model group and drug-administration groups were injected intramuscularly with progesterone injection at a concentration of 5 mg/kg for 5 days.After the model was established,each group was given drugs respectively.The normal blank group and the model group were gavaged with 0.2 mL/d of normal saline;the positive blank group(Xiaozheng Pill group)was gavaged with an aqueous solution of Xiaozheng Pill at 0.9 mg/g;the low-,medium-and high-dose groups of Compound Herba Gueldenstaedtiae were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively;the low-,medium-and high-dose groups of traditional Chinese medicine-bacteria fermentation were gavaged with an aqueous solution of the compound medicine at 0.75,1.5,and 3.0 mg/(g·d)respectively.The administration was continuous for 30 days.RESULTS AND CONCLUSION:(1)The results of network pharmacology research showed that the Compound Herba Gueldenstaedtiae(Euphorbia humifusa)contained 46 active ingredients,which were related to 1213 potential targets.After comparison with 588 known breast-hyperplasia targets,it was speculated that 50 of these targets might be related to the direct effect of the compound on breast hyperplasia.(2)After drug intervention,there was no significant change in the high-dose group of Compound Herba Gueldenstaedtiae compared with the normal blank group.The liver indicators of the other intervention groups all significantly decreased(P<0.05).(3)In terms of kidney and uterine indicators,the medium-dose group of Compound Herba Gueldenstaedtiae decreased significantly compared with the normal blank group(P<0.05).In terms of the uterine index,the model group increased significantly compared with the normal blank group(P<0.01).(4)After 1-month drug treatment,the number of lobules and acini in the breast tissue of the Xiaozheng Pill group,the low,medium,and high-dose group of Compound Herba Gueldenstaedtiae,the low,medium,and highdose groups of traditional Chinese medicine-bacteria fermentation decreased,and the duct openings narrowed.With the increase of drug dose,diffuse hyperplasia of breast tissue was significantly improved.(5)The ELISA results showed that compared with the model group,the estrogen level was lower in the medium-dose group of traditional Chinese medicine-bacteria fermentation after the intervention(P<0.05).In addition,the follicle-stimulating hormone level in the low-dose group of Compound Herba Gueldenstaedtiae was lower than that of the model group(P<0.05).(6)The intervention in the mouse model led to changes in the abundance of short chain fatty acids and intestinal flora in all groups.To conclude,the Compound Herba Gueldenstaedtiae and its probiotic fermentation products significantly improved mammary gland hyperplasia in mice by regulating hormone levels,improving the structure of the gut microbiota,and increasing the content of shortchain fatty acids,providing new ideas and potential sources of drugs for the treatment of breast hyperplasia.
文摘针对果实分拣中存在识别精度低、耗时长等问题,设计实现了一种基于深度学习的智能水果分拣系统.首先,该系统采用残差网络(Residual network,ResNet)模型,通过引入动态残差门控机制优化梯度传播有效解决了深层网络训练中的梯度消失和爆炸问题,使得网络能够通过跳跃连接学习到更有效的特征表示;其次,对ResNet-18模型进行了轻量化设计,利用交叉熵损失函数(CrossEntropy loss,CELoss)和Adam优化器(Adaptive moment estimation,Adam)来进行模型的训练;最后,对数据集peach-split进行实验分析,结果表明构建的智能分拣系统对提高水果分拣精度研究具有一定的实用价值.
文摘Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.
文摘The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations.
基金supported by the National Natural Science Foundation of China(No.51977113)the Science and Technology Project of State Grid Zhejiang Electric Power Co.,Ltd.(No.5211JX240001).
文摘Accurate and reliable power system data are fundamental for critical operations such as gridmonitoring,fault diagnosis,and load forecasting,underpinned by increasing intelligentization and digitalization.However,data loss and anomalies frequently compromise data integrity in practical settings,significantly impacting system operational efficiency and security.Most existing data recovery methods require complete datasets for training,leading to substantial data and computational demands and limited generalization.To address these limitations,this study proposes a missing data imputation model based on an improved Generative Adversarial Network(BAC-GAN).Within the BAC-GAN framework,the generator utilizes Bidirectional Long Short-Term Memory(BiLSTM)networks and Multi-Head Attention mechanisms to capture temporal dependencies and complex relationships within power system data.The discriminator employs a Convolutional Neural Network(CNN)architecture to integrate local features with global structures,effectivelymitigating the generation of implausible imputations.Experimental results on two public datasets demonstrate that the BAC-GAN model achieves superior data recovery accuracy compared to five state-of-the-art and classical benchmarkmethods,with an average improvement of 17.7%in reconstruction accuracy.The proposedmethod significantly enhances the accuracy of grid fault diagnosis and provides reliable data support for the stable operation of smart grids,showing great potential for practical applications in power systems.
文摘Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.
基金funded by Guangzhou Huashang University(2024HSZD01,HS2023JYSZH01).
文摘Graph Neural Networks(GNNs),as a deep learning framework specifically designed for graph-structured data,have achieved deep representation learning of graph data through message passing mechanisms and have become a core technology in the field of graph analysis.However,current reviews on GNN models are mainly focused on smaller domains,and there is a lack of systematic reviews on the classification and applications of GNN models.This review systematically synthesizes the three canonical branches of GNN,Graph Convolutional Network(GCN),Graph Attention Network(GAT),and Graph Sampling Aggregation Network(GraphSAGE),and analyzes their integration pathways from both structural and feature perspectives.Drawing on representative studies,we identify three major integration patterns:cascaded fusion,where heterogeneous modules such as Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and GraphSAGE are sequentially combined for hierarchical feature learning;parallel fusion,where multi-branch architectures jointly encode complementary graph features;and feature-level fusion,which employs concatenation,weighted summation,or attention-based gating to adaptively merge multi-source embeddings.Through these patterns,integrated GNNs achieve enhanced expressiveness,robustness,and scalability across domains including transportation,biomedicine,and cybersecurity.
基金supported by the MSIT(Ministry of Science and ICT),Republic of Korea,under the ICAN(ICT Challenge and Advanced Network of HRD)support program(IITP-2025-RS-2023-00259497)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation)and was supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Republic of Korea government(MSIT)(No.IITP-2025-RS-2023-00254129+1 种基金Graduate School of Metaverse Convergence(Sungkyunkwan University))was supported by the Basic Science Research Program of the National Research Foundation(NRF)funded by the Republic of Korean government(MSIT)(No.RS-2024-00346737).
文摘Network attacks have become a critical issue in the internet security domain.Artificial intelligence technology-based detection methodologies have attracted attention;however,recent studies have struggled to adapt to changing attack patterns and complex network environments.In addition,it is difficult to explain the detection results logically using artificial intelligence.We propose a method for classifying network attacks using graph models to explain the detection results.First,we reconstruct the network packet data into a graphical structure.We then use a graph model to predict network attacks using edge classification.To explain the prediction results,we observed numerical changes by randomly masking and calculating the importance of neighbors,allowing us to extract significant subgraphs.Our experiments on six public datasets demonstrate superior performance with an average F1-score of 0.960 and accuracy of 0.964,outperforming traditional machine learning and other graph models.The visual representation of the extracted subgraphs highlights the neighboring nodes that have the greatest impact on the results,thus explaining detection.In conclusion,this study demonstrates that graph-based models are suitable for network attack detection in complex environments,and the importance of graph neighbors can be calculated to efficiently analyze the results.This approach can contribute to real-world network security analyses and provide a new direction in the field.
基金funding from the European Commission by the Ruralities project(grant agreement no.101060876).
文摘In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2025-00559546)supported by the IITP(Institute of Information&Coummunications Technology Planning&Evaluation)-ITRC(Information Technology Research Center)grant funded by the Korea government(Ministry of Science and ICT)(IITP-2025-RS-2023-00259004).
文摘The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.