期刊文献+
共找到8,216篇文章
< 1 2 250 >
每页显示 20 50 100
Recognizing Properties of Decision Rule Systems Using Deterministic and Nondeterministic Decision Trees
1
作者 Kerven Durdymyradov Mikhail Moshkov 《Journal of Intelligent Learning Systems and Applications》 2025年第3期193-210,共18页
We consider various tasks of recognizing properties of DRSs(Decision Rule Systems)in this paper.As solution algorithms,DDTs(Deterministic Decision Trees)and NDTs(Nondeterministic Decision Trees)are used.An NDT can be ... We consider various tasks of recognizing properties of DRSs(Decision Rule Systems)in this paper.As solution algorithms,DDTs(Deterministic Decision Trees)and NDTs(Nondeterministic Decision Trees)are used.An NDT can be considered as a representation of a DRS that satisfies the conditions of the considered task and covers all potential inputs.It has been shown that the minimum depth of a DDT solving the task does not exceed the square of the minimum depth of an NDT.The growth of the minimum number of nodes in DDTs and NDTs can be exponential with the size of the original DRSs.There-fore,in the general case,it is better to simulate the behavior of the DT(Deci-sion Tree)on the given tuple of feature values rather than building the entire tree.We propose a greedy algorithm for such modeling and study its efficiency for a class of tasks of recognizing properties of DRSs.The obtained results may be of interest for data analysis in which both DRSs and DTs are intensively studied.In particular,these results make one think about the possibilities of transforming DRSs into DTs. 展开更多
关键词 Deterministic Decision Tree Nondeterministic Decision Tree Decision rule system
在线阅读 下载PDF
A Health State Prediction Model Based on Belief Rule Base and LSTM for Complex Systems 被引量:1
2
作者 Yu Zhao Zhijie Zhou +3 位作者 Hongdong Fan Xiaoxia Han JieWang Manlin Chen 《Intelligent Automation & Soft Computing》 2024年第1期73-91,共19页
In industrial production and engineering operations,the health state of complex systems is critical,and predicting it can ensure normal operation.Complex systems have many monitoring indicators,complex coupling struct... In industrial production and engineering operations,the health state of complex systems is critical,and predicting it can ensure normal operation.Complex systems have many monitoring indicators,complex coupling structures,non-linear and time-varying characteristics,so it is a challenge to establish a reliable prediction model.The belief rule base(BRB)can fuse observed data and expert knowledge to establish a nonlinear relationship between input and output and has well modeling capabilities.Since each indicator of the complex system can reflect the health state to some extent,the BRB is built based on the causal relationship between system indicators and the health state to achieve the prediction.A health state prediction model based on BRB and long short term memory for complex systems is proposed in this paper.Firstly,the LSTMis introduced to predict the trend of the indicators in the system.Secondly,the Density Peak Clustering(DPC)algorithmis used todetermine referential values of indicators for BRB,which effectively offset the lack of expert knowledge.Then,the predicted values and expert knowledge are fused to construct BRB to predict the health state of the systems by inference.Finally,the effectiveness of the model is verified by a case study of a certain vehicle hydraulic pump. 展开更多
关键词 Health state predicftion complex systems belief rule base expert knowledge LSTM density peak clustering
在线阅读 下载PDF
Verification and Application Evaluation of Intelligent Audit Rules for The UN9000 Urine Analysis System
3
作者 Hualin He Ling Zhang +8 位作者 Weiwei Shi Rui Wang Chuanxin Dai Jun Li Zheng Wang Li Zuo Qunchao Wang Ning Li Jianmin Li 《Journal of Clinical and Nursing Research》 2024年第3期238-246,共9页
Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to... Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory. 展开更多
关键词 URINALYSIS Manual verification rules Intelligent verification TAT
在线阅读 下载PDF
The Origin,Types,and Improvement of the Notice-Necessary Measures Rule
4
作者 CHEN Zhimei 《Journalism and Mass Communication》 2025年第1期1-7,共7页
The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helpin... The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures. 展开更多
关键词 Internet Service Providers internet infringement safe harbors rule notice-necessary measures rule notice-and-takedown rule
在线阅读 下载PDF
ERBM:A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments
5
作者 Arshad Mehmmod Komal Batool +3 位作者 Ahthsham Sajid Muhammad Mansoor Alam Mazliham MohD Su’ud Inam Ullah Khan 《Computers, Materials & Continua》 2025年第6期5155-5179,共25页
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in... Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats. 展开更多
关键词 rule based INTRUSIONS IOT fuzzy prediction
在线阅读 下载PDF
Expert System Based on Ontology and Interpretable Machine Learning to Assist in the Discovery of Railway Accident Scenarios
6
作者 Habib Hadj-Mabrouk 《Computers, Materials & Continua》 2025年第9期4399-4430,共32页
A literature review on AI applications in the field of railway safety shows that the implemented approaches mainly concern the operational,maintenance,and feedback phases following railway incidents or accidents.These... A literature review on AI applications in the field of railway safety shows that the implemented approaches mainly concern the operational,maintenance,and feedback phases following railway incidents or accidents.These approaches exploit railway safety data once the transport system has received authorization for commissioning.However,railway standards and regulations require the development of a safety management system(SMS)from the specification and design phases of the railway system.This article proposes a new AI approach for analyzing and assessing safety from the specification and design phases of the railway system with a view to improving the development of the SMS.Unlike some learning methods,the proposed approach,which is dedicated in particular to safety assessment bodies,is based on semi-supervised learning carried out in close collaboration with safety experts who contributed to the development of a database of potential accident scenarios(learning example database)relating to the risk of rail collision.The proposed decision support is based on the use of an expert system whose knowledge base is automatically generated by inductive learning in the form of an association rule(rule base)and whose main objective is to suggest to the safety expert possible hazards not considered during the development of the SMS to complete the initial hazard register. 展开更多
关键词 Artificial intelligence ONTOLOGY semi-supervised learning expert system association rules railways safety HAZARD accident scenarios classification assessment
在线阅读 下载PDF
Anti-epileptic medication induced disturbed calcium-vitamin D metabolism:A behavioral analysis using association rule mining technique
7
作者 Pradeep K Dabla Kamal Upreti +5 位作者 Divakar Singh Anju Singh Vinod Puri Adina E Stanciu Nafija Serdarevic Damien Gruson 《World Journal of Experimental Medicine》 2025年第3期145-158,共14页
BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations on... BACKGROUND There is a lack of study on vitamin D and calcium levels in epileptic patients receiving therapy,despite the growing recognition of the importance of bone health in individuals with epilepsy.Associations one statistical method for finding correlations between variables in big datasets is called association rule mining(ARM).This technique finds patterns of common items or events in the data set,including associations.Through the analysis of patient data,including demographics,genetic information,and reactions with previous treatments,ARM can identify harmful drug reactions,possible novel combinations of medicines,and trends which connect particular individual features to treatment outcomes.AIM To investigate the evidence on the effects of anti-epileptic drugs(AEDs)on calcium metabolism and supplementing with vitamin D to help lower the likelihood of bone-related issues using ARM technique.METHODS ARM technique was used to analyze patients’behavior on calcium metabolism,vitamin D and anti-epileptic medicines.Epileptic sufferers of both sexes who attended neurological outpatient and in patient department clinics were recruited for the study.There were three patient groups:Group 1 received one AED,group 2 received two AEDs,and group 3 received more than two AEDs.The researchers analyzed the alkaline phosphatase,ionized calcium,total calcium,phosphorus,vitamin D levels,or parathyroid hormone values.RESULTS A total of 150 patients,aged 12 years to 60 years,were studied,with 50 in each group(1,2,and 3).60%were men,this gender imbalance may affect the study’s findings,as women have different bone metabolism dynamics influenced by hormonal variations,including menopause.The results may not fully capture the distinct effects of AEDs on female patients.A greater equal distribution of women should be the goal of future studies in order to offer a complete comprehension of the metabolic alterations brought on by AEDs.86 patients had generalized epilepsy,64 partial.42%of patients had AEDs for>5 years.Polytherapy reduced calcium and vitamin D levels compared to mono and dual therapy.Polytherapy elevated alkaline phosphatase and phosphorus levels.CONCLUSION ARM revealed the possible effects of variables like age,gender,and polytherapy on parathyroid hormone levels in individuals taking antiepileptic medication. 展开更多
关键词 Anti-epileptic drugs HOTSPOT EPILEPSY Association rule mining Transaction and metabolism
暂未订购
Knowledge Graph Construction and Rule Matching Approach for Aerospace Product Manufacturability Assessment
8
作者 Ziyan Liu Zujie Zheng +1 位作者 Lebao Wu Zuhua Jiang 《Journal of Harbin Institute of Technology(New Series)》 2025年第1期1-14,共14页
After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design ch... After the design of aerospace products is completed,a manufacturability assessment needs to be conducted based on 3D model's features in terms of modeling quality and process design,otherwise the cost of design changes will increase.Due to the poor structure and low reusability of product manufacturing feature information and assessment knowledge in the current aerospace product manufacturability assessment process,it is difficult to realize automated manufacturability assessment.To address these issues,a domain ontology model is established for aerospace product manufacturability assessment in this paper.On this basis,a structured representation method of manufacturability assessment knowledge and a knowledge graph data layer construction method are proposed.Based on the semantic information and association information expressed by the knowledge graph,a rule matching method based on subgraph matching is proposed to improve the precision and recall.Finally,applications and experiments based on the software platform verify the effectiveness of the proposed knowledge graph construction and rule matching method. 展开更多
关键词 knowledge graph aerospace product manufacturability assessment rule matching
在线阅读 下载PDF
A Novel Evidential Reasoning Rule with Causal Relationships between Evidence
9
作者 Shanshan Liu Liang Chang +1 位作者 Guanyu Hu Shiyu Li 《Computers, Materials & Continua》 2025年第10期1113-1134,共22页
The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitatio... The evidential reasoning(ER)rule framework has been widely applied in multi-attribute decision analysis and system assessment to manage uncertainty.However,traditional ER implementations rely on two critical limitations:1)unrealistic assumptions of complete evidence independence,and 2)a lack of mechanisms to differentiate causal relationships from spurious correlations.Existing similarity-based approaches often misinterpret interdependent evidence,leading to unreliable decision outcomes.To address these gaps,this study proposes a causality-enhanced ER rule(CER-e)framework with three key methodological innovations:1)a multidimensional causal representation of evidence to capture dependency structures;2)probabilistic quantification of causal strength using transfer entropy,a model-free information-theoretic measure;3)systematic integration of causal parameters into the ER inference process while maintaining evidential objectivity.The PC algorithm is employed during causal discovery to eliminate spurious correlations,ensuring robust causal inference.Case studies in two types of domains—telecommunications network security assessment and structural risk evaluation—validate CER-e’s effectiveness in real-world scenarios.Under simulated incomplete information conditions,the framework demonstrates superior algorithmic robustness compared to traditional ER.Comparative analyses show that CER-e significantly improves both the interpretability of causal relationships and the reliability of assessment results,establishing a novel paradigm for integrating causal inference with evidential reasoning in complex system evaluation. 展开更多
关键词 Evidential Reasoning rule UNCERTAINTY causal strength causal relationship transfer entropy complex system evaluation
在线阅读 下载PDF
RULES,RESILIENCE,AND SHARED GROWTH China-ASEAN cooperation,guided by rules,inclusivity,and strategic pragmatism,aims to strengthen regional stability,shared growth,and mutual trust amid global uncertainties
10
作者 Antony Hardi 《China Report ASEAN》 2025年第11期40-41,共2页
As the geopolitical and economic landscape of the Asia-Pacific continues to evolve,the partnership between China and ASEAN has reached a defining juncture.The dual imperatives of maintaining strategic autonomy while d... As the geopolitical and economic landscape of the Asia-Pacific continues to evolve,the partnership between China and ASEAN has reached a defining juncture.The dual imperatives of maintaining strategic autonomy while deepening economic interdependence have pushed regional actors to refine their approaches to cooperation.Among them,Singapore and Thailand o"er two distinct yet complementary perspectives on how Southeast Asia can sustain stability,inclusivity,and shared growth amid intensifying global uncertainties. 展开更多
关键词 thailand maintaining strategic autonomy china asean cooperation southeast asia ruleS deepening economic interdependence geopolitical RESILIENCE
在线阅读 下载PDF
China’s Responses and Strategies in Participating in International Digital Trade Rules Negotiations
11
作者 Jingfan Zhu Sujie Wei 《Proceedings of Business and Economic Studies》 2025年第5期259-264,共6页
Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule syste... Against the backdrop of profound reshaping of the current international landscape and the unprecedentedly rapid iteration of digital technologies,the global digital economy landscape and international trade rule system are entering a new era full of changes.Digital trade rules have emerged as a prominent focus in this field.Firstly,through a comprehensive review of sample data such as the WTO e-commerce proposals under the current multilateral framework,we can gain a profound insight into the negotiation practices of major economies regarding digital trade rules.In this context,China has demonstrated strong defensive interests in the“emerging”issues of digital trade,aiming to safeguard national data security and promote the healthy development of the digital economy.Therefore,when participating in the formulation of global digital trade rules,China needs to accurately strike a balance between offense and defense,contribute Chinese wisdom and solutions,and promote the construction of a fairer,more reasonable,and inclusive international digital trade governance system. 展开更多
关键词 Digital trade Trade rules Business negotiations
在线阅读 下载PDF
Scaling Rule,Energy Distribution and Energy Level Analysis for Morse Oscillator by Virtue of Hermann-Feynman Theorem
12
作者 Zhi-Long Wan Jun-Hua Chen Hong-Yi Fan 《Chinese Journal of Chemical Physics》 2025年第3期368-372,I0109,共6页
We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,w... We propose the scaling rule of Morse oscillator,based on this rule and by virtue of the Her-mann-Feymann theorem,we respectively obtain the distribution of potential and kinetic ener-gy of the Morse Hamiltonian.Also,we derive the exact upper limit of physical energy level.Further,we derive some recursive relations for energy matrix elements of the potential and other similar operators in the context of Morse oscillator theory. 展开更多
关键词 Morse oscillator Scaling rule Hermann-Feynman theorem
在线阅读 下载PDF
Reconciling Bergmann's rule throughout the annual cycle in two congeneric large-bodied migratory waterbirds
13
作者 Dehai Gu Yanbo Xie +8 位作者 Tetsuo Shimada Hiroyoshi Higuchi Diana Solovyeva Inga Bysykatova-Harmey Yanlei Liu Junjian Zhang Qingshan Zhao Lei Cao Anthony D.Fox 《Avian Research》 2025年第3期433-440,共8页
Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in rela... Bergmann's rule predicts that the larger of two homeotherm species differing only in size would occur at higher latitudes, or in cooler climates than the smaller, because of relative thermoregulatory costs in relation to body mass/surface area ratio. Individual tracking data from two congeneric long-distance migratory northern nesting swan species, Tundra Cygnus columbianus (TS, n = 99) and Whooper Swans C. cygnus (WS, 61–71% larger mass than TS, n = 47) were used to determine their summering and wintering latitudes along similar migration routes and common staging areas along the same flyway. We hypothesised that throughout Arctic and Boreal breeding areas (10℃ in July), summer ambient temperatures mainly exceed the Lower Critical Temperatures (LCT, c. 1℃) for both swan species, so the duration of the snow-free summer period will favour smaller body size at highest latitudes, since this constrains the time available to lay, incubate eggs and raise cygnets to fledging. We hypothesised that in contrast, in winter, both species occur in temperatures near to freezing (−3℃ in January), below their respective LCT, so differential thermoregulation demands would constrain TS to winter south of WS. Tracking of individuals showed for the first time that while smaller TS summered significantly north of WS, WS wintered significantly north of TS, with limited overlap in both seasons. We conclude that differences in relative summer distribution of these two closely related migratory herbivores are not to do with latitude per se but are constrained by the time both species require to raise their young to fledging during the short northern summer, when thermoregulation costs are unlikely limiting. In winter, both swan species occur within a climate envelop at or below their respective LCT and smaller TS occurred consistently south of the range of the tracked WS, as predicted by Bergmann's rule. 展开更多
关键词 Bergmann's rule Breeding latitude Migratory swans Snow-free period Tundra Swan Whooper Swan Win tering latitude
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
14
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
Root system architecture and its scaling relationships of Reaumuria soongorica in Alxa steppe desert,Northwest China
15
作者 MA Xiongzhong WANG Xinping XIONG Weihong 《Journal of Arid Land》 2025年第2期271-284,共14页
Root system architecture has often been overlooked in plant research despite its critical role in plant adaptation to environmental conditions.This study focused on the root system architecture of the desert shrub Rea... Root system architecture has often been overlooked in plant research despite its critical role in plant adaptation to environmental conditions.This study focused on the root system architecture of the desert shrub Reaumuria soongorica in the Alxa steppe desert,Northwest China.Plant samples were collected during May-September 2019.Using excavation methods,in situ measurements,and root scanning techniques,we analyzed the root distribution,topology,and branching patterns of R.soongorica across an age sequence of 7-51 a.Additionally,we investigated the allometric relationships of root collar diameter with total coarse root length,biomass,and topological parameters.The results showed that the roots of R.soongorica were predominantly concentrated in shallow soil layers(10-50 cm),with lateral root branching and biomass allocation increasing with shrub age.The root topology exhibited a herringbone-like structure,with average topological and modified topological indices of 0.89 and 0.96,respectively,both of which adjusted with shrub age.The root system displayed a self-similar branching pattern,maintaining a constant cross-sectional area ratio of 1.13 before and after branching,deviating from the area-preserving rule.These adaptive traits allow R.soongorica to efficiently expand its nutrient acquisition zone,minimize internal competition,and optimize resource uptake from the upper soil layers.Furthermore,significant linear relationships were observed between log10-transformed root collar diameter and log10-transformed total coarse root length,biomass,and topological parameters.These findings advance non-destructive approaches for studying root characteristics and contribute to the development of root-related models.Besides,this study provides new insights into the adaptive strategies of R.soongorica under extreme drought conditions,offering valuable guidance for species selection and cultivation in desert restoration efforts. 展开更多
关键词 Reaumuria soongorica root system architecture root topology root branching pattern area-preserving rule Alxa steppe desert
在线阅读 下载PDF
Raw materials consumption reduction for practical electric arc furnace steelmaking: a data association rules mining approach with improved evaluation indicator
16
作者 Yu-chi Zou Ling-zhi Yang +5 位作者 Hang Hu Guan-nan Li Zeng Feng Shuai Wang Feng Chen Yu-feng Guo 《Journal of Iron and Steel Research International》 2025年第10期3308-3327,共20页
Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF... Reducing raw materials consumption(RMC)in electric arc furnace(EAF)steelmaking process is beneficial to the reduction in resource and energy consumption.The conventional indicator of evaluating RMC only focuses on EAF inputs and outputs,neglecting the associations between smelting operations and RMC.Traditional methods of reducing RMC rely on manual experience and lack a standard operation guidance.A method based on association rules mining and metallurgical mechanism(ARM-MM)was proposed.ARM-MM proposed an improved evaluation indicator of RMC and the indicator independently showed the associations between smelting operations and RMC.On the basis,1265 heats of real EAF data were used to obtain the operation guidance for RMC reduction.According to the ratio of hot metal(HM)in charge metals,data were divided into all dataset,low HM ratio dataset,medium HM ratio dataset,and high HM ratio dataset.ARM algorithm was used in each dataset to obtain specific operation guidance.The real average RMC under all dataset,medium HM ratio dataset,and high HM ratio dataset was reduced by 279,486,and 252 kg/heat,respectively,when obtained operation guidance was applied. 展开更多
关键词 Electric arc furnace steelmaking Raw materials consumption Evaluation indicator Association rules mining Operation guidance
原文传递
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
17
作者 Xiang Zhang Shenyan Han +1 位作者 Wenbin Huang Daoyong Fu 《Computers, Materials & Continua》 2025年第4期1149-1171,共23页
Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,th... Generative image steganography is a technique that directly generates stego images from secret infor-mation.Unlike traditional methods,it theoretically resists steganalysis because there is no cover image.Currently,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction.Therefore,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule.Firstly,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,respectively.Then,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute features.This noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference image.Additionally,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed model.Experimental results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden information.Furthermore,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis. 展开更多
关键词 Image information hiding generative information hiding disentangled attribute feature transformation invertible mapping rule steganalysis resistance
在线阅读 下载PDF
Study on Screening of Main Acupoints and Pattern-Specific Acupoint Combination Rules for Acupuncture in Autism Spectrum Disorder Complicated with Sleep Disorder Based on Data Mining
18
作者 Wei Du Hujie Song 《Journal of Clinical and Nursing Research》 2025年第8期241-249,共9页
Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retro... Objective:To explore the core acupuncture acupoints and pattern-adapted acupoint combination rules for autism spectrum disorder(ASD)complicated with sleep disorder using clinical data mining technology.Methods:A retrospective analysis was conducted on the diagnosis and treatment data of 104 children with ASD complicated with sleep disorder admitted to Xi’an Traditional Chinese Medicine(TCM)Encephalopathy Hospital from January 2022 to December 2024.Cross-pattern main acupoints were screened via frequency statistics,chi-square test,and factor analysis;pattern-specific auxiliary acupoints were extracted by combining multiple correspondence analysis,cluster analysis,and association rule mining.Results:Ten cross-pattern main acupoints(Baihui,Sishenzhen,Language Area 1,Language Area 2,Neiguan,Shenmen,Yongquan,Xuanzhong)were identified,and acupoint combination schemes for four major TCM patterns(Hyperactivity of Liver and Heart Fire,Deficiency of Kidney Essence,Deficiency of Both Heart and Spleen,Hyperactivity of Liver with Spleen Deficiency)were established.Conclusion:Acupuncture treatment should follow the principle of“regulating spirit and calming the brain as the root,and dredging collaterals based on pattern differentiation as the branch”.The synergy between main and auxiliary acupoints can accurately regulate the disease,providing a basis for precise clinical treatment. 展开更多
关键词 Autism Spectrum Disorder(ASD) Sleep disorder Acupoint selection rule Data mining
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部