期刊文献+
共找到551,426篇文章
< 1 2 250 >
每页显示 20 50 100
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
1
作者 Yuji Waizumi Hiroshi Tsunoda +1 位作者 Masashi Tsuji Yoshiaki Nemoto 《Journal of Information Security》 2012年第1期18-24,共7页
Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection sy... Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection systems which use a series of packets exchanged between two terminals as a unit of observation, have an advantage of being able to detect anomaly which is included in only some specific sessions. However, in large-scale networks where a large number of communications takes place, analyzing every flow is not practical. On the other hand, a timeslot-based detection systems need not to prepare a number of buffers although it is difficult to specify anomaly communications. In this paper, we propose a multi-stage anomaly detection system which is combination of timeslot-based and flow-based detectors. The proposed system can reduce the number of flows which need to be subjected to flow-based analysis but yet exhibits high detection accuracy. Through experiments using data set, we present the effectiveness of the proposed method. 展开更多
关键词 network Anomaly Detection Timeslot-Based ANALYSIS Flow-Based ANALYSIS multi-stage Traffic ANALYSIS FLOW Reduction
暂未订购
Highly sensitive,multi-stage,and mid-infrared refractive index sensor based on photonic spin Hall effect
2
作者 Jiaye Ding Chenglong Wang +2 位作者 Shengli Liu Peng Dong Jie Cheng 《Chinese Physics B》 2026年第1期432-438,共7页
Surface polaritons,as surface electromagnetic waves propagating along the surface of a medium,have played a crucial role in enhancing photonic spin Hall effect(PSHE)and developing highly sensitive refractive index(RI)... Surface polaritons,as surface electromagnetic waves propagating along the surface of a medium,have played a crucial role in enhancing photonic spin Hall effect(PSHE)and developing highly sensitive refractive index(RI)sensors.Among them,the traditional surface plasmon polariton(SPP)based on noble metals limits its application beyond the near-infrared(IR)regime due to the large negative permittivity and optical losses.In this contribution,we theoretically proposed a highly sensitive PSHE sensor with the structure of Ge prism-SiC-Si:InAs-sensing medium,by taking advantage of the hybrid surface plasmon phonon polariton(SPPhP)in mid-IR regime.Here,heavily Si-doped InAs(Si:InAs)and SiC excite the SPP and surface phonon polariton(SPhP),and the hybrid SPPhP is realized in this system.More importantly,the designed PSHE sensor based on this SPPhP mechanism achieves the multi-stage RI measurements from 1.00025-1.00225 to 1.70025-1.70225,and the maximal intensity sensitivity and angle sensitivity can be up to 9.4×10^(4)μm/RIU and245°/RIU,respectively.These findings provide a new pathway for the enhancement of PSHE in mid-IR regime,and offer new opportunities to develop highly sensitive RI sensors in multi-scenario applications,such as harmful gas monitoring and biosensing. 展开更多
关键词 refractive index(RI)sensor photonic spin Hall effect MID-IR multi-stage
原文传递
Multi-Stage Voltage Control Optimization Strategy for Distribution Networks Considering Active-Reactive Co-Regulation of Electric Vehicles
3
作者 Shukang Lyu Fei Zeng +3 位作者 Huachun Han Huiyu Miao Yi Pan Xiaodong Yuan 《Energy Engineering》 EI 2025年第1期221-242,共22页
The high proportion of uncertain distributed power sources and the access to large-scale random electric vehicle(EV)charging resources further aggravate the voltage fluctuation of the distribution network,and the exis... The high proportion of uncertain distributed power sources and the access to large-scale random electric vehicle(EV)charging resources further aggravate the voltage fluctuation of the distribution network,and the existing research has not deeply explored the EV active-reactive synergistic regulating characteristics,and failed to realize themulti-timescale synergistic control with other regulatingmeans,For this reason,this paper proposes amultilevel linkage coordinated optimization strategy to reduce the voltage deviation of the distribution network.Firstly,a capacitor bank reactive power compensation voltage control model and a distributed photovoltaic(PV)activereactive power regulationmodel are established.Additionally,an external characteristicmodel of EVactive-reactive power regulation is developed considering the four-quadrant operational characteristics of the EVcharger.Amultiobjective optimization model of the distribution network is then constructed considering the time-series coupling constraints of multiple types of voltage regulators.A multi-timescale control strategy is proposed by considering the impact of voltage regulators on active-reactive EV energy consumption and PV energy consumption.Then,a four-stage voltage control optimization strategy is proposed for various types of voltage regulators with multiple time scales.Themulti-objective optimization is solved with the improvedDrosophila algorithmto realize the power fluctuation control of the distribution network and themulti-stage voltage control optimization.Simulation results validate that the proposed voltage control optimization strategy achieves the coordinated control of decentralized voltage control resources in the distribution network.It effectively reduces the voltage deviation of the distribution network while ensuring the energy demand of EV users and enhancing the stability and economic efficiency of the distribution network. 展开更多
关键词 Electric vehicle(EV) distribution network multi-stage optimization active-reactive power regulation voltage control
在线阅读 下载PDF
Multi-Stage-Based Siamese Neural Network for Seal Image Recognition
4
作者 Jianfeng Lu Xiangye Huang +3 位作者 Caijin Li Renlin Xin Shanqing Zhang Mahmoud Emam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期405-423,共19页
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited... Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets. 展开更多
关键词 Seal recognition seal authentication document tampering siamese network spatial transformer network similarity comparison network
在线阅读 下载PDF
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
5
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
A Shortest Path Algorithm for Multi-stage Network with Linear Parameter 被引量:2
6
作者 GAOTai-ping WANGChuan-long 《Systems Science and Systems Engineering》 CSCD 2002年第3期341-344,共4页
In this paper, we give the shortest path algorithm for multi-stage network with a linear parameter, and study its complexity.
关键词 the shortest path algorithm multi-stage network linear parameter
原文传递
Multi-Stage Hierarchical Channel Allocation in UAV-Assisted D2D Networks:A Stackelberg Game Approach 被引量:6
7
作者 Tao Fang DanWu +1 位作者 MengWang Jiaxin Chen 《China Communications》 SCIE CSCD 2021年第2期13-26,共14页
UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising te... UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising technology.However,the coexistence of UAV and D2D aggravates the conflict of spectrum resources.In addition,when the UAV performs the communication service,it will inevitably cause the location change,which will make the original channel allocation no longer applicable.Inspired by the influence of frequent channel switching on channel allocation,we define the communication utility as a tradeoff between the throughput and channel switching cost.In the considered model,we investigate the multi-stage hierarchical spectrum access problem with maximizing aggregate communication utilities in UAV-assisted D2D networks.In particular,due to the hierarchical feature of the considered network,we adopt Stackelberg game to formulate this spectrum access problem where both the throughput and channel switching cost are considered.We prove that the proposed game has a stable Stackelberg equilibrium(SE),and the heterogeneous network based channel allocation(HN-CA)algorithm is proposed to achieve the desired solution.Simulation results verify the validity of the proposed game and show the effectiveness of the HN-CA algorithm. 展开更多
关键词 UAV D2D multi-stage heterogeneous spectrum access stackelberg game
在线阅读 下载PDF
Machine learning of pyrite geochemistry reconstructs the multi-stage history of mineral deposits 被引量:1
8
作者 Pengpeng Yu Yuan Liu +5 位作者 Hanyu Wang Xi Chen Yi Zheng Wei Cao Yiqu Xiong Hongxiang Shan 《Geoscience Frontiers》 2025年第3期81-93,共13页
The application of machine learning for pyrite discrimination establishes a robust foundation for constructing the ore-forming history of multi-stage deposits;however,published models face challenges related to limite... The application of machine learning for pyrite discrimination establishes a robust foundation for constructing the ore-forming history of multi-stage deposits;however,published models face challenges related to limited,imbalanced datasets and oversampling.In this study,the dataset was expanded to approximately 500 samples for each type,including 508 sedimentary,573 orogenic gold,548 sedimentary exhalative(SEDEX)deposits,and 364 volcanogenic massive sulfides(VMS)pyrites,utilizing random forest(RF)and support vector machine(SVM)methodologies to enhance the reliability of the classifier models.The RF classifier achieved an overall accuracy of 99.8%,and the SVM classifier attained an overall accuracy of 100%.The model was evaluated by a five-fold cross-validation approach with 93.8%accuracy for the RF and 94.9%for the SVM classifier.These results demonstrate the strong feasibility of pyrite classification,supported by a relatively large,balanced dataset and high accuracy rates.The classifier was employed to reveal the genesis of the controversial Keketale Pb-Zn deposit in NW China,which has been inconclusive among SEDEX,VMS,or a SEDEX-VMS transition.Petrographic investigations indicated that the deposit comprises early fine-grained layered pyrite(Py1)and late recrystallized pyrite(Py2).The majority voting classified Py1 as the VMS type,with an accuracy of RF and SVM being 72.2%and 75%,respectively,and confirmed Py2 as an orogenic type with 74.3% and 77.1%accuracy,respectively.The new findings indicated that the Keketale deposit originated from a submarine VMS mineralization system,followed by late orogenic-type overprinting of metamorphism and deformation,which is consistent with the geological and geochemical observations.This study further emphasizes the advantages of Machine learning(ML)methods in accurately and directly discriminating the deposit types and reconstructing the formation history of multi-stage deposits. 展开更多
关键词 Machine learning Random forest Support vector machine PYRITE multi-stage genesis Keketale deposit
在线阅读 下载PDF
Modeling for heterogeneous multi-stage information propagation networks and maximizing information
9
作者 Ren-Jie Mei Li Ding +1 位作者 Xu-Ming An Ping Hu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第2期454-463,共10页
In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforc... In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforcement thresholds are considered. An information outbreak condition is derived, according to which the outbreak scale and individual density of each state under specific propagation parameters can be deduced. Monte Carlo experiments are conducted in Facebook networks to demonstrate the outbreak condition, and we find that social reinforcement effects generally inhibit the propagation of information though it contributes to the emergence of certain hot spots simultaneously. Additionally, by applying Pontryagin's Maximum Principle, we derive the optimal control strategy in the case of limited control resources to maximize the information propagation. Then the forward–backward sweep method is utilized to verify its performance with numerical simulation. 展开更多
关键词 HETEROGENEOUS network social REINFORCEMENT multi-stage optimal resource ALLOCATION
原文传递
Multi-stage Mineralization in the Giant Erdaokan Ag-Pb-Zn Deposit,Northeastern China:Evidence from Magnetite EPMA and LA-ICPMS Geochemistry
10
作者 FU Anzong LI Chenglu +6 位作者 YANG Wenpeng Masroor ALAM DENG Changzhou YANG Yuanjiang ZHENG Bo ZHAO Ruijun YUAN Maowen 《Acta Geologica Sinica(English Edition)》 2025年第2期532-552,共21页
Although previous researchers have attempted to decipher ore genesis and mineralization in the Erdaokan Ag-Pb-Zn deposit,some uncertainties regarding the mineralization process and evolution of both ore-forming fluids... Although previous researchers have attempted to decipher ore genesis and mineralization in the Erdaokan Ag-Pb-Zn deposit,some uncertainties regarding the mineralization process and evolution of both ore-forming fluids and magnetite types still need to be addressed.In this study,we obtained new EPMA,LA-ICP-MS,and in situ Fe isotope data from magnetite from the Erdaokan deposit,in order to better understand the mineralization mechanism and evolution of both magnetite and the ore-forming fluids.Our results identified seven types of magnetite at Erdaokan:disseminated magnetite(Mag1),coarse-grained magnetite(Mag2a),radial magnetite(Mag2b),fragmented fine-grained magnetite(Mag2c),vermicular gel magnetite(Mag3a1 and Mag3a2),colloidal magnetite(Mag3b)and dark gray magnetite(Mag4).All of the magnetite types were hydrothermal in origin and generally low in Ti(<400 ppm)and Ni(<800 ppm),while being enriched in light Fe isotopes(δ^(56)Fe ranging from−1.54‰to−0.06‰).However,they exhibit different geochemical signatures and are thus classified into high-manganese magnetite(Mag1,MnO>5 wt%),low-silicon magnetite(Mag2a-c,SiO_(2)<1 wt%),high-silicon magnetite(Mag3a-b,SiO_(2)from 1 to 7 wt%)and high-silicon-manganese magnetite(Mag4,SiO_(2)>1 wt%,MnO>0.2 wt%),each being formed within distinct hydrothermal environments.Based on mineralogy,elemental geochemistry,Fe isotopes,temperature trends,TMg-mag and(Ti+V)vs.(Al+Mn)diagrams,we propose that the Erdaokan Ag-Pb-Zn deposit underwent multi-stage mineralization,which can be broken down into four stages and nine sub-stages.Mag1,Mag2a-c,Mag3a-b and Mag4 were formed during the first sub-stage of each of the four stages,respectively.Additionally,fluid mixing,cooling and depressurization boiling were identified as the main mechanisms for mineral precipitation.The enrichment of Ag was significantly enhanced by the superposition of multi-stage ore-forming hydrothermal fluids in the Erdaokan Ag-Pb-Zn deposit. 展开更多
关键词 multi-stage mineralization magnetite geochemistry in situ Fe isotope Erdaokan Ag-Pb-Zn deposit
在线阅读 下载PDF
New unloading criterion for enhancing multi-stage triaxial tests based on radial strain gradient
11
作者 Guodong Jin Shujath Ali Syed +3 位作者 Héctor JoséGonzález-Pérez Hyung Tae Kwak Ali Abdullah Yousef Ali Abdullah Al Dhamen 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第8期4735-4744,共10页
This paper presents a new criterion for determining the unloading points quantitatively and consistently in a multi-stage triaxial test.The radial strain gradient(RSG)is first introduced as an arc tangent function of ... This paper presents a new criterion for determining the unloading points quantitatively and consistently in a multi-stage triaxial test.The radial strain gradient(RSG)is first introduced as an arc tangent function of the rate of change of radial strain to time.RSG is observed to correlate closely with the stress state of a compressed sample,and reaches a horizontal asymptote as approaching failure.For a given rock type,RSG value at peak stress is almost the same,irrespective of the porosity and permeability.These findings lead to the development of RSG criterion:Unloading points can be precisely determined at the time when RSG reaches a pre-determined value that is a little smaller than or equal to the RSG at peak stress.The RSG criterion is validated against other criteria and the single-stage triaxial test on various types of rocks.Failure envelopes from the RSG criterion match well with those from single-stage tests.A practical procedure is recommended to use the RSG criterion:an unconfined compression or single-stage test is first conducted to determine the RSG at peak stress for one sample,the unloading point is then selected to be a value close to the RSG at peak stress,and the multi-stage test is finally performed on another sample using the pre-selected RSG unloading criterion.Generally,the RSG criterion is applicable for any type of rocks,especially brittle rocks,where other criteria are not suitable.Further,it can be practically implemented on the most available rock mechanical testing instruments. 展开更多
关键词 Radial strain gradient Unloading criterion multi-stage triaxial test Mohr-coulomb failure envelope
在线阅读 下载PDF
Multi-stage and multi-objective optimization of anti-typhoon evacuation strategy for riser with new hang-off system
12
作者 Yan-Wei Li Xiu-Quan Liu +3 位作者 Peng-Ji Hu Xiao-Yu Hu Yuan-Jiang Chang Guo-Ming Chen 《Petroleum Science》 2025年第1期457-471,共15页
A new hang-off system has been proposed to improve the security of risers in hang-off modes during typhoons.However,efficient anti-typhoon evacuation strategies have not been investigated.Optimiza-tion model and metho... A new hang-off system has been proposed to improve the security of risers in hang-off modes during typhoons.However,efficient anti-typhoon evacuation strategies have not been investigated.Optimiza-tion model and method for the anti-typhoon evacuation strategies should be researched.Therefore,multi-objective functions are proposed based on operation time,evacuation speed stability,and steering stability.An evacuation path model and a dynamic model of risers with the new hang-off system are developed for design variables and constraints.A multi-objective optimization model with high-dimensional variables and complex constraints is established.Finally,a three-stage optimization method based on genetic algorithm,least square method,and the penalty function method is proposed to solve the multi-objective optimization model.Optimization results show that the operation time can be reduced through operation parameter optimization,especially evacuation heading optimization.The optimal anti-typhoon strategy is evacuation with all risers suspended along a variable path when the direction angle is large,while evacuation with all risers suspended along a straight path at another di-rection angle.Besides,the influencing factors on anti-typhoon evacuation strategies indicate that the proposed optimization model and method have strong applicability to working conditions and remarkable optimization effects. 展开更多
关键词 Anti-typhoon evacuation strategy RISER multi-stage and multi-objective Optimization Genetic algorithm Least square method
原文传递
Oxalate modification enabled advanced phosphate removal of nZVI:In Situ formed surface ternary complex and altered multi-stage adsorption process
13
作者 Shiyu Cao Jiangshan Li +3 位作者 Yanbiao Shi Furong Guo Tingjuan Gao Lizhi Zhang 《Journal of Environmental Sciences》 2025年第3期79-87,共9页
Nano zero-valent iron(nZVI)is a promising phosphate adsorbent for advanced phosphate removal.However,the rapid passivation of nZVI and the low activity of adsorption sites seriously limit its phosphate removal perform... Nano zero-valent iron(nZVI)is a promising phosphate adsorbent for advanced phosphate removal.However,the rapid passivation of nZVI and the low activity of adsorption sites seriously limit its phosphate removal performance,accounting for its inapplicability to meet the emission criteria of 0.1 mg P/L phosphate.In this study,we report that the oxalate modification can inhibit the passivation of nZVI and alter the multi-stage phosphate adsorption mechanism by changing the adsorption sites.As expected,the stronger antipassivation ability of oxalate modified nZVI(OX-nZVI)strongly favored its phosphate adsorption.Interestingly,the oxalate modification endowed the surface Fe(III)sites with the lowest chemisorption energy and the fastest phosphate adsorption ability than the other adsorption sites,by in situ forming a Fe(III)-phosphate-oxalate ternary complex,therefore enabling an advanced phosphate removal process.At an initial phosphate concentration of 1.00 mg P/L,pH of 6.0 and a dosage of 0.3 g/L of adsorbents,OX-nZVI exhibited faster phosphate removal rate(0.11 g/mg/min)and lower residual phosphate level(0.02 mg P/L)than nZVI(0.055 g/mg/min and 0.19 mg P/L).This study sheds light on the importance of site manipulation in the development of high-performance adsorbents,and offers a facile surface modification strategy to prepare superior iron-basedmaterials for advanced phosphate removal. 展开更多
关键词 Oxalate modification Advanced phosphate removal Nano zero-valent iron(nZVI) Surface ternary complex multi-stage adsorption
原文传递
Experimental investigation into the fracture propagation behavior of horizontal well multi-stage and multi-cluster fracturing within the roof of crushed soft coal seams
14
作者 Hai-Feng Zhao Jie-Lun Luo +3 位作者 Xue-Jiao Li Wen-Jie Yao Liang Ji Huai-Bin Zhen 《Petroleum Science》 2025年第11期4682-4713,共32页
The effectiveness of horizontal well multi-stage and multi-cluster fracturing in the fractured soft coal seam roof for coalbed methane(CBM) extraction has been demonstrated.This study focuses on the geological charact... The effectiveness of horizontal well multi-stage and multi-cluster fracturing in the fractured soft coal seam roof for coalbed methane(CBM) extraction has been demonstrated.This study focuses on the geological characteristics of the No.5 and No.11 coal seams in the Hancheng Block,Ordos Basin,China.A multi-functional,variable-size rock sample mold capable of securing the wellbore was developed to simulate layered formations comprising strata of varying lithology and thicknesses.A novel segmented fracturing simulation method based on an expandable pipe plugging technique is proposed.Large-scale true triaxial experiments were conducted to investigate the effects of horizontal wellbore location,perforation strategy,roof lithology,and vertical stress difference on fracture propagation,hydraulic energy variation,and the stimulated reservoir volume in horizontal wells targeting the soft coal seam roof.The results indicate that bilateral downward perforation with a phase angle of 120° optimizes hydraulic energy conservation,reduces operational costs,enhances fracture formation,and prevents fracturing failure caused by coal powder generation and migration.This perforation mode is thus considered optimal for coal seam roof fracturing.When the roof consists of sandstone,each perforation cluster tends to initiate a single dominant fracture with a regular geometry.In contrast,hydraulic fractures formed in mudstone roofs display diverse morphology.Due to its high strength,the sandstone roof requires significantly higher pressure for crack initiation and propagation,whereas the mudstone roof,with its strong water sensitivity,exhibits lower fracturing pressures.To mitigate inter-cluster interference,cluster spacing in mudstone roofs should be greater than that in sandstone roofs.Horizontal wellbore placement critically influences fracturing effectiveness.For indirect fracturing in sandstone roofs,an optimal position is 25 mm away from the lithological interface.In contrast,the optimal location for indirect fracturing in mudstone roofs is directly at the lithological interface with the coal seam.Higher vertical stress coefficients lead to increased fractu ring pressures and promote vertical,layer-penetrating fractures.A coefficient of 0.5 is identified as optimal for achieving effective indirect fracturing.This study provides valuable insights for the design and optimization of staged fracturing in horizontal wells targeting crushed soft coal seam roofs. 展开更多
关键词 Indirect fracturing Roof lithology Perforation mode Horizontal well location Vertical stress difference Horizontal well multi-stage and multicluster fracturing Fracture propagation Crushed soft coal seam Roof of coal seam
原文传递
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
15
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
16
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
17
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Networked Predictive Control:A Survey
18
作者 Zhong-Hua Pang Tong Mu +3 位作者 Yi Yu Haibin Guo Guo-Ping Liu Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期3-20,共18页
Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induc... Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induced delays,packet dropouts,and packet disorders.Despite significant advancements,the increasing complexity and dynamism of network environments,along with the growing complexity of systems,pose new challenges for NPC.These challenges include difficulties in system modeling,cyber attacks,component faults,limited network bandwidth,and the necessity for distributed collaboration.This survey aims to provide a comprehensive review of NPC strategies.It begins with a summary of the primary challenges faced by NCSs,followed by an introduction to the control structure and core concepts of NPC.The survey then discusses several typical NPC schemes and examines their extensions in the areas of secure control,fault-tolerant control,distributed coordinated control,and event-triggered control.Moreover,it reviews notable works that have implemented these schemes.Finally,the survey concludes by exploring typical applications of NPC schemes and highlighting several challenging issues that could guide future research efforts. 展开更多
关键词 Communication constraints cyber attacks networked control systems networked multi-agent systems networked predictive control
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
19
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
20
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部