Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted featur...Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems.In this study,we propose a hybrid model,BertGCN,that integrates BERT-based contextual embedding with Graph Convolutional Networks(GCNs)to identify anomalies in raw system logs,thereby eliminating the need for log parsing.TheBERT module captures semantic representations of log messages,while the GCN models the structural relationships among log entries through a text-based graph.This combination enables BertGCN to capture both the contextual and semantic characteristics of log data.BertGCN showed excellent performance on the HDFS and BGL datasets,demonstrating its effectiveness and resilience in detecting anomalies.Compared to multiple baselines,our proposed BertGCN showed improved precision,recall,and F1 scores.展开更多
The rapid digitalization of the energy sector has led to the deployment of large-scale smart metering systems that generate high-frequency time series data,creating new opportunities and challenges for energy anomaly ...The rapid digitalization of the energy sector has led to the deployment of large-scale smart metering systems that generate high-frequency time series data,creating new opportunities and challenges for energy anomaly detection.Accurate identification of anomalous patterns in building energy consumption is essential for optimizing operations,improving energy efficiency,and supporting grid reliability.This study investigates advanced feature engineering and machine learning modeling techniques for large-scale time series anomaly detection in building energy systems.Expanding upon previous benchmark frameworks,we introduce additional features such as oil price indices and solar cycle indicators,including sunset and sunrise times,to enhance the contextual understanding of consumption patterns.Our comparative modeling approach encompasses an extensive suite of algorithms,including KNeighborsUnif,KNeighborsDist,LightGBMXT,LightGBM,RandomForestMSE,CatBoost,ExtraTreesMSE,NeuralNetFastAI,XGBoost,NeuralNetTorch,and LightGBMLarge.Data preprocessing includes rigorous handling of missing values and normalization,while feature engineering focuses on temporal,environmental,and value-change attributes.The models are evaluated on a comprehensive dataset of smart meter readings,with performance assessed using metrics such as the Area Under the Receiver Operating Characteristic Curve(AUC-ROC).The results demonstrate that the integration of diverse exogenous variables and a hybrid ensemble of traditional tree-based and neural network models can significantly improve anomaly detection performance.This work provides new insights into the design of robust,scalable,and generalizable frameworks for energy anomaly detection in complex,real-world settings.展开更多
Multivariate anomaly detection plays a critical role in maintaining the stable operation of information systems.However,in existing research,multivariate data are often influenced by various factors during the data co...Multivariate anomaly detection plays a critical role in maintaining the stable operation of information systems.However,in existing research,multivariate data are often influenced by various factors during the data collection process,resulting in temporal misalignment or displacement.Due to these factors,the node representations carry substantial noise,which reduces the adaptability of the multivariate coupled network structure and subsequently degrades anomaly detection performance.Accordingly,this study proposes a novel multivariate anomaly detection model grounded in graph structure learning.Firstly,a recommendation strategy is employed to identify strongly coupled variable pairs,which are then used to construct a recommendation-driven multivariate coupling network.Secondly,a multi-channel graph encoding layer is used to dynamically optimize the structural properties of the multivariate coupling network,while a multi-head attention mechanism enhances the spatial characteristics of the multivariate data.Finally,unsupervised anomaly detection is conducted using a dynamic threshold selection algorithm.Experimental results demonstrate that effectively integrating the structural and spatial features of multivariate data significantly mitigates anomalies caused by temporal dependency misalignment.展开更多
The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.Thi...The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.展开更多
Summer rainfall in the Yangtze River basin(YRB)is favored by two key factors in the lower troposphere:the tropical anticyclonic anomaly over the western North Pacific and the extratropical northeasterly anomalies to t...Summer rainfall in the Yangtze River basin(YRB)is favored by two key factors in the lower troposphere:the tropical anticyclonic anomaly over the western North Pacific and the extratropical northeasterly anomalies to the north of the YRB.This study,however,found that approximately 46%of heavy rainfall events in the YRB occur when only one factor appears and the other is opposite signed.Accordingly,these heavy rainfall events can be categorized into two types:the extratropical northeasterly anomalies but tropical cyclonic anomaly(first unconventional type),and the tropical anticyclonic anomaly but extratropical southwesterly anomalies(second unconventional type).Anomalous water vapor convergence and upward motion exists for both types,but through different mechanisms.For the first type,the moisture convergence and upward motion are induced by a cyclonic anomaly over the YRB,which appears in the mid and lower troposphere and originates from the upstream region.For the second type,a mid-tropospheric cyclonic anomaly over Lake Baikal extends southward and results in southwesterly anomalies over the YRB,in conjunction with the tropical anticyclonic anomaly.The southwesterly anomalies transport water vapor to the YRB and lead to upward motion through warm advection.This study emphasizes the role of mid-tropospheric circulations in inducing heavy rainfall in the YRB.展开更多
The highly dynamic nature,strong uncertainty,and coupled multiple safety constraints inherent in carrier aircraft recovery operations pose severe challenges for real-time decision-making.Addressing bolter scenarios,th...The highly dynamic nature,strong uncertainty,and coupled multiple safety constraints inherent in carrier aircraft recovery operations pose severe challenges for real-time decision-making.Addressing bolter scenarios,this study proposes an intelligent decision-making framework based on a deep long short-term memory Q-network.This framework transforms the real-time sequencing for bolter recovery problem into a partially observable Markov decision process.It employs a stacked long shortterm memory network to accurately capture the long-range temporal dependencies of bolter event chains and fuel consumption.Furthermore,it integrates a prioritized experience replay training mechanism to construct a safe and adaptive scheduling system capable of millisecond-level real-time decision-making.Experimental demonstrates that,within large-scale mass recovery scenarios,the framework achieves zero safety violations in static environments and maintains a fuel safety violation rate below 10%in dynamic scenarios,with single-step decision times at the millisecond level.The model exhibits strong generalization capability,effectively responding to unforeseen emergent situations—such as multiple bolters and fuel emergencies—without requiring retraining.This provides robust support for efficient carrier-based aircraft recovery operations.展开更多
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ...With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks.展开更多
Tooth developmental anomalies are a group of disorders caused by unfavorable factors affecting the tooth development process,resulting in abnormalities in tooth number,structure,and morphology.These anomalies typicall...Tooth developmental anomalies are a group of disorders caused by unfavorable factors affecting the tooth development process,resulting in abnormalities in tooth number,structure,and morphology.These anomalies typically manifest during childhood,impairing dental function,maxillofacial development,and facial aesthetics,while also potentially impacting overall physical and mental health.The complex etiology and diverse clinical phenotypes of these anomalies pose significant challenges for prevention,early diagnosis,and treatment.As they usually emerge early in life,long-term management and multidisciplinary collaboration in dental care are essential.However,there is currently a lack of systematic clinical guidelines for the diagnosis and treatment of these conditions,adding to the difficulties in clinical practice.In response to this need,this expert consensus summarizes the classifications,etiology,typical clinical manifestations,and diagnostic criteria of tooth developmental anomalies based on current clinical evidence.It also provides prevention strategies and stage-specific clinical management recommendations to guide clinicians in diagnosis and treatment,promoting early intervention and standardized care for these anomalies.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
In the field of intelligent surveillance,weakly supervised video anomaly detection(WSVAD)has garnered widespread attention as a key technology that identifies anomalous events using only video-level labels.Although mu...In the field of intelligent surveillance,weakly supervised video anomaly detection(WSVAD)has garnered widespread attention as a key technology that identifies anomalous events using only video-level labels.Although multiple instance learning(MIL)has dominated the WSVAD for a long time,its reliance solely on video-level labels without semantic grounding hinders a fine-grained understanding of visually similar yet semantically distinct events.In addition,insufficient temporal modeling obscures causal relationships between events,making anomaly decisions reactive rather than reasoning-based.To overcome the limitations above,this paper proposes an adaptive knowledgebased guidance method that integrates external structured knowledge.The approach combines hierarchical category information with learnable prompt vectors.It then constructs continuously updated contextual references within the feature space,enabling fine-grained meaning-based guidance over video content.Building on this,the work introduces an event relation analysis module.This module explicitly models temporal dependencies and causal correlations between video snippets.It constructs an evolving logic chain of anomalous events,revealing the process by which isolated anomalous snippets develop into a complete event.Experiments on multiple benchmark datasets show that the proposed method achieves highly competitive performance,achieving an AUC of 88.19%on UCF-Crime and an AP of 86.49%on XD-Violence.More importantly,the method provides temporal and causal explanations derived from event relationships alongside its detection results.This capability significantly advances WSVAD from a simple binary classification to a new level of interpretable behavior analysis.展开更多
Basement structures may influence how ruptures propagate during an earthquake.However,most structural evidence is beneath the thick layer of younger volcanic sediments.In this study,gravity method was applied to disco...Basement structures may influence how ruptures propagate during an earthquake.However,most structural evidence is beneath the thick layer of younger volcanic sediments.In this study,gravity method was applied to discover more features of the basement structure.A land survey of gravity measurement was conducted at 383 stations south of Toba.The observed gravity was then used to generate Complete Bouguer Anomaly and residual-regional anomaly maps.In addition,several edge enhancements based on derivations were applied.All results presented lineations that could be linked to previously recognized active faults and structures.Additionally,the most prominent feature is a large northwest-southeast elongated high anomaly,almost sub-parallel to the Sumatra Fault Zone(SFZ).Since the feature is also located at the continuation of the Medial Sumatra Tectonic Zone(MSTZ),the body might be the hidden part of this major tectonic zone.The occurrence of MSTZ across the SFZ would affect the rupture propagation of earthquake events in the fault segment of the SFZ.展开更多
Using the data of 500 hPa geopotential height from 1951 to 1995, SST roughly in the same period and OLR data from 1974 to 1994, the relation between the anomalies of subtropical high (STH for short) and the tropical c...Using the data of 500 hPa geopotential height from 1951 to 1995, SST roughly in the same period and OLR data from 1974 to 1994, the relation between the anomalies of subtropical high (STH for short) and the tropical circulations including the Asian monsoon as well as the convective activity are studied. In order to study the physical process of the air-sea interaction related to STH anomaly, the correlation of STH with SST at various sea areas, lagged and simultaneous, has been calculated. Comparing the difference of OLR, wind fields, vertical circulations and SST anomalies in the strong and weak STH, we investigate the characteristics of global circulations and the SST distributions related to the anomalous STH at the western Pacific both in winter and summer. Much attention has been paid to the study of the air-sea interaction and the relationship between the East Asian monsoon and the STH in the western Pacific. A special vertical circulation, related to the STH anomalies is found, which connects the monsoon current to the west and the vertical flow influenced by the SST anomaly in the tropical eastern Pacific.展开更多
The diurnal variation of the geomagnetic vertical component is exhibited mainly by changes of phase and amplitude before strong earthquakes. Based on data recorded by the network of geomagnetic observatories in China ...The diurnal variation of the geomagnetic vertical component is exhibited mainly by changes of phase and amplitude before strong earthquakes. Based on data recorded by the network of geomagnetic observatories in China for many years, the anomalous features of the appearance time of the minima of diurnal variations (i.e, low-point time) of the geo- magnetic vertical components and the variation of their spatial distribution (i.e, phenomena of low-point displacement) have been studied before the Wenchuan Ms8.0 earthquake. The strong aftershocks after two months' quiescence of M6 aftershocks of the Ms8.0 event were forecasted based on these studies. There are good correlativities between these geomagnetic anoma- lies and occurrences of earthquakes. It has been found that most earthquakes occur near the boundary line of sudden changes of the low-point time and generally within four days before or after the 27th or 41st day counting from the day of the appearance of the anomaly. In addition, the imminent anomalies in diurnal-variation amplitudes near the epicentral areas have also been studied before the Wenchuan earthquake.展开更多
Observational results of underground water regime (water level and flow) in some strong earthquakes and moderate earthquakes (in this paper we also call them by 'strong earthquakes')in Chinese mainland are stu...Observational results of underground water regime (water level and flow) in some strong earthquakes and moderate earthquakes (in this paper we also call them by 'strong earthquakes')in Chinese mainland are studied and the following conclusions are obtained. For one strong earthquake, the spatial distributions of the anomalies which include medium term anomalies of one year scale, short term anomalies and imminent anomalies, and underground water stations without the anomalies were mainly related to the causative mechanism and active master faults (active abyssal faults or strongly active faults) around the focal region; The spatial distribution of the anomalies coincided with the specific relation among the anomalies, the focal site, the causative mechanism and active master faults. Finally, the mechanism of the relation was briefly discussed, and the importance about the research result in this paper was set forth.展开更多
Anomaly detection for the control rod drive mechanism(CRDM) is key to enhancing the security of nuclear power plant equipment. In CRDM real-time condition-based maintenance, most existing methods cannot deal with long...Anomaly detection for the control rod drive mechanism(CRDM) is key to enhancing the security of nuclear power plant equipment. In CRDM real-time condition-based maintenance, most existing methods cannot deal with long sequences and periodic abnormal events and have poor feature extraction from these data. In this paper,a learning-based anomaly detection method employing a long short-term memory-based autoencoder(LSTM-AE)network and an extreme gradient boosting(XGBoost)algorithm is proposed for the CRDM. The nonlinear and sequential features of the CRDM coil currents can be automatically and efficiently extracted by the LSTM neural units and AE network. The normal behavior LSTM-AE model was established to reconstruct the errors when feeding abnormal coil current signals. The XGBoost algorithm was leveraged to monitor the residuals and identify outliers for the coil currents. The results demonstrate that the proposed anomaly detection method can effectively detect different timing sequence anomalies and provide a more accurate forecasting performance for CRDM coil current signals.展开更多
Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predic...Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predictive model for normal data.Furthermore,the prediction errors from the predictive models are used to indicate normal or abnormal behavior.An additional advantage of using the LSTM networks is that the earthquake precursor data can be directly fed into the network without any elaborate preprocessing as required by other approaches.Furthermore,no prior information on abnormal data is needed by these networks as they are trained only using normal data.Experiments using three groups of real data were conducted to compare the anomaly detection results of the proposed method with those of manual recognition.The comparison results indicated that the proposed LSTM network achieves promising results and is viable for detecting anomalies in earthquake precursor data.展开更多
Snow cover on the Tibetan Plateau(TP) has been shown to be essential for the East Asian summer monsoon.In this paper, we demonstrate that tropical cyclone(TC) 04B(1999) in the northern Indian Ocean, which made landfal...Snow cover on the Tibetan Plateau(TP) has been shown to be essential for the East Asian summer monsoon.In this paper, we demonstrate that tropical cyclone(TC) 04B(1999) in the northern Indian Ocean, which made landfall during the autumn of 1999, may have contributed to climate anomalies over East Asia during the following spring and summer by increasing snow cover on the TP. Observations indicate that snow cover on the TP increased markedly after TC 04B(1999) made landfall in October of 1999. Sensitivity experiments, in which the TC was removed from a numerical model simulation of the initial field, verified that TC 04B(1999) affected the distribution as well as increased the amount of snow on the TP. In addition, the short-term numerical modeling of the climate over the region showed that the positive snow cover anomaly induced negative surface temperature, negative sensible heat flux, positive latent heat flux, and positive soil temperature anomalies over the central and southern TP during the following spring and summer. These climate anomalies over the TP were associated with positive(negative) summer precipitation anomalies over the Yangtze River valley(along the southeastern coast of China).展开更多
From Octobet 1998 to January 1999,5 earthquakes ( M s≥5) occurred between Ninglang and Yanyuan counties (27°07′~27°12′N,100°40′~101°00′E area).They were situated in 140km southwest of the Xi...From Octobet 1998 to January 1999,5 earthquakes ( M s≥5) occurred between Ninglang and Yanyuan counties (27°07′~27°12′N,100°40′~101°00′E area).They were situated in 140km southwest of the Xichang.Among them,the largest one is M s 6 2 on November 19,1998.Based on small seismic data by the seismic remote sensing station of Xichang and the seismological station of Muli,and regional observation data,passing through careful observation and scientific analyses,we had made better forecasts before the earthquakes.That results obvious social benefits.By processing data of precursory earthquakes,such as,original observation data of total geomagnetic intensity from the station of Xichang,pressure capacitance stressometer and quartz horizaontal pendulum tiltmeter from the Xiaomiao station of Xichang,we summarized the sequence characteristics of the series earthquakes.The information about short\|term anomaly of gruond strain,total geomagnetic intensity and ground tilt before the earthquake is emphatically explained.展开更多
The problems in equipment fault detection include data dimension explosion,computational complexity,low detection accuracy,etc.To solve these problems,a device anomaly detection algorithm based on enhanced long short-...The problems in equipment fault detection include data dimension explosion,computational complexity,low detection accuracy,etc.To solve these problems,a device anomaly detection algorithm based on enhanced long short-term memory(LSTM)is proposed.The algorithm first reduces the dimensionality of the device sensor data by principal component analysis(PCA),extracts the strongly correlated variable data among the multidimensional sensor data with the lowest possible information loss,and then uses the enhanced stacked LSTM to predict the extracted temporal data,thus improving the accuracy of anomaly detection.To improve the efficiency of the anomaly detection,a genetic algorithm(GA)is used to adjust the magnitude of the enhancements made by the LSTM model.The validation of the actual data from the pumps shows that the algorithm has significantly improved the recall rate and the detection speed of device anomaly detection,with the recall rate of 97.07%,which indicates that the algorithm is effective and efficient for device anomaly detection in the actual production environment.展开更多
In this article,we comment on the paper by Kakinuma et al published recently.We focus specifically on the diagnosis of uterine pseudoaneurysm,but we also review other uterine vascular anomalies that may be the cause o...In this article,we comment on the paper by Kakinuma et al published recently.We focus specifically on the diagnosis of uterine pseudoaneurysm,but we also review other uterine vascular anomalies that may be the cause of life-threating hemorrhage and the different causes of uterine pseudoaneurysms.Uterine artery pseudoaneurysm is a complication of both surgical gynecological and nontraumatic procedures.Massive hemorrhage is the consequence of the rupture of the pseudoaneurysm.Uterine artery pseudoaneurysm can develop after obstetric or gynecological procedures,being the most frequent after cesarean or vaginal deliveries,curettage and even during pregnancy.However,there are several cases described unrelated to pregnancy,such as after conization,hysteroscopic surgery or laparoscopic myomectomy.Hemorrhage is the clinical manifestation and it can be life-threatening so suspicion of this vascular lesion is essential for early diagnosis and treatment.However,there are other uterine vascular anomalies that may be the cause of severe hemorrhage,which must be taken into account in the differential diagnosis.Computed tomography angiography and embolization is supposed to be the first therapeutic option in most of them.展开更多
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,under grant no.(GPIP:1074-612-2024).
文摘Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems.In this study,we propose a hybrid model,BertGCN,that integrates BERT-based contextual embedding with Graph Convolutional Networks(GCNs)to identify anomalies in raw system logs,thereby eliminating the need for log parsing.TheBERT module captures semantic representations of log messages,while the GCN models the structural relationships among log entries through a text-based graph.This combination enables BertGCN to capture both the contextual and semantic characteristics of log data.BertGCN showed excellent performance on the HDFS and BGL datasets,demonstrating its effectiveness and resilience in detecting anomalies.Compared to multiple baselines,our proposed BertGCN showed improved precision,recall,and F1 scores.
文摘The rapid digitalization of the energy sector has led to the deployment of large-scale smart metering systems that generate high-frequency time series data,creating new opportunities and challenges for energy anomaly detection.Accurate identification of anomalous patterns in building energy consumption is essential for optimizing operations,improving energy efficiency,and supporting grid reliability.This study investigates advanced feature engineering and machine learning modeling techniques for large-scale time series anomaly detection in building energy systems.Expanding upon previous benchmark frameworks,we introduce additional features such as oil price indices and solar cycle indicators,including sunset and sunrise times,to enhance the contextual understanding of consumption patterns.Our comparative modeling approach encompasses an extensive suite of algorithms,including KNeighborsUnif,KNeighborsDist,LightGBMXT,LightGBM,RandomForestMSE,CatBoost,ExtraTreesMSE,NeuralNetFastAI,XGBoost,NeuralNetTorch,and LightGBMLarge.Data preprocessing includes rigorous handling of missing values and normalization,while feature engineering focuses on temporal,environmental,and value-change attributes.The models are evaluated on a comprehensive dataset of smart meter readings,with performance assessed using metrics such as the Area Under the Receiver Operating Characteristic Curve(AUC-ROC).The results demonstrate that the integration of diverse exogenous variables and a hybrid ensemble of traditional tree-based and neural network models can significantly improve anomaly detection performance.This work provides new insights into the design of robust,scalable,and generalizable frameworks for energy anomaly detection in complex,real-world settings.
基金supported by Natural Science Foundation of Qinghai Province(2025-ZJ-994M)Scientific Research Innovation Capability Support Project for Young Faculty(SRICSPYF-BS2025007)National Natural Science Foundation of China(62566050).
文摘Multivariate anomaly detection plays a critical role in maintaining the stable operation of information systems.However,in existing research,multivariate data are often influenced by various factors during the data collection process,resulting in temporal misalignment or displacement.Due to these factors,the node representations carry substantial noise,which reduces the adaptability of the multivariate coupled network structure and subsequently degrades anomaly detection performance.Accordingly,this study proposes a novel multivariate anomaly detection model grounded in graph structure learning.Firstly,a recommendation strategy is employed to identify strongly coupled variable pairs,which are then used to construct a recommendation-driven multivariate coupling network.Secondly,a multi-channel graph encoding layer is used to dynamically optimize the structural properties of the multivariate coupling network,while a multi-head attention mechanism enhances the spatial characteristics of the multivariate data.Finally,unsupervised anomaly detection is conducted using a dynamic threshold selection algorithm.Experimental results demonstrate that effectively integrating the structural and spatial features of multivariate data significantly mitigates anomalies caused by temporal dependency misalignment.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2025-02-01276).
文摘The rapid proliferation of Internet of Things(IoT)devices in critical healthcare infrastructure has introduced significant security and privacy challenges that demand innovative,distributed architectural solutions.This paper proposes FE-ACS(Fog-Edge Adaptive Cybersecurity System),a novel hierarchical security framework that intelligently distributes AI-powered anomaly detection algorithms across edge,fog,and cloud layers to optimize security efficacy,latency,and privacy.Our comprehensive evaluation demonstrates that FE-ACS achieves superior detection performance with an AUC-ROC of 0.985 and an F1-score of 0.923,while maintaining significantly lower end-to-end latency(18.7 ms)compared to cloud-centric(152.3 ms)and fog-only(34.5 ms)architectures.The system exhibits exceptional scalability,supporting up to 38,000 devices with logarithmic performance degradation—a 67×improvement over conventional cloud-based approaches.By incorporating differential privacy mechanisms with balanced privacy-utility tradeoffs(ε=1.0–1.5),FE-ACS maintains 90%–93%detection accuracy while ensuring strong privacy guarantees for sensitive healthcare data.Computational efficiency analysis reveals that our architecture achieves a detection rate of 12,400 events per second with only 12.3 mJ energy consumption per inference.In healthcare risk assessment,FE-ACS demonstrates robust operational viability with low patient safety risk(14.7%)and high system reliability(94.0%).The proposed framework represents a significant advancement in distributed security architectures,offering a scalable,privacy-preserving,and real-time solution for protecting healthcare IoT ecosystems against evolving cyber threats.
基金supported by the National Natural Science Foundation of China(Grant No.42275041)the Hainan Province Science and Technology Special Fund(Grant No.SOLZSKY2025006).
文摘Summer rainfall in the Yangtze River basin(YRB)is favored by two key factors in the lower troposphere:the tropical anticyclonic anomaly over the western North Pacific and the extratropical northeasterly anomalies to the north of the YRB.This study,however,found that approximately 46%of heavy rainfall events in the YRB occur when only one factor appears and the other is opposite signed.Accordingly,these heavy rainfall events can be categorized into two types:the extratropical northeasterly anomalies but tropical cyclonic anomaly(first unconventional type),and the tropical anticyclonic anomaly but extratropical southwesterly anomalies(second unconventional type).Anomalous water vapor convergence and upward motion exists for both types,but through different mechanisms.For the first type,the moisture convergence and upward motion are induced by a cyclonic anomaly over the YRB,which appears in the mid and lower troposphere and originates from the upstream region.For the second type,a mid-tropospheric cyclonic anomaly over Lake Baikal extends southward and results in southwesterly anomalies over the YRB,in conjunction with the tropical anticyclonic anomaly.The southwesterly anomalies transport water vapor to the YRB and lead to upward motion through warm advection.This study emphasizes the role of mid-tropospheric circulations in inducing heavy rainfall in the YRB.
基金supported by the National Natural Science Foundation of China(Grant No.62403486)。
文摘The highly dynamic nature,strong uncertainty,and coupled multiple safety constraints inherent in carrier aircraft recovery operations pose severe challenges for real-time decision-making.Addressing bolter scenarios,this study proposes an intelligent decision-making framework based on a deep long short-term memory Q-network.This framework transforms the real-time sequencing for bolter recovery problem into a partially observable Markov decision process.It employs a stacked long shortterm memory network to accurately capture the long-range temporal dependencies of bolter event chains and fuel consumption.Furthermore,it integrates a prioritized experience replay training mechanism to construct a safe and adaptive scheduling system capable of millisecond-level real-time decision-making.Experimental demonstrates that,within large-scale mass recovery scenarios,the framework achieves zero safety violations in static environments and maintains a fuel safety violation rate below 10%in dynamic scenarios,with single-step decision times at the millisecond level.The model exhibits strong generalization capability,effectively responding to unforeseen emergent situations—such as multiple bolters and fuel emergencies—without requiring retraining.This provides robust support for efficient carrier-based aircraft recovery operations.
基金National Natural Science Foundation of China(Grant No.62103434)National Science Fund for Distinguished Young Scholars(Grant No.62176263).
文摘With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks.
基金supported by the grants No.82370912 from the National Natural Science Foundation of ChinaNo.2022020801010499 from the Bureau of Science and Technology of Wuhan,ChinaNo.2042023kf0231 from the Fundamental Research Funds for the Central Universities,China。
文摘Tooth developmental anomalies are a group of disorders caused by unfavorable factors affecting the tooth development process,resulting in abnormalities in tooth number,structure,and morphology.These anomalies typically manifest during childhood,impairing dental function,maxillofacial development,and facial aesthetics,while also potentially impacting overall physical and mental health.The complex etiology and diverse clinical phenotypes of these anomalies pose significant challenges for prevention,early diagnosis,and treatment.As they usually emerge early in life,long-term management and multidisciplinary collaboration in dental care are essential.However,there is currently a lack of systematic clinical guidelines for the diagnosis and treatment of these conditions,adding to the difficulties in clinical practice.In response to this need,this expert consensus summarizes the classifications,etiology,typical clinical manifestations,and diagnostic criteria of tooth developmental anomalies based on current clinical evidence.It also provides prevention strategies and stage-specific clinical management recommendations to guide clinicians in diagnosis and treatment,promoting early intervention and standardized care for these anomalies.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.
文摘In the field of intelligent surveillance,weakly supervised video anomaly detection(WSVAD)has garnered widespread attention as a key technology that identifies anomalous events using only video-level labels.Although multiple instance learning(MIL)has dominated the WSVAD for a long time,its reliance solely on video-level labels without semantic grounding hinders a fine-grained understanding of visually similar yet semantically distinct events.In addition,insufficient temporal modeling obscures causal relationships between events,making anomaly decisions reactive rather than reasoning-based.To overcome the limitations above,this paper proposes an adaptive knowledgebased guidance method that integrates external structured knowledge.The approach combines hierarchical category information with learnable prompt vectors.It then constructs continuously updated contextual references within the feature space,enabling fine-grained meaning-based guidance over video content.Building on this,the work introduces an event relation analysis module.This module explicitly models temporal dependencies and causal correlations between video snippets.It constructs an evolving logic chain of anomalous events,revealing the process by which isolated anomalous snippets develop into a complete event.Experiments on multiple benchmark datasets show that the proposed method achieves highly competitive performance,achieving an AUC of 88.19%on UCF-Crime and an AP of 86.49%on XD-Violence.More importantly,the method provides temporal and causal explanations derived from event relationships alongside its detection results.This capability significantly advances WSVAD from a simple binary classification to a new level of interpretable behavior analysis.
基金National Research and Innovation Agency(BRIN),Indonesia,with Grant No.373/II/FR/3/2022(Expedition and Exploration Fund),676/III/PR.01.December 03,2021(Geological Hazard In-House Program)。
文摘Basement structures may influence how ruptures propagate during an earthquake.However,most structural evidence is beneath the thick layer of younger volcanic sediments.In this study,gravity method was applied to discover more features of the basement structure.A land survey of gravity measurement was conducted at 383 stations south of Toba.The observed gravity was then used to generate Complete Bouguer Anomaly and residual-regional anomaly maps.In addition,several edge enhancements based on derivations were applied.All results presented lineations that could be linked to previously recognized active faults and structures.Additionally,the most prominent feature is a large northwest-southeast elongated high anomaly,almost sub-parallel to the Sumatra Fault Zone(SFZ).Since the feature is also located at the continuation of the Medial Sumatra Tectonic Zone(MSTZ),the body might be the hidden part of this major tectonic zone.The occurrence of MSTZ across the SFZ would affect the rupture propagation of earthquake events in the fault segment of the SFZ.
文摘Using the data of 500 hPa geopotential height from 1951 to 1995, SST roughly in the same period and OLR data from 1974 to 1994, the relation between the anomalies of subtropical high (STH for short) and the tropical circulations including the Asian monsoon as well as the convective activity are studied. In order to study the physical process of the air-sea interaction related to STH anomaly, the correlation of STH with SST at various sea areas, lagged and simultaneous, has been calculated. Comparing the difference of OLR, wind fields, vertical circulations and SST anomalies in the strong and weak STH, we investigate the characteristics of global circulations and the SST distributions related to the anomalous STH at the western Pacific both in winter and summer. Much attention has been paid to the study of the air-sea interaction and the relationship between the East Asian monsoon and the STH in the western Pacific. A special vertical circulation, related to the STH anomalies is found, which connects the monsoon current to the west and the vertical flow influenced by the SST anomaly in the tropical eastern Pacific.
基金supported by National Key Technologies Research&Development Program of China (Grant No. 2008BAC35B00).
文摘The diurnal variation of the geomagnetic vertical component is exhibited mainly by changes of phase and amplitude before strong earthquakes. Based on data recorded by the network of geomagnetic observatories in China for many years, the anomalous features of the appearance time of the minima of diurnal variations (i.e, low-point time) of the geo- magnetic vertical components and the variation of their spatial distribution (i.e, phenomena of low-point displacement) have been studied before the Wenchuan Ms8.0 earthquake. The strong aftershocks after two months' quiescence of M6 aftershocks of the Ms8.0 event were forecasted based on these studies. There are good correlativities between these geomagnetic anoma- lies and occurrences of earthquakes. It has been found that most earthquakes occur near the boundary line of sudden changes of the low-point time and generally within four days before or after the 27th or 41st day counting from the day of the appearance of the anomaly. In addition, the imminent anomalies in diurnal-variation amplitudes near the epicentral areas have also been studied before the Wenchuan earthquake.
文摘Observational results of underground water regime (water level and flow) in some strong earthquakes and moderate earthquakes (in this paper we also call them by 'strong earthquakes')in Chinese mainland are studied and the following conclusions are obtained. For one strong earthquake, the spatial distributions of the anomalies which include medium term anomalies of one year scale, short term anomalies and imminent anomalies, and underground water stations without the anomalies were mainly related to the causative mechanism and active master faults (active abyssal faults or strongly active faults) around the focal region; The spatial distribution of the anomalies coincided with the specific relation among the anomalies, the focal site, the causative mechanism and active master faults. Finally, the mechanism of the relation was briefly discussed, and the importance about the research result in this paper was set forth.
基金supported by the Natural Science Foundation of Fujian Province (No. 2022J01566)。
文摘Anomaly detection for the control rod drive mechanism(CRDM) is key to enhancing the security of nuclear power plant equipment. In CRDM real-time condition-based maintenance, most existing methods cannot deal with long sequences and periodic abnormal events and have poor feature extraction from these data. In this paper,a learning-based anomaly detection method employing a long short-term memory-based autoencoder(LSTM-AE)network and an extreme gradient boosting(XGBoost)algorithm is proposed for the CRDM. The nonlinear and sequential features of the CRDM coil currents can be automatically and efficiently extracted by the LSTM neural units and AE network. The normal behavior LSTM-AE model was established to reconstruct the errors when feeding abnormal coil current signals. The XGBoost algorithm was leveraged to monitor the residuals and identify outliers for the coil currents. The results demonstrate that the proposed anomaly detection method can effectively detect different timing sequence anomalies and provide a more accurate forecasting performance for CRDM coil current signals.
基金supported by the Science for Earthquake Resilience of China(No.XH18027)Research and Development of Comprehensive Geophysical Field Observing Instrument in China's Mainland(No.Y201703)Research Fund Project of Shandong Earthquake Agency(Nos.JJ1505Y and JJ1602)
文摘Earthquake precursor data have been used as an important basis for earthquake prediction.In this study,a recurrent neural network(RNN)architecture with long short-term memory(LSTM)units is utilized to develop a predictive model for normal data.Furthermore,the prediction errors from the predictive models are used to indicate normal or abnormal behavior.An additional advantage of using the LSTM networks is that the earthquake precursor data can be directly fed into the network without any elaborate preprocessing as required by other approaches.Furthermore,no prior information on abnormal data is needed by these networks as they are trained only using normal data.Experiments using three groups of real data were conducted to compare the anomaly detection results of the proposed method with those of manual recognition.The comparison results indicated that the proposed LSTM network achieves promising results and is viable for detecting anomalies in earthquake precursor data.
基金National Natural Science Foundation of China(4127504841461164006+1 种基金9081502891215302)
文摘Snow cover on the Tibetan Plateau(TP) has been shown to be essential for the East Asian summer monsoon.In this paper, we demonstrate that tropical cyclone(TC) 04B(1999) in the northern Indian Ocean, which made landfall during the autumn of 1999, may have contributed to climate anomalies over East Asia during the following spring and summer by increasing snow cover on the TP. Observations indicate that snow cover on the TP increased markedly after TC 04B(1999) made landfall in October of 1999. Sensitivity experiments, in which the TC was removed from a numerical model simulation of the initial field, verified that TC 04B(1999) affected the distribution as well as increased the amount of snow on the TP. In addition, the short-term numerical modeling of the climate over the region showed that the positive snow cover anomaly induced negative surface temperature, negative sensible heat flux, positive latent heat flux, and positive soil temperature anomalies over the central and southern TP during the following spring and summer. These climate anomalies over the TP were associated with positive(negative) summer precipitation anomalies over the Yangtze River valley(along the southeastern coast of China).
文摘From Octobet 1998 to January 1999,5 earthquakes ( M s≥5) occurred between Ninglang and Yanyuan counties (27°07′~27°12′N,100°40′~101°00′E area).They were situated in 140km southwest of the Xichang.Among them,the largest one is M s 6 2 on November 19,1998.Based on small seismic data by the seismic remote sensing station of Xichang and the seismological station of Muli,and regional observation data,passing through careful observation and scientific analyses,we had made better forecasts before the earthquakes.That results obvious social benefits.By processing data of precursory earthquakes,such as,original observation data of total geomagnetic intensity from the station of Xichang,pressure capacitance stressometer and quartz horizaontal pendulum tiltmeter from the Xiaomiao station of Xichang,we summarized the sequence characteristics of the series earthquakes.The information about short\|term anomaly of gruond strain,total geomagnetic intensity and ground tilt before the earthquake is emphatically explained.
基金National Key R&D Program of China(No.2020YFB1707700)。
文摘The problems in equipment fault detection include data dimension explosion,computational complexity,low detection accuracy,etc.To solve these problems,a device anomaly detection algorithm based on enhanced long short-term memory(LSTM)is proposed.The algorithm first reduces the dimensionality of the device sensor data by principal component analysis(PCA),extracts the strongly correlated variable data among the multidimensional sensor data with the lowest possible information loss,and then uses the enhanced stacked LSTM to predict the extracted temporal data,thus improving the accuracy of anomaly detection.To improve the efficiency of the anomaly detection,a genetic algorithm(GA)is used to adjust the magnitude of the enhancements made by the LSTM model.The validation of the actual data from the pumps shows that the algorithm has significantly improved the recall rate and the detection speed of device anomaly detection,with the recall rate of 97.07%,which indicates that the algorithm is effective and efficient for device anomaly detection in the actual production environment.
文摘In this article,we comment on the paper by Kakinuma et al published recently.We focus specifically on the diagnosis of uterine pseudoaneurysm,but we also review other uterine vascular anomalies that may be the cause of life-threating hemorrhage and the different causes of uterine pseudoaneurysms.Uterine artery pseudoaneurysm is a complication of both surgical gynecological and nontraumatic procedures.Massive hemorrhage is the consequence of the rupture of the pseudoaneurysm.Uterine artery pseudoaneurysm can develop after obstetric or gynecological procedures,being the most frequent after cesarean or vaginal deliveries,curettage and even during pregnancy.However,there are several cases described unrelated to pregnancy,such as after conization,hysteroscopic surgery or laparoscopic myomectomy.Hemorrhage is the clinical manifestation and it can be life-threatening so suspicion of this vascular lesion is essential for early diagnosis and treatment.However,there are other uterine vascular anomalies that may be the cause of severe hemorrhage,which must be taken into account in the differential diagnosis.Computed tomography angiography and embolization is supposed to be the first therapeutic option in most of them.