期刊文献+
共找到550,657篇文章
< 1 2 250 >
每页显示 20 50 100
China’s Global Space-based TT&C Network System Established
1
作者 Yu Miao 《Aerospace China》 2012年第3期14-16,共3页
The Tianlian 1-03 satellite, the third geosynchronous data relay satellite of China, was successfully launched into space on a LM-3C launch vehicle from the Xichang Satellite Launch Center at 23:43 Beijing time on Jul... The Tianlian 1-03 satellite, the third geosynchronous data relay satellite of China, was successfully launched into space on a LM-3C launch vehicle from the Xichang Satellite Launch Center at 23:43 Beijing time on July 25. Twenty-six minutes after the liftoff, the satellite 展开更多
关键词 tt china s Global Space-based tt&c network System Established
在线阅读 下载PDF
RE-UKAN:A Medical Image Segmentation Network Based on Residual Network and Efficient Local Attention
2
作者 Bo Li Jie Jia +2 位作者 Peiwen Tan Xinyan Chen Dongjin Li 《Computers, Materials & Continua》 2026年第3期2184-2200,共17页
Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual infor... Medical image segmentation is of critical importance in the domain of contemporary medical imaging.However,U-Net and its variants exhibit limitations in capturing complex nonlinear patterns and global contextual information.Although the subsequent U-KAN model enhances nonlinear representation capabilities,it still faces challenges such as gradient vanishing during deep network training and spatial detail loss during feature downsampling,resulting in insufficient segmentation accuracy for edge structures and minute lesions.To address these challenges,this paper proposes the RE-UKAN model,which innovatively improves upon U-KAN.Firstly,a residual network is introduced into the encoder to effectively mitigate gradient vanishing through cross-layer identity mappings,thus enhancing modelling capabilities for complex pathological structures.Secondly,Efficient Local Attention(ELA)is integrated to suppress spatial detail loss during downsampling,thereby improving the perception of edge structures and minute lesions.Experimental results on four public datasets demonstrate that RE-UKAN outperforms existing medical image segmentation methods across multiple evaluation metrics,with particularly outstanding performance on the TN-SCUI 2020 dataset,achieving IoU of 88.18%and Dice of 93.57%.Compared to the baseline model,it achieves improvements of 3.05%and 1.72%,respectively.These results fully demonstrate RE-UKAN’s superior detail retention capability and boundary recognition accuracy in complex medical image segmentation tasks,providing a reliable solution for clinical precision segmentation. 展开更多
关键词 Image segmentation U-KAN residual network ELA
在线阅读 下载PDF
Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features
3
作者 Ghadah Naif Alwakid Samabia Tehsin +3 位作者 Mamoona Humayun Asad Farooq Ibrahim Alrashdi Amjad Alsirhani 《Computers, Materials & Continua》 2026年第1期1964-1984,共21页
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ... Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems. 展开更多
关键词 Graph neural network image classification DermaMNIST dataset graph representation
在线阅读 下载PDF
A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection
4
作者 Zheng Zhang Jie Hao +2 位作者 Liquan Chen Tianhao Hou Yanan Liu 《Computers, Materials & Continua》 2026年第1期1119-1140,共22页
With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion det... With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID. 展开更多
关键词 network intrusion detection class imbalance problem deep learning
在线阅读 下载PDF
Semantic-Guided Stereo Matching Network Based on Parallax Attention Mechanism and Seg Former
5
作者 Zeyuan Chen Yafei Xie +2 位作者 Jinkun Li Song Wang Yingqiang Ding 《Computers, Materials & Continua》 2026年第4期1322-1340,共19页
Stereo matching is a pivotal task in computer vision,enabling precise depth estimation from stereo image pairs,yet it encounters challenges in regions with reflections,repetitive textures,or fine structures.In this pa... Stereo matching is a pivotal task in computer vision,enabling precise depth estimation from stereo image pairs,yet it encounters challenges in regions with reflections,repetitive textures,or fine structures.In this paper,we propose a Semantic-Guided Parallax Attention Stereo Matching Network(SGPASMnet)that can be trained in unsupervised manner,building upon the Parallax Attention Stereo Matching Network(PASMnet).Our approach leverages unsupervised learning to address the scarcity of ground truth disparity in stereo matching datasets,facilitating robust training across diverse scene-specific datasets and enhancing generalization.SGPASMnet incorporates two novel components:a Cross-Scale Feature Interaction(CSFI)block and semantic feature augmentation using a pre-trained semantic segmentation model,SegFormer,seamlessly embedded into the parallax attention mechanism.The CSFI block enables effective fusion ofmulti-scale features,integrating coarse and fine details to enhance disparity estimation accuracy.Semantic features,extracted by SegFormer,enrich the parallax attention mechanism by providing high-level scene context,significantly improving performance in ambiguous regions.Our model unifies these enhancements within a cohesive architecture,comprising semantic feature extraction,an hourglass network,a semantic-guided cascaded parallax attentionmodule,outputmodule,and a disparity refinement network.Evaluations on the KITTI2015 dataset demonstrate that our unsupervised method achieves a lower error rate compared to the original PASMnet,highlighting the effectiveness of our enhancements in handling complex scenes.By harnessing unsupervised learning without ground truth disparity needed,SGPASMnet offers a scalable and robust solution for accurate stereo matching,with superior generalization across varied real-world applications. 展开更多
关键词 Stereo matching parallax attention unsupervised learning convolutional neural network stereo correspondence
在线阅读 下载PDF
A Comparative Benchmark of Machine and Deep Learning for Cyberattack Detection in IoT Networks
6
作者 Enzo Hoummady Fehmi Jaafar 《Computers, Materials & Continua》 2026年第4期1070-1092,共23页
With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and ... With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic.This paper presents a comparative benchmark of classic machine learning(ML)and state-of-the-art deep learning(DL)algorithms for IoT intrusion detection.Our methodology employs a twophased approach:a preliminary pilot study using a custom-generated dataset to establish baselines,followed by a comprehensive evaluation on the large-scale CICIoTDataset2023.We benchmarked algorithms including Random Forest,XGBoost,CNN,and StackedLSTM.The results indicate that while top-performingmodels frombothcategories achieve over 99%classification accuracy,this metric masks a crucial performance trade-off.We demonstrate that treebased ML ensembles exhibit superior precision(91%)in identifying benign traffic,making them effective at reducing false positives.Conversely,DL models demonstrate superior recall(96%),making them better suited for minimizing the interruption of legitimate traffic.We conclude that the selection of an optimal model is not merely a matter of maximizing accuracy but is a strategic choice dependent on the specific security priority either minimizing false alarms or ensuring service availability.Thiswork provides a practical framework for deploying context-aware security solutions in diverse IoT environments. 展开更多
关键词 Internet of Things deep learning abnormal network traffic cyberattacks machine learning
在线阅读 下载PDF
A generalizable physics-informed neural network for lithium-ion battery SOH estimation utilizing partial charging segments
7
作者 Sijing Wang Ruoyu Zhou +3 位作者 Yijia Ren Honglai Liu Yiting Lin Cheng Lian 《Journal of Energy Chemistry》 2026年第1期977-986,I0021,共11页
Accurate state of health(SOH)estimation is essential for the safe and reliable operation of lithium-ion batteries.However,existing methods face significant challenges,primarily because they rely on complete charge–di... Accurate state of health(SOH)estimation is essential for the safe and reliable operation of lithium-ion batteries.However,existing methods face significant challenges,primarily because they rely on complete charge–discharge cycles and fixed-form physical constraints,which limit adaptability to different chemistries and real-world conditions.To address these issues,this study proposes an approach that extracts features from segmented state of charge(SOC)intervals and integrates them into an enhanced physics-informed neural network(PINN).Specifically,voltage data within the 25%–75%SOC range during charging are used to derive statistical,time–frequency,and mechanism-based features that capture degradation trends.A hybrid PINN-Lasso-Transformer-BiLSTM architecture is developed,where Lasso regression enables sparse feature selection,and a nonlinear empirical degradation model is embedded as a learnable physical term within a dynamically scaled composite loss.This design adaptively balances data-driven accuracy with physical consistency,thereby enhancing estimation precision,robustness,and generalization.The results show that the proposed method outperforms conventional neural networks across four battery chemistries,achieving root mean square error and mean absolute error below 1%.Notably,features from partial charging segments exhibit higher robustness than those from full cycles.Furthermore,the model maintains strong performance under high temperatures and demonstrates excellent generalization capacity in transfer learning across chemistries,temperatures,and C-rates.This work establishes a scalable and interpretable solution for accurate SOH estimation under diverse practical operating conditions. 展开更多
关键词 State of health Feature extraction charging process Physics-informed neural network Generalization
在线阅读 下载PDF
Attention Mechanisms and FFM Feature Fusion Module-Based Modification of the Deep Neural Network for Detection of Structural Cracks
8
作者 Tao Jin Zhekun Shou +1 位作者 Hongchao Liu Yuchun Shao 《Computer Modeling in Engineering & Sciences》 2026年第2期345-366,共22页
This research centers on structural health monitoring of bridges,a critical transportation infrastructure.Owing to the cumulative action of heavy vehicle loads,environmental variations,and material aging,bridge compon... This research centers on structural health monitoring of bridges,a critical transportation infrastructure.Owing to the cumulative action of heavy vehicle loads,environmental variations,and material aging,bridge components are prone to cracks and other defects,severely compromising structural safety and service life.Traditional inspection methods relying on manual visual assessment or vehicle-mounted sensors suffer from low efficiency,strong subjectivity,and high costs,while conventional image processing techniques and early deep learning models(e.g.,UNet,Faster R-CNN)still performinadequately in complex environments(e.g.,varying illumination,noise,false cracks)due to poor perception of fine cracks andmulti-scale features,limiting practical application.To address these challenges,this paper proposes CACNN-Net(CBAM-Augmented CNN),a novel dual-encoder architecture that innovatively couples a CNN for local detail extraction with a CBAM-Transformer for global context modeling.A key contribution is the dedicated Feature FusionModule(FFM),which strategically integratesmulti-scale features and focuses attention on crack regions while suppressing irrelevant noise.Experiments on bridge crack datasets demonstrate that CACNNNet achieves a precision of 77.6%,a recall of 79.4%,and an mIoU of 62.7%.These results significantly outperform several typical models(e.g.,UNet-ResNet34,Deeplabv3),confirming their superior accuracy and robust generalization,providing a high-precision automated solution for bridge crack detection and a novel network design paradigm for structural surface defect identification in complex scenarios,while future research may integrate physical features like depth information to advance intelligent infrastructure maintenance and digital twin management. 展开更多
关键词 Bridge crack diseases structural health monitoring convolutional neural network feature fusion
在线阅读 下载PDF
A designed flexible solid-state electrolyte with rich hydrogen-bonded networks from TPU-PEGDA/LLZTO for Li metal batteries
9
作者 Haowen Li Hongying Hou +10 位作者 Dai-Huo Liu Bao Li Dongmei Dai Bao Wang Mengmin Jia Zhuangzhuang Zhang Liang Wang Yaru Qiao Canhui Wu Huihui Zhu Pengyao Yan 《Chinese Chemical Letters》 2026年第2期564-569,共6页
Thermoplastic polyurethane(TPU)consists of a hardsegment and a soft segment,where the former affords mechanical strength and thermalstability,while the latter provides a possibility of good ionic conductivity by promo... Thermoplastic polyurethane(TPU)consists of a hardsegment and a soft segment,where the former affords mechanical strength and thermalstability,while the latter provides a possibility of good ionic conductivity by promoting dissociation of ions from the lithium salt.Thus,TPU attracts a wide interest recently as a promising polymer electrolyte for solid-state lithium batteries.However,the relatively low ionic conductivity of TPU still restricts its actual applications due to the aggregation of polymer chains,which greatly reduces the dissociation of lithium salts.Herein,a strategy to address this challenge was adopted by in situ polymerization poly(ethylene glycol diacrylate)(PEGDA)in fully dispersed TPU.Hence a stretchable solid-state electrolyte(denoted as TELL and the contrast sample was denoted as TLL)with high ionic conductivity of 7.18×10^(-4) S/cm was obtained at room temperature.The Li^(+)transference number is 0.85 in Li|TELL|Li cell and can stably undergo charge-discharge cycles for 1400 h at a current density of O.1 mA/cm^(2),while the contrast sample is short-circuited after 634 h of cycling.The LiFePO_(4)|TELL|Li cell achieves a capacity retention of 78.93%after 200 cycles at 2 C.The LiFePO_(4) TLL Li cellonly gains the capacity retention of 51.9%after 50 cyclesat the same current density.So,the method adopted here may provide a new approach to realize a flexible solid-state electrolyte with high ion-conductivity. 展开更多
关键词 Poly(ethylene glycol diacrylate) THERMOPLASTIc Hydrogen-bonded network High ion-conductivity Solid-state lithium batteries
原文传递
Fracture-pore networks and brittle with ductile stress-strain mechanisms:Triaxial tests on>7,600 m samples yield insights for 10,000-m deep sandstones
10
作者 Guoqi WEI Zhe ZHAO +7 位作者 Ronghu ZHANG Kaixun ZHANG Stephen ELAUBACH Chengzao JIA Qinglu ZENG Chaofeng YU Jin LAI Xiaofei XIN 《Science China Earth Sciences》 2026年第2期702-720,共19页
Basins in western China produce hydrocarbons from 8,000 m deep and have been penetrated to 10,000 m,but the mechanical and petrophysical properties of deep and ultra-deep rocks are unclear and the origins of porosity ... Basins in western China produce hydrocarbons from 8,000 m deep and have been penetrated to 10,000 m,but the mechanical and petrophysical properties of deep and ultra-deep rocks are unclear and the origins of porosity and permeability remain a mystery.Our research used core samples from a depth of 7,600 m and mechanical tests to document the likely structural and porosity evolution of sandstone due to burial to 10,000 m.During triaxial tests,we characterized microstructure evolution using micro-CT scanning images and acoustic emissions and monitored stress and strain characteristics in high-temperature and high-pressure fluid environments.Under ultra deep-burial conditions,our samples deformed by pore collapse and pore distortion and brittle and ductile fracture,independently or concurrently.Under increasing triaxial stress,temperature and fluid pressure,sandstones initially lose porosity and permeability by pore collapse and compaction then develop a network of interconnected pores and fractures.Consequently,porosity can reach 8% to 18%,possibly accounting for fluid storage and flow capacity at depths of 10,000 m.Samples from 7,600 m lack substantial quartz,calcite cement and rapid burial for our samples and rocks at 10,000 m and quartz,calcite accumulation systematics suggests that though subject to temperatures of as much as 200°C,porosity loss and gain in sandstones at 10,000 m may be primarily due to compaction.Our tests show that due to pore collapse and grain fracture,sandstones having high initial porosity and permeability have a greater increase of porosity and permeability due to loading. 展开更多
关键词 Brittle-ductile deformation Fracture-pore networks Sandstone Stress and strain Triaxial tests Ultra-deep reservoirs(>7.6 km)
原文传递
综合负样本优化指数与CNN-LSTM-ATT模型的滑坡易发性评价
11
作者 曹琰波 移康军 +5 位作者 梁鑫 荆海宇 孙颢宸 张越轩 刘思缘 范文 《安全与环境工程》 北大核心 2026年第1期69-85,共17页
针对滑坡易发性建模过程中随机抽取的非滑坡样本不确定性高、机器学习模型预测精度有限的问题,提出一种基于负样本优化指数(negative sample optimization index,NSI)的非滑坡样本采样策略,并融合卷积神经网络(convolutional neural net... 针对滑坡易发性建模过程中随机抽取的非滑坡样本不确定性高、机器学习模型预测精度有限的问题,提出一种基于负样本优化指数(negative sample optimization index,NSI)的非滑坡样本采样策略,并融合卷积神经网络(convolutional neural network,CNN)、长短时记忆(long short-term memory,LSTM)网络和注意力机制(attention mechanism,ATT)构建CNN-LSTM-ATT深度神经网络开展易发性评价。以陕西省北部黄土高原地区的绥德县义合镇为例,首先,选取高程、坡度、地层岩性等14个孕灾因子建立评价指标体系;其次,引入Matthews相关系数为随机森林(random forest,RF)、逻辑回归(logistic regression,LR)和支持向量机(support vector machine,SVM)3种基模型分配权重,并计算NSI值;然后,基于NSI选取非滑坡样本,并与滑坡样本组成训练数据集;最后,利用CNNLSTM-ATT模型预测滑坡空间概率,通过SHAP值分析揭示各因子的重要程度。结果表明:NSI通过约束采样空间获得了质量更高的非滑坡样本,规避了因过度偏激的负样本所造成的预测误差,模型精度最大提升7%;相较于单一模型,集成多层复杂结构的CNN-LSTM-ATT模型具有更好的分类能力,预测精度达0.925;坡度、高程和距房屋距离是研究区易发性建模的关键因子。研究提出的采样策略和评价模型有助于提高滑坡灾害空间预测的精度。 展开更多
关键词 滑坡灾害 易发性 负样本优化指数(NSI) 卷积神经网络(cNN) 长短时记忆(LSTM)网络 注意力机制(Att)
在线阅读 下载PDF
Robustness Optimization Algorithm with Multi-Granularity Integration for Scale-Free Networks Against Malicious Attacks 被引量:1
12
作者 ZHANG Yiheng LI Jinhai 《昆明理工大学学报(自然科学版)》 北大核心 2025年第1期54-71,共18页
Complex network models are frequently employed for simulating and studyingdiverse real-world complex systems.Among these models,scale-free networks typically exhibit greater fragility to malicious attacks.Consequently... Complex network models are frequently employed for simulating and studyingdiverse real-world complex systems.Among these models,scale-free networks typically exhibit greater fragility to malicious attacks.Consequently,enhancing the robustness of scale-free networks has become a pressing issue.To address this problem,this paper proposes a Multi-Granularity Integration Algorithm(MGIA),which aims to improve the robustness of scale-free networks while keeping the initial degree of each node unchanged,ensuring network connectivity and avoiding the generation of multiple edges.The algorithm generates a multi-granularity structure from the initial network to be optimized,then uses different optimization strategies to optimize the networks at various granular layers in this structure,and finally realizes the information exchange between different granular layers,thereby further enhancing the optimization effect.We propose new network refresh,crossover,and mutation operators to ensure that the optimized network satisfies the given constraints.Meanwhile,we propose new network similarity and network dissimilarity evaluation metrics to improve the effectiveness of the optimization operators in the algorithm.In the experiments,the MGIA enhances the robustness of the scale-free network by 67.6%.This improvement is approximately 17.2%higher than the optimization effects achieved by eight currently existing complex network robustness optimization algorithms. 展开更多
关键词 complex network model MULTI-GRANULARITY scale-free networks ROBUSTNESS algorithm integration
原文传递
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
13
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
14
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
15
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
16
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
17
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network cLUSTERING web services similarity measure
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
18
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
19
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVAcY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部