The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in...The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.展开更多
Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using c...Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using complex network theory,this study proposes a hierarchy for TSN and introduces the concept of bounded time error.A coupling model between traffic scheduling and time synchronization is established,deriving functional relationships among end-to-end delay,delay jitter,gate window,and time error.These relationships illustrate that time errors can trigger jumps in delay and delay jitter.To evaluate different time errors impact on traffic scheduling performance,an end-to-end transmission experiment scheme is designed,along with the construction of a TSN test platform implementing two representative cases.Case A is a closed TSN domain scenario with pure TSN switches emulating closed factory floor network.Case B depicts remote factory interconnection where TSN domains link via non-TSN domains composed of OpenFlow switches.Results from Case A show that delay and delay jitter on a single node are most significantly affected by time errors,up to one gating cycle.End-to-end delay jitter tends to increase with the number of hops.When the ratio of time error bound to window exceeds 10%,the number of schedulable traffic flows decreases rapidly.Case B reveals that when time error is below 1μs,the number of schedulable traffic flows begins to increase significantly,approaching full schedulability at errors below 0.6μs.展开更多
Time-Sensitive Network(TSN)with deterministic transmission capability is increasingly used in many emerging fields.It mainly guarantees the Quality of Service(QoS)of applications with strict requirements on time and s...Time-Sensitive Network(TSN)with deterministic transmission capability is increasingly used in many emerging fields.It mainly guarantees the Quality of Service(QoS)of applications with strict requirements on time and security.One of the core features of TSN is traffic scheduling with bounded low delay in the network.However,traffic scheduling schemes in TSN are usually synthesized offline and lack dynamism.To implement incremental scheduling of newly arrived traffic in TSN,we propose a Dynamic Response Incremental Scheduling(DR-IS)method for time-sensitive traffic and deploy it on a software-defined time-sensitive network architecture.Under the premise of meeting the traffic scheduling requirements,we adopt two modes,traffic shift and traffic exchange,to dynamically adjust the time slot injection position of the traffic in the original scheme,and determine the sending offset time of the new timesensitive traffic to minimize the global traffic transmission jitter.The evaluation results show that DRIS method can effectively control the large increase of traffic transmission jitter in incremental scheduling without affecting the transmission delay,thus realizing the dynamic incremental scheduling of time-sensitive traffic in TSN.展开更多
Time-sensitive networking(TSN)is an important research area for updating the infrastructure of industrial Internet of Things.As a product of the integration of the operation technology(OT)and the information technolog...Time-sensitive networking(TSN)is an important research area for updating the infrastructure of industrial Internet of Things.As a product of the integration of the operation technology(OT)and the information technology(IT),it meets the real-time and deterministic nature of industrial control and is compatible with Ethernet to support the mixed transmission of industrial control data and Ethernet data.This paper systematically summarizes and analyzes the shortcomings of the current mixed transmission technologies of the bursty flows and the periodic flows.To conquer these shortages,we propose a predictive mixed-transmission scheme of the bursty flows and the periodic flows.The core idea is to use the predictability of timetriggered transmission of TSN to further reduce bandwidth loss of the previous mixed-transmission methods.This paper formalizes the probabilistic model of the predictive mixed transmission mechanism and proves that the proposed mecha⁃nism can effectively reduce the loss of bandwidth.Finally,based on the formalized probabilistic model,we simulate the bandwidth loss of the proposed mechanism.The results demonstrate that compared with the previous mixed-transmission method,the bandwidth loss of the pro⁃posed mechanism achieves a 79.48%reduction on average.展开更多
Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked con...Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However,due to inappropriate message fragmentation,the realtime performance of no-wait scheduling algorithms is reduced.Therefore,in this paper,joint algorithms of message fragmentation and no-wait scheduling are proposed.First,a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions.Second,to improve the scalability of our algorithm,the worst-case delay of messages is analyzed,and then,based on the analysis,a heuristic algorithm is proposed to construct low-delay schedules.Finally,we conduct extensive test cases to evaluate our proposed algorithms.The evaluation results indicate that,compared to existing algorithms,the proposed joint algorithm improves schedulability by up to 50%.展开更多
Deterministic transmission plays a vital role in industrial networks.The time-sensitive network(TSN)protocol family offers a promising paradigm for transmitting time-critical data.To achieve low latency and high Quali...Deterministic transmission plays a vital role in industrial networks.The time-sensitive network(TSN)protocol family offers a promising paradigm for transmitting time-critical data.To achieve low latency and high Quality of Service(QoS)in TSN,appropriate data flow scheduling is needed under the given network topology and data flow requirements to fully utilize the potential of TSN.Both time-triggered flows and sporadic flows can carry high-priority data and need to be considered jointly to eliminate the effects of each other.To this end,in this work,we investigate the challenging mixed-flow scheduling problem and propose a novel diffusion-based algorithm,DiffTSN,to solve the joint routing and scheduling problem of mixed flows.We transform the sporadic flows into probabilistic flows and design certain mechanisms to fit the nature of these probabilistic flows.For routing,we transform the problem into a diffusion policy and constraint denoising process with a value guide to achieve a better routing policy.For scheduling,we adopt a first-valid-time-slot algorithm to determine the start transmission time of the flows.We train and evaluate DiffTSN in our TSN simulator.Experiments show that DiffTSN outperforms state-of-the-art algorithms in various metrics.展开更多
In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-...In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT,it is beneficial to use non-terrestrial infrastructures,including satellites and unmanned aerial vehicles(UAVs).Thus,we can build a non-terrestrial network(NTN)using a cell-free architecture.Driven by the time-sensitive requirements and uneven distribution of IoT devices,the NTN must be empowered using mobile edge computing(MEC)while providing oasisoriented on-demand coverage for devices.Nevertheless,communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN,which makes it difficult to coordinate the resources.In this study,we propose a process-oriented framework to design communication and MEC systems in a time-division manner.In this framework,large-scale channel state information(CSI)is used to characterize the complex propagation environment at an affordable cost,where a nonconvex latency minimization problem is formulated.Subsequently,the approximated problem is provided,and it can be decomposed into sub-problems.These sub-problems are then solved iteratively.The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms,implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources,and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT.展开更多
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade...Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.展开更多
The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time...The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time-sensitive Targets Stealth Network via Real-time Mask Generation(MTTSNet).According to our knowledge,this is the first technology to automatically remove military targets in real-time from videos.The critical steps of MTTSNet are as follows:First,we designed a real-time mask generation network based on the encoder-decoder framework,combined with the domain expansion structure,to effectively extract mask images.Specifically,the ASPP structure in the encoder could achieve advanced semantic feature fusion.The decoder stacked high-dimensional information with low-dimensional information to obtain an effective mask layer.Subsequently,the domain expansion module guided the adaptive expansion of mask images.Second,a context adversarial generation network based on gated convolution was constructed to achieve background restoration of mask positions in the original image.In addition,our method worked in an end-to-end manner.A particular semantic segmentation dataset for military time-sensitive targets has been constructed,called the Military Time-sensitive Target Masking Dataset(MTMD).The MTMD dataset experiment successfully demonstrated that this method could create a mask that completely occludes the target and that the target could be hidden in real time using this mask.We demonstrated the concealment performance of our proposed method by comparing it to a number of well-known and highly optimized baselines.展开更多
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of...Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence.展开更多
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener...The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.展开更多
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i...In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.展开更多
The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a n...The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a necessary step before their practical application.As these investigations are time and resource-consuming undertakings,an effective prediction model can significantly improve the efficiency of research operations.In this work,an Artificial Neural Network(ANN)model is developed to predict the thermal conductivity of metal oxide water-based nanofluid.For this,a comprehensive set of 691 data points was collected from the literature.This dataset is split into training(70%),validation(15%),and testing(15%)and used to train the ANN model.The developed model is a backpropagation artificial neural network with a 4–12–1 architecture.The performance of the developed model shows high accuracy with R values above 0.90 and rapid convergence.It shows that the developed ANN model accurately predicts the thermal conductivity of nanofluids.展开更多
BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes tha...BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes that may relate to NSSI through distinct psychological mechanisms.However,how these subtypes interact with specific NSSI behaviors remains unclear.AIM To examine associations between rumination subtypes and specific NSSI behaviors in adolescents.METHODS We conducted a cross-sectional study with 305 hospitalized adolescents diagnosed with depressive disorders.The subjects ranged from 12-18 years in age.Rumi-nation subtypes were assessed using the Ruminative Response Scale,and 12 NSSI behaviors were evaluated using a validated questionnaire.Network analysis was applied to explore symptom-level associations and identify central symptoms.RESULTS The network analysis revealed close connections between rumination subtypes and NSSI behaviors.Brooding was linked to behaviors such as hitting objects and burning.Scratching emerged as the most influential NSSI symptom.Symptomfocused rumination served as a key bridge connecting rumination and NSSI.CONCLUSION Symptom-focused rumination and scratching were identified as potential intervention targets.These findings highlight the psychological significance of specific cognitive-behavioral links in adolescent depression and suggest directions for tailored prevention and treatment.However,the cross-sectional,single-site design limits causal inference and generalizability.Future longitudinal and multi-center studies are needed to confirm causal pathways and verify the generalizability of the findings to broader adolescent populations.展开更多
This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential g...This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs.展开更多
The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermo...The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermoperation.The complex relationship between the defect phenomenon andmulti-layer causes and the probabilistic influence of secondary equipment cannot be described through knowledge extraction and fusion technology by existing methods,which limits the real-time and accuracy of defect identification.Therefore,a defect recognition method based on the Bayesian network and knowledge graph fusion is proposed.The defect data of secondary equipment is transformed into the structured knowledge graph through knowledge extraction and fusion technology.The knowledge graph of power grid secondary equipment is mapped to the Bayesian network framework,combined with historical defect data,and introduced Noisy-OR nodes.The prior and conditional probabilities of the Bayesian network are then reasonably assigned to build a model that reflects the probability dependence between defect phenomena and potential causes in power grid secondary equipment.Defect identification of power grid secondary equipment is achieved by defect subgraph search based on the knowledge graph,and defect inference based on the Bayesian network.Practical application cases prove this method’s effectiveness in identifying secondary equipment defect causes,improving identification accuracy and efficiency.展开更多
Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY o...Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY on AD.Methods:The DNFB-induced mouse models of AD were established to investigate the therapeutic effects of WQY on AD.The symptoms of AD in the ears and backs of the mice were assessed,while inflammatory factors in the ear were quantified using quantitative real-time-polymerase chain reaction(qRT-PCR),and the percentages of CD4^(+)and CD8^(+)cells in the spleen were analyzed through flow cytometry.The compounds in WQY were identified using ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS)analysis and the key targets and pathways of WQY to treat AD were predicted by network pharmacology.Subsequently,the key genes were tested and verified by qRT-PCR,and the potential active components and target proteins were verified by molecular docking.Results:WQY relieved the AD symptoms and histopathological injuries in the ear and back skin of mice with AD.Meanwhile,WQY significantly reduced the levels of inflammatory factors IL-6 and IL-1βin ear tissue,as well as the ratio of CD4^(+)/CD8^(+)cells in spleen.Additionally,a total of 142 compounds were identified from the water extract of WQY by UPLC-Orbitrap-MS/MS.39 key targets related to AD were screened out by network pharmacology methods.The KEGG analysis indicated that the effects of WQY were primarily mediated through pathways associated with Toll-like receptor signaling and T cell receptor signaling.Moreover,the results of qRT-PCR demonstrated that WQY significantly reduced the mRNA expressions of IL-4,IL-10,GATA3 and FOXP3,and molecular docking simulation verified that the active components of WQY had excellent binding abilities with IL-4,IL-10,GATA3 and FOXP3 proteins.Conclusion:The present study demonstrated that WQY effectively relieved AD symptoms in mice,decreased the inflammatory factors levels,regulated the balance of CD4^(+)and CD8^(+)cells,and the mechanism may be associated with the suppression of Th2 and Treg cell immune responses.展开更多
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ...Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems.展开更多
With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion det...With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID.展开更多
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H...The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.展开更多
基金supported in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the National Natural Science Foundation of China(Grant No.92067102)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.
基金supported in part by the Science and Technology Research and Development Foundation of China Academy of Railway Sciences Corporation Limited(Grant No.2023YJ364)in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using complex network theory,this study proposes a hierarchy for TSN and introduces the concept of bounded time error.A coupling model between traffic scheduling and time synchronization is established,deriving functional relationships among end-to-end delay,delay jitter,gate window,and time error.These relationships illustrate that time errors can trigger jumps in delay and delay jitter.To evaluate different time errors impact on traffic scheduling performance,an end-to-end transmission experiment scheme is designed,along with the construction of a TSN test platform implementing two representative cases.Case A is a closed TSN domain scenario with pure TSN switches emulating closed factory floor network.Case B depicts remote factory interconnection where TSN domains link via non-TSN domains composed of OpenFlow switches.Results from Case A show that delay and delay jitter on a single node are most significantly affected by time errors,up to one gating cycle.End-to-end delay jitter tends to increase with the number of hops.When the ratio of time error bound to window exceeds 10%,the number of schedulable traffic flows decreases rapidly.Case B reveals that when time error is below 1μs,the number of schedulable traffic flows begins to increase significantly,approaching full schedulability at errors below 0.6μs.
基金supported by the Innovation Scientists and Technicians Troop Construction Projects of Henan Province(224000510002)。
文摘Time-Sensitive Network(TSN)with deterministic transmission capability is increasingly used in many emerging fields.It mainly guarantees the Quality of Service(QoS)of applications with strict requirements on time and security.One of the core features of TSN is traffic scheduling with bounded low delay in the network.However,traffic scheduling schemes in TSN are usually synthesized offline and lack dynamism.To implement incremental scheduling of newly arrived traffic in TSN,we propose a Dynamic Response Incremental Scheduling(DR-IS)method for time-sensitive traffic and deploy it on a software-defined time-sensitive network architecture.Under the premise of meeting the traffic scheduling requirements,we adopt two modes,traffic shift and traffic exchange,to dynamically adjust the time slot injection position of the traffic in the original scheme,and determine the sending offset time of the new timesensitive traffic to minimize the global traffic transmission jitter.The evaluation results show that DRIS method can effectively control the large increase of traffic transmission jitter in incremental scheduling without affecting the transmission delay,thus realizing the dynamic incremental scheduling of time-sensitive traffic in TSN.
基金sponsored in part by the National Key Research and Development Project under Grants Nos. 2018YFB1308601 and 2017YFE0119300the National Natural Science Foundation of China under Grant No. 62002013+1 种基金the Project funded by China Postdoctoral Science Foundation Grants Nos. 2019M660439 and 2020T130049the Industry-University-Research Cooperation Fund of ZTE Corporation.
文摘Time-sensitive networking(TSN)is an important research area for updating the infrastructure of industrial Internet of Things.As a product of the integration of the operation technology(OT)and the information technology(IT),it meets the real-time and deterministic nature of industrial control and is compatible with Ethernet to support the mixed transmission of industrial control data and Ethernet data.This paper systematically summarizes and analyzes the shortcomings of the current mixed transmission technologies of the bursty flows and the periodic flows.To conquer these shortages,we propose a predictive mixed-transmission scheme of the bursty flows and the periodic flows.The core idea is to use the predictability of timetriggered transmission of TSN to further reduce bandwidth loss of the previous mixed-transmission methods.This paper formalizes the probabilistic model of the predictive mixed transmission mechanism and proves that the proposed mecha⁃nism can effectively reduce the loss of bandwidth.Finally,based on the formalized probabilistic model,we simulate the bandwidth loss of the proposed mechanism.The results demonstrate that compared with the previous mixed-transmission method,the bandwidth loss of the pro⁃posed mechanism achieves a 79.48%reduction on average.
基金partially supported by National Key Research and Development Program of China(2018YFB1700200)National Natural Science Foundation of China(61972389,61903356,61803368,U1908212)+2 种基金Youth Innovation Promotion Association of the Chinese Academy of Sciences,National Science and Technology Major Project(2017ZX02101007-004)Liaoning Provincial Natural Science Foundation of China(2020-MS-034,2019-YQ-09)China Postdoctoral Science Foundation(2019M661156)。
文摘Time-sensitive networks(TSNs)support not only traditional best-effort communications but also deterministic communications,which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However,due to inappropriate message fragmentation,the realtime performance of no-wait scheduling algorithms is reduced.Therefore,in this paper,joint algorithms of message fragmentation and no-wait scheduling are proposed.First,a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions.Second,to improve the scalability of our algorithm,the worst-case delay of messages is analyzed,and then,based on the analysis,a heuristic algorithm is proposed to construct low-delay schedules.Finally,we conduct extensive test cases to evaluate our proposed algorithms.The evaluation results indicate that,compared to existing algorithms,the proposed joint algorithm improves schedulability by up to 50%.
基金supported by the Guangdong Science and Technology Program under Grant Nos.2024B0101040007 and 2024B0101020004the Guangdong Basic and Applied Basic Research Foundation under Grant No.2023B1515120058+5 种基金the National Science Foundation of China under Grant No.62172455the Guangdong Science and Technology Department Pearl River Talent Program under Grant No.2019QN01X140the Guangzhou Basic and Applied Basic Research Program under Grant No.2024A04J6367the Fundamental Research Funds for the Central Universities of China under Grant No.24qnpy138the Program for Guangdong Introducing Innovative and Entrepreneurial Teams under Grant No.2017ZT07X355the Department of Science and Technology of Guangdong Province of China under Grant No.2022A0505050028.
文摘Deterministic transmission plays a vital role in industrial networks.The time-sensitive network(TSN)protocol family offers a promising paradigm for transmitting time-critical data.To achieve low latency and high Quality of Service(QoS)in TSN,appropriate data flow scheduling is needed under the given network topology and data flow requirements to fully utilize the potential of TSN.Both time-triggered flows and sporadic flows can carry high-priority data and need to be considered jointly to eliminate the effects of each other.To this end,in this work,we investigate the challenging mixed-flow scheduling problem and propose a novel diffusion-based algorithm,DiffTSN,to solve the joint routing and scheduling problem of mixed flows.We transform the sporadic flows into probabilistic flows and design certain mechanisms to fit the nature of these probabilistic flows.For routing,we transform the problem into a diffusion policy and constraint denoising process with a value guide to achieve a better routing policy.For scheduling,we adopt a first-valid-time-slot algorithm to determine the start transmission time of the flows.We train and evaluate DiffTSN in our TSN simulator.Experiments show that DiffTSN outperforms state-of-the-art algorithms in various metrics.
基金the National Key R&D Program of China(2018YFA0701601 and 2020YFA0711301)the National Natural Science Foundation of China(61771286,61941104,and 61922049)the Tsinghua University-China Mobile Communications Group Co.,Ltd.Joint Institute.
文摘In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT,it is beneficial to use non-terrestrial infrastructures,including satellites and unmanned aerial vehicles(UAVs).Thus,we can build a non-terrestrial network(NTN)using a cell-free architecture.Driven by the time-sensitive requirements and uneven distribution of IoT devices,the NTN must be empowered using mobile edge computing(MEC)while providing oasisoriented on-demand coverage for devices.Nevertheless,communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN,which makes it difficult to coordinate the resources.In this study,we propose a process-oriented framework to design communication and MEC systems in a time-division manner.In this framework,large-scale channel state information(CSI)is used to characterize the complex propagation environment at an affordable cost,where a nonconvex latency minimization problem is formulated.Subsequently,the approximated problem is provided,and it can be decomposed into sub-problems.These sub-problems are then solved iteratively.The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms,implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources,and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT.
基金this project under Geran Putra Inisiatif(GPI)with reference of GP-GPI/2023/976210。
文摘Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols.
基金supported in part by the National Natural Science Foundation of China(Grant No.62276274)Shaanxi Natural Science Foundation(Grant No.2023-JC-YB-528)Chinese aeronautical establishment(Grant No.201851U8012)。
文摘The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time-sensitive Targets Stealth Network via Real-time Mask Generation(MTTSNet).According to our knowledge,this is the first technology to automatically remove military targets in real-time from videos.The critical steps of MTTSNet are as follows:First,we designed a real-time mask generation network based on the encoder-decoder framework,combined with the domain expansion structure,to effectively extract mask images.Specifically,the ASPP structure in the encoder could achieve advanced semantic feature fusion.The decoder stacked high-dimensional information with low-dimensional information to obtain an effective mask layer.Subsequently,the domain expansion module guided the adaptive expansion of mask images.Second,a context adversarial generation network based on gated convolution was constructed to achieve background restoration of mask positions in the original image.In addition,our method worked in an end-to-end manner.A particular semantic segmentation dataset for military time-sensitive targets has been constructed,called the Military Time-sensitive Target Masking Dataset(MTMD).The MTMD dataset experiment successfully demonstrated that this method could create a mask that completely occludes the target and that the target could be hidden in real time using this mask.We demonstrated the concealment performance of our proposed method by comparing it to a number of well-known and highly optimized baselines.
基金supported by the Chung-Ang University Research Grants in 2023.Alsothe work is supported by the ELLIIT Excellence Center at Linköping–Lund in Information Technology in Sweden.
文摘Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2025-00559546)supported by the IITP(Institute of Information&Coummunications Technology Planning&Evaluation)-ITRC(Information Technology Research Center)grant funded by the Korea government(Ministry of Science and ICT)(IITP-2025-RS-2023-00259004).
文摘The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.
文摘In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(2021R1A6A1A10044950).
文摘The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a necessary step before their practical application.As these investigations are time and resource-consuming undertakings,an effective prediction model can significantly improve the efficiency of research operations.In this work,an Artificial Neural Network(ANN)model is developed to predict the thermal conductivity of metal oxide water-based nanofluid.For this,a comprehensive set of 691 data points was collected from the literature.This dataset is split into training(70%),validation(15%),and testing(15%)and used to train the ANN model.The developed model is a backpropagation artificial neural network with a 4–12–1 architecture.The performance of the developed model shows high accuracy with R values above 0.90 and rapid convergence.It shows that the developed ANN model accurately predicts the thermal conductivity of nanofluids.
基金Supported by Key Research and Development Program of Shaanxi Province,China,No.2024SF-YBXM-078.
文摘BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes that may relate to NSSI through distinct psychological mechanisms.However,how these subtypes interact with specific NSSI behaviors remains unclear.AIM To examine associations between rumination subtypes and specific NSSI behaviors in adolescents.METHODS We conducted a cross-sectional study with 305 hospitalized adolescents diagnosed with depressive disorders.The subjects ranged from 12-18 years in age.Rumi-nation subtypes were assessed using the Ruminative Response Scale,and 12 NSSI behaviors were evaluated using a validated questionnaire.Network analysis was applied to explore symptom-level associations and identify central symptoms.RESULTS The network analysis revealed close connections between rumination subtypes and NSSI behaviors.Brooding was linked to behaviors such as hitting objects and burning.Scratching emerged as the most influential NSSI symptom.Symptomfocused rumination served as a key bridge connecting rumination and NSSI.CONCLUSION Symptom-focused rumination and scratching were identified as potential intervention targets.These findings highlight the psychological significance of specific cognitive-behavioral links in adolescent depression and suggest directions for tailored prevention and treatment.However,the cross-sectional,single-site design limits causal inference and generalizability.Future longitudinal and multi-center studies are needed to confirm causal pathways and verify the generalizability of the findings to broader adolescent populations.
文摘This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs.
基金supported by the State Grid Southwest Branch Project“Research on Defect Diagnosis and Early Warning Technology of Relay Protection and Safety Automation Devices Based on Multi-Source Heterogeneous Defect Data”.
文摘The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermoperation.The complex relationship between the defect phenomenon andmulti-layer causes and the probabilistic influence of secondary equipment cannot be described through knowledge extraction and fusion technology by existing methods,which limits the real-time and accuracy of defect identification.Therefore,a defect recognition method based on the Bayesian network and knowledge graph fusion is proposed.The defect data of secondary equipment is transformed into the structured knowledge graph through knowledge extraction and fusion technology.The knowledge graph of power grid secondary equipment is mapped to the Bayesian network framework,combined with historical defect data,and introduced Noisy-OR nodes.The prior and conditional probabilities of the Bayesian network are then reasonably assigned to build a model that reflects the probability dependence between defect phenomena and potential causes in power grid secondary equipment.Defect identification of power grid secondary equipment is achieved by defect subgraph search based on the knowledge graph,and defect inference based on the Bayesian network.Practical application cases prove this method’s effectiveness in identifying secondary equipment defect causes,improving identification accuracy and efficiency.
基金supported by grants from the National Natural Science Foundation of China(82004252)the Project of Administration of Traditional Chinese Medicine of Guangdong Province(202405112017596500)the Basic and Applied Basic Research Foundation of Guangzhou Municipal Science and Technology Bureau(202102020533).
文摘Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY on AD.Methods:The DNFB-induced mouse models of AD were established to investigate the therapeutic effects of WQY on AD.The symptoms of AD in the ears and backs of the mice were assessed,while inflammatory factors in the ear were quantified using quantitative real-time-polymerase chain reaction(qRT-PCR),and the percentages of CD4^(+)and CD8^(+)cells in the spleen were analyzed through flow cytometry.The compounds in WQY were identified using ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS)analysis and the key targets and pathways of WQY to treat AD were predicted by network pharmacology.Subsequently,the key genes were tested and verified by qRT-PCR,and the potential active components and target proteins were verified by molecular docking.Results:WQY relieved the AD symptoms and histopathological injuries in the ear and back skin of mice with AD.Meanwhile,WQY significantly reduced the levels of inflammatory factors IL-6 and IL-1βin ear tissue,as well as the ratio of CD4^(+)/CD8^(+)cells in spleen.Additionally,a total of 142 compounds were identified from the water extract of WQY by UPLC-Orbitrap-MS/MS.39 key targets related to AD were screened out by network pharmacology methods.The KEGG analysis indicated that the effects of WQY were primarily mediated through pathways associated with Toll-like receptor signaling and T cell receptor signaling.Moreover,the results of qRT-PCR demonstrated that WQY significantly reduced the mRNA expressions of IL-4,IL-10,GATA3 and FOXP3,and molecular docking simulation verified that the active components of WQY had excellent binding abilities with IL-4,IL-10,GATA3 and FOXP3 proteins.Conclusion:The present study demonstrated that WQY effectively relieved AD symptoms in mice,decreased the inflammatory factors levels,regulated the balance of CD4^(+)and CD8^(+)cells,and the mechanism may be associated with the suppression of Th2 and Treg cell immune responses.
基金funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2025-02-01296).
文摘Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems.
基金supported by the High-Level Talent Foundation of Jinling Institute of Technology(grant number.JIT-B-202413).
文摘With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID.
基金supported by the National Key Research and Development Program of China under Grant 2022YFB2901501in part by the Science and Technology Innovation leading Talents Subsidy Project of Central Plains under Grant 244200510038.
文摘The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency.