In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently in...In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.展开更多
This paper addresses the performance degradation issue in a fast radio burst search pipeline based on deep learning.This issue is caused by the class imbalance of the radio frequency interference samples in the traini...This paper addresses the performance degradation issue in a fast radio burst search pipeline based on deep learning.This issue is caused by the class imbalance of the radio frequency interference samples in the training dataset,and one solution is applied to improve the distribution of the training data by augmenting minority class samples using a deep convolutional generative adversarial network.Experi.mental results demonstrate that retraining the deep learning model with the newly generated dataset leads to a new fast radio burst classifier,which effectively reduces false positives caused by periodic wide-band impulsive radio frequency interference,thereby enhancing the performance of the search pipeline.展开更多
How the tubular network of the endoplasmic reticulum (ER) is generated is not well understood, but a class of membrane proteins, the reticulons and DP1/Yop1p, are known
Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are bas...Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.展开更多
With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion det...With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID.展开更多
A multi-class method is proposed based on Error Correcting Output Codes algorithm in order to get better performance of attack recognition in Wireless Sensor Networks. Aiming to enhance the accuracy of attack detectio...A multi-class method is proposed based on Error Correcting Output Codes algorithm in order to get better performance of attack recognition in Wireless Sensor Networks. Aiming to enhance the accuracy of attack detection, the multi-class method is constructed with Hadamard matrix and two-class Support Vector Machines. In order to minimize the complexity of the algorithm, sparse coding method is applied in this paper. The comprehensive experimental results show that this modified multi-class method has better attack detection rate compared with other three coding algorithms, and its time efficiency is higher than Hadamard coding algorithm.展开更多
With the high-speed development of the Internet,a growing number of Internet users like giving their subjective comments in the BBS,blog and shopping website.These comments contains critics’attitudes,emotions,views a...With the high-speed development of the Internet,a growing number of Internet users like giving their subjective comments in the BBS,blog and shopping website.These comments contains critics’attitudes,emotions,views and other information.Using these information reasonablely can help understand the social public opinion and make a timely response and help dealer to improve quality and service of products and make consumers know merchandise.This paper mainly discusses using convolutional neural network(CNN)for the operation of the text feature extraction.The concrete realization are discussed.Then combining with other text classifier make class operation.The experiment result shows the effectiveness of the method which is proposed in this paper.展开更多
Feature fusion is an important technique in medical image classification that can improve diagnostic accuracy by integrating complementary information from multiple sources.Recently,Deep Learning(DL)has been widely us...Feature fusion is an important technique in medical image classification that can improve diagnostic accuracy by integrating complementary information from multiple sources.Recently,Deep Learning(DL)has been widely used in pulmonary disease diagnosis,such as pneumonia and tuberculosis.However,traditional feature fusion methods often suffer from feature disparity,information loss,redundancy,and increased complexity,hindering the further extension of DL algorithms.To solve this problem,we propose a Graph-Convolution Fusion Network with Self-Supervised Feature Alignment(Self-FAGCFN)to address the limitations of traditional feature fusion methods in deep learning-based medical image classification for respiratory diseases such as pneumonia and tuberculosis.The network integrates Convolutional Neural Networks(CNNs)for robust feature extraction from two-dimensional grid structures and Graph Convolutional Networks(GCNs)within a Graph Neural Network branch to capture features based on graph structure,focusing on significant node representations.Additionally,an Attention-Embedding Ensemble Block is included to capture critical features from GCN outputs.To ensure effective feature alignment between pre-and post-fusion stages,we introduce a feature alignment loss that minimizes disparities.Moreover,to address the limitations of proposed methods,such as inappropriate centroid discrepancies during feature alignment and class imbalance in the dataset,we develop a Feature-Centroid Fusion(FCF)strategy and a Multi-Level Feature-Centroid Update(MLFCU)algorithm,respectively.Extensive experiments on public datasets LungVision and Chest-Xray demonstrate that the Self-FAGCFN model significantly outperforms existing methods in diagnosing pneumonia and tuberculosis,highlighting its potential for practical medical applications.展开更多
Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accu...Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments.展开更多
Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class at...Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class attacks,this study proposes an intrusion detection method based on a two-layer structure.The first layer employs a CNN-BiLSTM model incorporating an attention mechanism to classify network traffic into normal traffic,majority class attacks,and merged minority class attacks.The second layer further segments the minority class attacks through Stacking ensemble learning.The datasets are selected from the generic network dataset CIC-IDS2017,NSL-KDD,and the industrial network dataset Mississippi Gas Pipeline dataset to enhance the generalization and practical applicability of the model.Experimental results show that the proposed model achieves an overall detection accuracy of 99%,99%,and 95%on the CIC-IDS2017,NSL-KDD,and industrial network datasets,respectively.It also significantly outperforms traditional methods in terms of detection accuracy and recall rate for minority class attacks.Compared with the single-layer deep learning model,the two-layer structure effectively reduces the false alarm rate while improving the minority-class attack detection performance.The research in this paper not only improves the adaptability of NIDS to complex network environments but also provides a new solution for minority-class attack detection in industrial network security.展开更多
A new method to evaluate the fitness of the Bayesian networks according to the observed data is provided. The main advantage of this criterion is that it is suitable for both the complete and incomplete cases while th...A new method to evaluate the fitness of the Bayesian networks according to the observed data is provided. The main advantage of this criterion is that it is suitable for both the complete and incomplete cases while the others not. Moreover it facilitates the computation greatly. In order to reduce the search space, the notation of equivalent class proposed by David Chickering is adopted. Instead of using the method directly, the novel criterion, variable ordering, and equivalent class are combined,moreover the proposed mthod avoids some problems caused by the previous one. Later, the genetic algorithm which allows global convergence, lack in the most of the methods searching for Bayesian network is applied to search for a good model in thisspace. To speed up the convergence, the genetic algorithm is combined with the greedy algorithm. Finally, the simulation shows the validity of the proposed approach.展开更多
Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education cl...Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education classes equivalent to secondary school level (class A = 23 inmates and B = 12 inmates, all male) at a correctional facility. Questionnaires were used. Network analysis software (Visone) and conventional statistics (SPSS) are used for calculating network variables (indegree, outdegree, katz, pageranketc) and implementing Spearman test and Principal Component Analysis. Inmates who have adopted an animal-friendly value system and are too coward to react against torture of animals, maintain a repressed emotion. If they do not intervene and provoke, then they are also not targeted by others. No reaction against torture is also connected with a deep-rooted aggressiveness. Concerning superficial aggressiveness, a profile, whose characterize is multiple verbal aggressiveness, can be attributed to repressed emotions. A type is torturing and indifferently restricts his aggressiveness, as he can satisfy his need of dominance by being aggressive towards animals. A type of inmate who loves animals and reacts against their torture, presents the most restricted and relatively smooth aggressiveness, as he discharges his repressed emotions to this reaction. Under condition of indifference, keeping pets is not evidence of loving but of a need of companionship. As for the deep-rooted aggressiveness (over-extroversion), it does not seem to be triggered by any repression.展开更多
Learning Bayesian network structure is one of the most important branches in Bayesian network. The most popular graphical representative of a Bayesian network structure is an essential graph. This paper shows a combin...Learning Bayesian network structure is one of the most important branches in Bayesian network. The most popular graphical representative of a Bayesian network structure is an essential graph. This paper shows a combined algorithm according to the three rules for finding the essential graph of a given directed acyclic graph. Moreover, the complexity and advantages of this combined algorithm over others are also discussed. The aim of this paper is to present the proof of the correctness of the combined algorithm.展开更多
Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental problems.Its attributes as a non-toxic,low-carbon,and economical substitute for conventio...Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental problems.Its attributes as a non-toxic,low-carbon,and economical substitute for conventional cement concrete,coupled with its elevated compressive strength and reduced shrinkage properties,position it as a pivotal material for diverse applications spanning from architectural structures to transportation infrastructure.In this context,this study sets out the task of using machine learning(ML)algorithms to increase the accuracy and interpretability of predicting the compressive strength of geopolymer concrete in the civil engineering field.To achieve this goal,a new approach using convolutional neural networks(CNNs)has been adopted.This study focuses on creating a comprehensive dataset consisting of compositional and strength parameters of 162 geopolymer concrete mixes,all containing Class F fly ash.The selection of optimal input parameters is guided by two distinct criteria.The first criterion leverages insights garnered from previous research on the influence of individual features on compressive strength.The second criterion scrutinizes the impact of these features within the model’s predictive framework.Key to enhancing the CNN model’s performance is the meticulous determination of the optimal hyperparameters.Through a systematic trial-and-error process,the study ascertains the ideal number of epochs for data division and the optimal value of k for k-fold cross-validation—a technique vital to the model’s robustness.The model’s predictive prowess is rigorously assessed via a suite of performance metrics and comprehensive score analyses.Furthermore,the model’s adaptability is gauged by integrating a secondary dataset into its predictive framework,facilitating a comparative evaluation against conventional prediction methods.To unravel the intricacies of the CNN model’s learning trajectory,a loss plot is deployed to elucidate its learning rate.The study culminates in compelling findings that underscore the CNN model’s accurate prediction of geopolymer concrete compressive strength.To maximize the dataset’s potential,the application of bivariate plots unveils nuanced trends and interactions among variables,fortifying the consistency with earlier research.Evidenced by promising prediction accuracy,the study’s outcomes hold significant promise in guiding the development of innovative geopolymer concrete formulations,thereby reinforcing its role as an eco-conscious and robust construction material.The findings prove that the CNN model accurately estimated geopolymer concrete’s compressive strength.The results show that the prediction accuracy is promising and can be used for the development of new geopolymer concrete mixes.The outcomes not only underscore the significance of leveraging technology for sustainable construction practices but also pave the way for innovation and efficiency in the field of civil engineering.展开更多
Wireless sensor networks(WSNs)are characterized by heterogeneous traffic types(audio,video,data)and diverse application traffic requirements.This paper introduces three traffic classes following the defined model of h...Wireless sensor networks(WSNs)are characterized by heterogeneous traffic types(audio,video,data)and diverse application traffic requirements.This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs.The requirements for each class regarding sensitivity to QoS(Quality of Service)parameters,such as loss,delay,and jitter,are described.These classes encompass real-time and delay-tolerant traffic.Given that QoS evaluation is a multi-criteria decision-making problem,we employed the AHP(Analytical Hierarchy Process)method for multi-criteria optimization.As a result of this approach,we derived weight values for different traffic classes based on key QoS factors and requirements.These weights are assigned to individual traffic classes to determine transmission priority.This study provides a thorough comparative analysis of the proposed model against existing methods,demonstrating its superior performance across various traffic scenarios and its implications for future WSN applications.The results highlight the model’s adaptability and robustness in optimizing network resources under varying conditions,offering insights into practical deployments in real-world scenarios.Additionally,the paper includes an analysis of energy consumption,underscoring the trade-offs between QoS performance and energy efficiency.This study presents the development of a differentiated services model for heterogeneous traffic in wireless sensor networks,considering the appropriate QoS framework supported by experimental analyses.展开更多
Objective:To collect the main components and targets of Jiang-zhi-dai-pao-cha(JZDPC)and investigate the mechanism of JZDPC for the treatment of hyperlipidemia by network pharmacology.Methods:The components and targets...Objective:To collect the main components and targets of Jiang-zhi-dai-pao-cha(JZDPC)and investigate the mechanism of JZDPC for the treatment of hyperlipidemia by network pharmacology.Methods:The components and targets of JZDPC were searched from ETCM databases,the targets related to hyperlipidemia were searched from DisGeNET and GeneCards databases,and then the intersection targets and corresponding key components were obtained.Cytoscape 3.8.2 software was used to construct and analyze networks,and then Metascape online database was applied for gene ontology(GO)enrichment analysis and Kyoto Encyclopedia of genes and genomes(KEGG)pathway enrichment analysis of core putative targets.Results:There were 99 overlapping targets between JZDPC and hyperlipidemia,among which NR3C1,ESR1,NR1I2,NFKB1,ESR2,ALOX5,PTGS1,PPARA,RXRA,LPL,PLA2G1B,PYGM,CYP2C9 were the core putative targets,and many members of nuclear receptor 1(NR1)subfamily were included.The core components of JZDPC,such as Ursolic Acid,β-Sitosterol,Resveratrol,Arirubic Acid,Alisol A,Oleanolic Acid,Rhein,Chrysophanol and Emodin,can regulate blood lipid by regulating a series of signaling pathways including the above core potential targets,such as non-alcoholic fatty liver disease(NAFLD)signaling pathway,pathways in cancer,arachidonic acid(AA)metabolism signaling pathway and peroxisome proliferator activated receptor(PPAR)signaling pathway,Starch and sucrose metabolism signaling pathway,etc.They play many roles in the treatment of hyperlipidemia by participating in lipid synthesis and metabolism,anti inflammation,anti oxidative stress,regulating hormone levels and carbohydrate metabolism.Conclusion:Network pharmacology provides a theoretical basis for investigating the mechanism of action of JZDPC,and the NAFLD signaling pathway is one of the most valuable pathways.展开更多
With the rapid development of China's mobile internet era, the internet has brought great changes to people's daily life, work and various fields. At the same time, with the rapid development and rise of moder...With the rapid development of China's mobile internet era, the internet has brought great changes to people's daily life, work and various fields. At the same time, with the rapid development and rise of modern network education in our country, great social changes have taken place in the teaching mode of teachers' cultural and moral education concepts, students' cultural and educational concepts, learning styles, life management styles. Therefore, under the background of the development of basic education network information technology in the current new information age, how to effectively use the advantages of network information technology to guide the organization and coordination of the development of the school basic education network is also very important. This paper makes a simple analysis of the problems existing in the online sports live broadcast class and puts forward some suggestions.展开更多
In this paper,the authors are concerned with global asymptotic synchronization for a class of BAM neural networks with time delays.Instead of using Lyapunov functional method,LMI method and matrix measure method which...In this paper,the authors are concerned with global asymptotic synchronization for a class of BAM neural networks with time delays.Instead of using Lyapunov functional method,LMI method and matrix measure method which are recently widely applied to investigating global exponential/asymptotic synchronization for neural networks,two novel sufficient conditions on global asymptotic synchronization of above BAM neural networks are established by using a kind of new study method of global synchronization:Integrating inequality techniques.The method and results extend the study of global synchronization of neural networks.展开更多
Purpose-Adequate resources for learning and training the data are an important constraint to develop an efficient classifier with outstanding performance.The data usually follows a biased distribution of classes that ...Purpose-Adequate resources for learning and training the data are an important constraint to develop an efficient classifier with outstanding performance.The data usually follows a biased distribution of classes that reflects an unequal distribution of classes within a dataset.This issue is known as the imbalance problem,which is one of the most common issues occurring in real-time applications.Learning of imbalanced datasets is a ubiquitous challenge in the field of data mining.Imbalanced data degrades the performance of the classifier by producing inaccurate results.Design/methodology/approach-In the proposed work,a novel fuzzy-based Gaussian synthetic minority oversampling(FG-SMOTE)algorithm is proposed to process the imbalanced data.The mechanism of the Gaussian SMOTE technique is based on finding the nearest neighbour concept to balance the ratio between minority and majority class datasets.The ratio of the datasets belonging to the minority and majority class is balanced using a fuzzy-based Levenshtein distance measure technique.Findings-The performance and the accuracy of the proposed algorithm is evaluated using the deep belief networks classifier and the results showed the efficiency of the fuzzy-based Gaussian SMOTE technique achieved an AUC:93.7%.F1 Score Prediction:94.2%,Geometric Mean Score:93.6%predicted from confusion matrix.Research limitations/implications-The proposed research still retains some of the challenges that need to be focused such as application FG-SMOTE to multiclass imbalanced dataset and to evaluate dataset imbalance problem in a distributed environment.Originality/value-The proposed algorithm fundamentally solves the data imbalance issues and challenges involved in handling the imbalanced data.FG-SMOTE has aided in balancing minority and majority class datasets.展开更多
基金supported by the Science and Technology Program of China Southern Power Grid(031800KC23120003).
文摘In contemporary medium-voltage distribution networks heavily penetrated by distributed energy resources(DERs),the harmonic components injected by power-electronic interfacing converters,together with the inherently intermittent output of renewable generation,distort the zero-sequence current and continuously reshape its frequency spectrum.As a result,single-line-to-ground(SLG)faults exhibit a pronounced,strongly non-stationary behaviour that varies with operating point,load mix and DER dispatch.Under such circumstances the performance of traditional rule-based algorithms—or methods that rely solely on steady-state frequency-domain indicators—degrades sharply,and they no longer satisfy the accuracy and universality required by practical protection systems.To overcome these shortcomings,the present study develops an SLG-fault identification scheme that transforms the zero-sequence currentwaveforminto two-dimensional image representations and processes themwith a convolutional neural network(CNN).First,the causes of sample-distribution imbalance are analysed in detail by considering different neutralgrounding configurations,fault-inception mechanisms and the statistical probability of fault occurrence on each phase.Building on these insights,a discriminator network incorporating a Convolutional Block Attention Module(CBAM)is designed to autonomously extract multi-layer spatial-spectral features,while Gradient-weighted Class Activation Mapping(Grad-CAM)is employed to visualise the contribution of every salient image region,thereby enhancing interpretability.A comprehensive simulation platform is subsequently established for a DER-rich distribution system encompassing several representative topologies,feeder lengths and DER penetration levels.Large numbers of realistic SLG-fault scenarios are generated—including noise and measurement uncertainty—and are used to train,validate and test the proposed model.Extensive simulation campaigns,corroborated by field measurements from an actual utility network,demonstrate that the proposed approach attains an SLG-fault identification accuracy approaching 100 percent and maintains robust performance under severe noise conditions,confirming its suitability for real-world engineering applications.
基金supported by the Chinese Academy of Science"Light of West China"Program(2022-XBQNXZ-015)the National Natural Science Foundation of China(11903071)the Operation,Maintenance and Upgrading Fund for Astronomical Telescopes and Facility Instruments,budgeted from the Ministry of Finance of China and administered by the Chinese Academy of Sciences。
文摘This paper addresses the performance degradation issue in a fast radio burst search pipeline based on deep learning.This issue is caused by the class imbalance of the radio frequency interference samples in the training dataset,and one solution is applied to improve the distribution of the training data by augmenting minority class samples using a deep convolutional generative adversarial network.Experi.mental results demonstrate that retraining the deep learning model with the newly generated dataset leads to a new fast radio burst classifier,which effectively reduces false positives caused by periodic wide-band impulsive radio frequency interference,thereby enhancing the performance of the search pipeline.
文摘How the tubular network of the endoplasmic reticulum (ER) is generated is not well understood, but a class of membrane proteins, the reticulons and DP1/Yop1p, are known
文摘Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.
基金supported by the High-Level Talent Foundation of Jinling Institute of Technology(grant number.JIT-B-202413).
文摘With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID.
文摘A multi-class method is proposed based on Error Correcting Output Codes algorithm in order to get better performance of attack recognition in Wireless Sensor Networks. Aiming to enhance the accuracy of attack detection, the multi-class method is constructed with Hadamard matrix and two-class Support Vector Machines. In order to minimize the complexity of the algorithm, sparse coding method is applied in this paper. The comprehensive experimental results show that this modified multi-class method has better attack detection rate compared with other three coding algorithms, and its time efficiency is higher than Hadamard coding algorithm.
文摘With the high-speed development of the Internet,a growing number of Internet users like giving their subjective comments in the BBS,blog and shopping website.These comments contains critics’attitudes,emotions,views and other information.Using these information reasonablely can help understand the social public opinion and make a timely response and help dealer to improve quality and service of products and make consumers know merchandise.This paper mainly discusses using convolutional neural network(CNN)for the operation of the text feature extraction.The concrete realization are discussed.Then combining with other text classifier make class operation.The experiment result shows the effectiveness of the method which is proposed in this paper.
基金supported by the National Natural Science Foundation of China(62276092,62303167)the Postdoctoral Fellowship Program(Grade C)of China Postdoctoral Science Foundation(GZC20230707)+3 种基金the Key Science and Technology Program of Henan Province,China(242102211051,242102211042,212102310084)Key Scientiffc Research Projects of Colleges and Universities in Henan Province,China(25A520009)the China Postdoctoral Science Foundation(2024M760808)the Henan Province medical science and technology research plan joint construction project(LHGJ2024069).
文摘Feature fusion is an important technique in medical image classification that can improve diagnostic accuracy by integrating complementary information from multiple sources.Recently,Deep Learning(DL)has been widely used in pulmonary disease diagnosis,such as pneumonia and tuberculosis.However,traditional feature fusion methods often suffer from feature disparity,information loss,redundancy,and increased complexity,hindering the further extension of DL algorithms.To solve this problem,we propose a Graph-Convolution Fusion Network with Self-Supervised Feature Alignment(Self-FAGCFN)to address the limitations of traditional feature fusion methods in deep learning-based medical image classification for respiratory diseases such as pneumonia and tuberculosis.The network integrates Convolutional Neural Networks(CNNs)for robust feature extraction from two-dimensional grid structures and Graph Convolutional Networks(GCNs)within a Graph Neural Network branch to capture features based on graph structure,focusing on significant node representations.Additionally,an Attention-Embedding Ensemble Block is included to capture critical features from GCN outputs.To ensure effective feature alignment between pre-and post-fusion stages,we introduce a feature alignment loss that minimizes disparities.Moreover,to address the limitations of proposed methods,such as inappropriate centroid discrepancies during feature alignment and class imbalance in the dataset,we develop a Feature-Centroid Fusion(FCF)strategy and a Multi-Level Feature-Centroid Update(MLFCU)algorithm,respectively.Extensive experiments on public datasets LungVision and Chest-Xray demonstrate that the Self-FAGCFN model significantly outperforms existing methods in diagnosing pneumonia and tuberculosis,highlighting its potential for practical medical applications.
基金funded by the Youth Fund of the National Natural Science Foundation of China(Grant No.42261070).
文摘Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of the program is constructed, the intra-class and inter-class dependencies in MCDG are extracted by using the relational graph convolutional neural network, and the classifier is used to identify the faulty methods. Then, the GraphSMOTE algorithm is improved to alleviate the impact of class imbalance on classification accuracy. Aiming at the problem of parallel ranking of element suspicious values in traditional SBFL technology, in Phase 2, Doc2Vec is used to learn static features, while spectrum information serves as dynamic features. A RankNet model based on siamese multi-layer perceptron is constructed to score and rank statements in the faulty method. This work conducts experiments on 5 real projects of Defects4J benchmark. Experimental results show that, compared with the traditional SBFL technique and two baseline methods, our approach improves the Top-1 accuracy by 262.86%, 29.59% and 53.01%, respectively, which verifies the effectiveness of Two-RGCNFL. Furthermore, this work verifies the importance of inter-class dependencies through ablation experiments.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)—Innovative Human Resource Development for Local Intellectualization program grant funded by the Korea government(MSIT)(IITP-2025-RS-2022-00156334)in part by Liaoning Province Nature Fund Project(2024-BSLH-214).
文摘Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class attacks,this study proposes an intrusion detection method based on a two-layer structure.The first layer employs a CNN-BiLSTM model incorporating an attention mechanism to classify network traffic into normal traffic,majority class attacks,and merged minority class attacks.The second layer further segments the minority class attacks through Stacking ensemble learning.The datasets are selected from the generic network dataset CIC-IDS2017,NSL-KDD,and the industrial network dataset Mississippi Gas Pipeline dataset to enhance the generalization and practical applicability of the model.Experimental results show that the proposed model achieves an overall detection accuracy of 99%,99%,and 95%on the CIC-IDS2017,NSL-KDD,and industrial network datasets,respectively.It also significantly outperforms traditional methods in terms of detection accuracy and recall rate for minority class attacks.Compared with the single-layer deep learning model,the two-layer structure effectively reduces the false alarm rate while improving the minority-class attack detection performance.The research in this paper not only improves the adaptability of NIDS to complex network environments but also provides a new solution for minority-class attack detection in industrial network security.
基金This project was supported by the National Natural Science Foundation of China (70572045).
文摘A new method to evaluate the fitness of the Bayesian networks according to the observed data is provided. The main advantage of this criterion is that it is suitable for both the complete and incomplete cases while the others not. Moreover it facilitates the computation greatly. In order to reduce the search space, the notation of equivalent class proposed by David Chickering is adopted. Instead of using the method directly, the novel criterion, variable ordering, and equivalent class are combined,moreover the proposed mthod avoids some problems caused by the previous one. Later, the genetic algorithm which allows global convergence, lack in the most of the methods searching for Bayesian network is applied to search for a good model in thisspace. To speed up the convergence, the genetic algorithm is combined with the greedy algorithm. Finally, the simulation shows the validity of the proposed approach.
文摘Goal of this research is to detect possible relations between animal-related attitudes and verbal aggressiveness as well as types combining such parameters. The sample collected in 2015 contains two adult education classes equivalent to secondary school level (class A = 23 inmates and B = 12 inmates, all male) at a correctional facility. Questionnaires were used. Network analysis software (Visone) and conventional statistics (SPSS) are used for calculating network variables (indegree, outdegree, katz, pageranketc) and implementing Spearman test and Principal Component Analysis. Inmates who have adopted an animal-friendly value system and are too coward to react against torture of animals, maintain a repressed emotion. If they do not intervene and provoke, then they are also not targeted by others. No reaction against torture is also connected with a deep-rooted aggressiveness. Concerning superficial aggressiveness, a profile, whose characterize is multiple verbal aggressiveness, can be attributed to repressed emotions. A type is torturing and indifferently restricts his aggressiveness, as he can satisfy his need of dominance by being aggressive towards animals. A type of inmate who loves animals and reacts against their torture, presents the most restricted and relatively smooth aggressiveness, as he discharges his repressed emotions to this reaction. Under condition of indifference, keeping pets is not evidence of loving but of a need of companionship. As for the deep-rooted aggressiveness (over-extroversion), it does not seem to be triggered by any repression.
基金Supported by the National Natural Science Foundation of China (No. 60974082)
文摘Learning Bayesian network structure is one of the most important branches in Bayesian network. The most popular graphical representative of a Bayesian network structure is an essential graph. This paper shows a combined algorithm according to the three rules for finding the essential graph of a given directed acyclic graph. Moreover, the complexity and advantages of this combined algorithm over others are also discussed. The aim of this paper is to present the proof of the correctness of the combined algorithm.
基金funded by the Researchers Supporting Program at King Saud University(RSPD2023R809).
文摘Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental problems.Its attributes as a non-toxic,low-carbon,and economical substitute for conventional cement concrete,coupled with its elevated compressive strength and reduced shrinkage properties,position it as a pivotal material for diverse applications spanning from architectural structures to transportation infrastructure.In this context,this study sets out the task of using machine learning(ML)algorithms to increase the accuracy and interpretability of predicting the compressive strength of geopolymer concrete in the civil engineering field.To achieve this goal,a new approach using convolutional neural networks(CNNs)has been adopted.This study focuses on creating a comprehensive dataset consisting of compositional and strength parameters of 162 geopolymer concrete mixes,all containing Class F fly ash.The selection of optimal input parameters is guided by two distinct criteria.The first criterion leverages insights garnered from previous research on the influence of individual features on compressive strength.The second criterion scrutinizes the impact of these features within the model’s predictive framework.Key to enhancing the CNN model’s performance is the meticulous determination of the optimal hyperparameters.Through a systematic trial-and-error process,the study ascertains the ideal number of epochs for data division and the optimal value of k for k-fold cross-validation—a technique vital to the model’s robustness.The model’s predictive prowess is rigorously assessed via a suite of performance metrics and comprehensive score analyses.Furthermore,the model’s adaptability is gauged by integrating a secondary dataset into its predictive framework,facilitating a comparative evaluation against conventional prediction methods.To unravel the intricacies of the CNN model’s learning trajectory,a loss plot is deployed to elucidate its learning rate.The study culminates in compelling findings that underscore the CNN model’s accurate prediction of geopolymer concrete compressive strength.To maximize the dataset’s potential,the application of bivariate plots unveils nuanced trends and interactions among variables,fortifying the consistency with earlier research.Evidenced by promising prediction accuracy,the study’s outcomes hold significant promise in guiding the development of innovative geopolymer concrete formulations,thereby reinforcing its role as an eco-conscious and robust construction material.The findings prove that the CNN model accurately estimated geopolymer concrete’s compressive strength.The results show that the prediction accuracy is promising and can be used for the development of new geopolymer concrete mixes.The outcomes not only underscore the significance of leveraging technology for sustainable construction practices but also pave the way for innovation and efficiency in the field of civil engineering.
文摘Wireless sensor networks(WSNs)are characterized by heterogeneous traffic types(audio,video,data)and diverse application traffic requirements.This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs.The requirements for each class regarding sensitivity to QoS(Quality of Service)parameters,such as loss,delay,and jitter,are described.These classes encompass real-time and delay-tolerant traffic.Given that QoS evaluation is a multi-criteria decision-making problem,we employed the AHP(Analytical Hierarchy Process)method for multi-criteria optimization.As a result of this approach,we derived weight values for different traffic classes based on key QoS factors and requirements.These weights are assigned to individual traffic classes to determine transmission priority.This study provides a thorough comparative analysis of the proposed model against existing methods,demonstrating its superior performance across various traffic scenarios and its implications for future WSN applications.The results highlight the model’s adaptability and robustness in optimizing network resources under varying conditions,offering insights into practical deployments in real-world scenarios.Additionally,the paper includes an analysis of energy consumption,underscoring the trade-offs between QoS performance and energy efficiency.This study presents the development of a differentiated services model for heterogeneous traffic in wireless sensor networks,considering the appropriate QoS framework supported by experimental analyses.
基金2019 national talent project of TCM characteristic technology inheritance(No.T20194828003)Medical science and technology development plan project of Yancheng City(No.YK2020039).
文摘Objective:To collect the main components and targets of Jiang-zhi-dai-pao-cha(JZDPC)and investigate the mechanism of JZDPC for the treatment of hyperlipidemia by network pharmacology.Methods:The components and targets of JZDPC were searched from ETCM databases,the targets related to hyperlipidemia were searched from DisGeNET and GeneCards databases,and then the intersection targets and corresponding key components were obtained.Cytoscape 3.8.2 software was used to construct and analyze networks,and then Metascape online database was applied for gene ontology(GO)enrichment analysis and Kyoto Encyclopedia of genes and genomes(KEGG)pathway enrichment analysis of core putative targets.Results:There were 99 overlapping targets between JZDPC and hyperlipidemia,among which NR3C1,ESR1,NR1I2,NFKB1,ESR2,ALOX5,PTGS1,PPARA,RXRA,LPL,PLA2G1B,PYGM,CYP2C9 were the core putative targets,and many members of nuclear receptor 1(NR1)subfamily were included.The core components of JZDPC,such as Ursolic Acid,β-Sitosterol,Resveratrol,Arirubic Acid,Alisol A,Oleanolic Acid,Rhein,Chrysophanol and Emodin,can regulate blood lipid by regulating a series of signaling pathways including the above core potential targets,such as non-alcoholic fatty liver disease(NAFLD)signaling pathway,pathways in cancer,arachidonic acid(AA)metabolism signaling pathway and peroxisome proliferator activated receptor(PPAR)signaling pathway,Starch and sucrose metabolism signaling pathway,etc.They play many roles in the treatment of hyperlipidemia by participating in lipid synthesis and metabolism,anti inflammation,anti oxidative stress,regulating hormone levels and carbohydrate metabolism.Conclusion:Network pharmacology provides a theoretical basis for investigating the mechanism of action of JZDPC,and the NAFLD signaling pathway is one of the most valuable pathways.
文摘With the rapid development of China's mobile internet era, the internet has brought great changes to people's daily life, work and various fields. At the same time, with the rapid development and rise of modern network education in our country, great social changes have taken place in the teaching mode of teachers' cultural and moral education concepts, students' cultural and educational concepts, learning styles, life management styles. Therefore, under the background of the development of basic education network information technology in the current new information age, how to effectively use the advantages of network information technology to guide the organization and coordination of the development of the school basic education network is also very important. This paper makes a simple analysis of the problems existing in the online sports live broadcast class and puts forward some suggestions.
文摘In this paper,the authors are concerned with global asymptotic synchronization for a class of BAM neural networks with time delays.Instead of using Lyapunov functional method,LMI method and matrix measure method which are recently widely applied to investigating global exponential/asymptotic synchronization for neural networks,two novel sufficient conditions on global asymptotic synchronization of above BAM neural networks are established by using a kind of new study method of global synchronization:Integrating inequality techniques.The method and results extend the study of global synchronization of neural networks.
基金Disclosure Statement:No potential conflict of interest was reported by the authors.
文摘Purpose-Adequate resources for learning and training the data are an important constraint to develop an efficient classifier with outstanding performance.The data usually follows a biased distribution of classes that reflects an unequal distribution of classes within a dataset.This issue is known as the imbalance problem,which is one of the most common issues occurring in real-time applications.Learning of imbalanced datasets is a ubiquitous challenge in the field of data mining.Imbalanced data degrades the performance of the classifier by producing inaccurate results.Design/methodology/approach-In the proposed work,a novel fuzzy-based Gaussian synthetic minority oversampling(FG-SMOTE)algorithm is proposed to process the imbalanced data.The mechanism of the Gaussian SMOTE technique is based on finding the nearest neighbour concept to balance the ratio between minority and majority class datasets.The ratio of the datasets belonging to the minority and majority class is balanced using a fuzzy-based Levenshtein distance measure technique.Findings-The performance and the accuracy of the proposed algorithm is evaluated using the deep belief networks classifier and the results showed the efficiency of the fuzzy-based Gaussian SMOTE technique achieved an AUC:93.7%.F1 Score Prediction:94.2%,Geometric Mean Score:93.6%predicted from confusion matrix.Research limitations/implications-The proposed research still retains some of the challenges that need to be focused such as application FG-SMOTE to multiclass imbalanced dataset and to evaluate dataset imbalance problem in a distributed environment.Originality/value-The proposed algorithm fundamentally solves the data imbalance issues and challenges involved in handling the imbalanced data.FG-SMOTE has aided in balancing minority and majority class datasets.