期刊文献+
共找到547,396篇文章
< 1 2 250 >
每页显示 20 50 100
基于VMD-MSSST时频增强和ResNet多模态融合的故障诊断方法
1
作者 冯煜尧 刘承全 +3 位作者 张雨璠 薛亚晨 郑小霞 符杨 《机电工程》 北大核心 2026年第1期73-81,148,共10页
针对振动信号的非线性、非平稳性导致的故障特征提取与诊断难的问题,提出了一种基于VMD-MSSST时频增强和ResNet多模态融合的诊断方法。首先,利用变分模态分解将振动信号分解为多个本征模态函数,结合峭度与相关系数设定筛选准则,提取了... 针对振动信号的非线性、非平稳性导致的故障特征提取与诊断难的问题,提出了一种基于VMD-MSSST时频增强和ResNet多模态融合的诊断方法。首先,利用变分模态分解将振动信号分解为多个本征模态函数,结合峭度与相关系数设定筛选准则,提取了包含故障信息的有效模态,对信号进行了重构,并引入了多重同步挤压S变换,进行了时频特征增强,将能量集中到瞬时频率轨迹上,实现了对冲击故障特征的精准提取目的;然后,构建了多模态特征融合的故障诊断模型,利用ResNet提取了时频图像的深层空间特征、双向门控循环支路捕获时序特征、卷积注意力支路强化故障敏感频带,并在特征层对信息进行了融合;最后,以凯斯西储大学的轴承故障数据集为研究对象,对十种不同状态的振动信号进行了消融实验和对比实验,并在风机现场轴承数据上和传统方法进行了诊断对比。研究结果表明:采用基于VMD-MSSST时频增强和ResNet多模态融合的诊断方法,平均分类精度可达99.19%;通过可视化分析验证了该方法能实现故障特征的清晰聚类目标,说明VMD预处理与MSSST增强的协同作用能更有效地提取故障特征信息,双分支融合结构可实现模型对信号特征的充分挖掘目的,为复杂工况下的轴承故障诊断提供参考。 展开更多
关键词 故障诊断模型 滚动轴承 变分模态分解 多重同步挤压S变换 残差网络 门控循环单元 注意力模块
在线阅读 下载PDF
CAM-ResNet:基于ResNet的土地利用类型遥感图像分类
2
作者 王梓鉴 方建军 +1 位作者 袁涌博 刘泽宇 《北京联合大学学报》 2026年第1期49-54,共6页
在土地利用类型图像分类领域,传统分类方法在特征提取准确性与分类精度方面存在局限性,难以满足实际应用需求。本文以ResNet50为核心架构,引入卷积块注意力模块(convolutional block attention module,CBAM),强化特征提取,并采用自动混... 在土地利用类型图像分类领域,传统分类方法在特征提取准确性与分类精度方面存在局限性,难以满足实际应用需求。本文以ResNet50为核心架构,引入卷积块注意力模块(convolutional block attention module,CBAM),强化特征提取,并采用自动混合精度(automatic mixed precision,AMP)技术提高计算效率,构建了CAM-ResNet网络。实验结果显示,CAM-ResNet网络的总体精度达98.19%,较原网络高出10.16个百分点。消融实验进一步证明,CBAM注意力机制显著增强了模型的特征提取能力,AMP训练技术提高了模型的收敛速度,CAM-ResNet网络在土地利用类型遥感图像分类中具有一定的有效性和优越性。 展开更多
关键词 土地利用 resnet50 卷积块注意力模块(CBAM) 自动混合精度(AMP) 图像分类 卷积神经网络(CNN)
在线阅读 下载PDF
SA-ResNet:An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion
3
作者 Zengyu Cai Yuming Dai +1 位作者 Jianwei Zhang Yuan Feng 《Computers, Materials & Continua》 2025年第5期3335-3350,共16页
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network security.Intrusion Detection Systems(IDS)are essential ... The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network security.Intrusion Detection Systems(IDS)are essential for safeguarding network integrity.To address the low accuracy of existing intrusion detection models in identifying network attacks,this paper proposes an intrusion detection method based on the fusion of Spatial Attention mechanism and Residual Neural Network(SA-ResNet).Utilizing residual connections can effectively capture local features in the data;by introducing a spatial attention mechanism,the global dependency relationships of intrusion features can be extracted,enhancing the intrusion recognition model’s focus on the global features of intrusions,and effectively improving the accuracy of intrusion recognition.The proposed model in this paper was experimentally verified on theNSL-KDD dataset.The experimental results showthat the intrusion recognition accuracy of the intrusion detection method based on SA-ResNet has reached 99.86%,and its overall accuracy is 0.41% higher than that of traditional Convolutional Neural Network(CNN)models. 展开更多
关键词 Intrusion detection deep learning residual neural network spatial attention mechanism
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
4
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
5
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
Conditional Generative Adversarial Network-Based Travel Route Recommendation
6
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
融合ResNet-18与水动力模型的洪水演进快速预测
7
作者 童超 詹晗煜 +3 位作者 崔罡 刘康 欧阳磊 肖宏宇 《水资源保护》 北大核心 2026年第1期129-136,共8页
为实现高精度和高效率洪水演进预测,结合数据驱动与物理建模的双重优势,提出了融合残差神经网络(ResNet-18)与水动力模型Telemac2D的洪水演进快速预测算法,将Telemac2D生成的高精度洪水淹没数据作为训练样本,构建了基于一维ResNet-18的... 为实现高精度和高效率洪水演进预测,结合数据驱动与物理建模的双重优势,提出了融合残差神经网络(ResNet-18)与水动力模型Telemac2D的洪水演进快速预测算法,将Telemac2D生成的高精度洪水淹没数据作为训练样本,构建了基于一维ResNet-18的深度神经网络模型,并利用该模型对黄柏河流域下游尚家河河段洪水淹没水深与演进路径进行了实时动态预测和对比验证。结果表明:构建的ResNet-18模型对240组测试集预报结果的平均绝对误差和均方根误差分别为0.0332 m和0.0898 m,淹没范围的空间分布与Telemac2D模拟结果高度一致,相关系数达0.9981,对测量点水深的预测结果比卷积神经网络模型更精确,且计算效率相较传统水动力模型提升超300倍。 展开更多
关键词 洪水演进 残差神经网络 深度神经网络 Telemac2D 卷积神经网络模型 黄柏河流域
在线阅读 下载PDF
Analysis of DC Aging Characteristics of Stable ZnO Varistors Based on Voronoi Network and Finite Element Simulation Model
8
作者 ZHANG Ping LU Mingtai +1 位作者 LU Tiantian YUE Yinghu 《材料导报》 北大核心 2026年第2期20-28,共9页
In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results i... In modern ZnO varistors,traditional aging mechanisms based on increased power consumption are no longer relevant due to reduced power consumption during DC aging.Prolonged exposure to both AC and DC voltages results in increased leakage current,decreased breakdown voltage,and lower nonlinearity,ultimately compromising their protective performance.To investigate the evolution in electrical properties during DC aging,this work developed a finite element model based on Voronoi networks and conducted accelerated aging tests on commercial varistors.Throughout the aging process,current-voltage characteristics and Schottky barrier parameters were measured and analyzed.The results indicate that when subjected to constant voltage,current flows through regions with larger grain sizes,forming discharge channels.As aging progresses,the current focus increases on these channels,leading to a decline in the varistor’s overall performance.Furthermore,analysis of the Schottky barrier parameters shows that the changes in electrical performance during aging are non-monotonic.These findings offer theoretical support for understanding the aging mechanisms and condition assessment of modern stable ZnO varistors. 展开更多
关键词 ZnO varistors Voronoi network DC aging finite element method(FEM) current distribution double Schottky barrier theory
在线阅读 下载PDF
Artificial Neural Network Model for Thermal Conductivity Estimation of Metal Oxide Water-Based Nanofluids
9
作者 Nikhil S.Mane Sheetal Kumar Dewangan +3 位作者 Sayantan Mukherjee Pradnyavati Mane Deepak Kumar Singh Ravindra Singh Saluja 《Computers, Materials & Continua》 2026年第1期316-331,共16页
The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a n... The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids.Researchers rely on experimental investigations to explore nanofluid properties,as it is a necessary step before their practical application.As these investigations are time and resource-consuming undertakings,an effective prediction model can significantly improve the efficiency of research operations.In this work,an Artificial Neural Network(ANN)model is developed to predict the thermal conductivity of metal oxide water-based nanofluid.For this,a comprehensive set of 691 data points was collected from the literature.This dataset is split into training(70%),validation(15%),and testing(15%)and used to train the ANN model.The developed model is a backpropagation artificial neural network with a 4–12–1 architecture.The performance of the developed model shows high accuracy with R values above 0.90 and rapid convergence.It shows that the developed ANN model accurately predicts the thermal conductivity of nanofluids. 展开更多
关键词 Artificial neural networks nanofluids thermal conductivity PREDICTION
在线阅读 下载PDF
Network perspective on rumination and non-suicidal self-injury among adolescents with depressive disorders
10
作者 Fang-Fang Zhang Rui Guo +3 位作者 Si-Lan Chen Wei Yang Xing-Li Liang Ming-Fang Ma 《World Journal of Psychiatry》 2026年第1期346-355,共10页
BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes tha... BACKGROUND Non-suicidal self-injury(NSSI)is common among adolescents with depressive disorders and poses a major public health challenge.Rumination,a key cognitive feature of depression,includes different subtypes that may relate to NSSI through distinct psychological mechanisms.However,how these subtypes interact with specific NSSI behaviors remains unclear.AIM To examine associations between rumination subtypes and specific NSSI behaviors in adolescents.METHODS We conducted a cross-sectional study with 305 hospitalized adolescents diagnosed with depressive disorders.The subjects ranged from 12-18 years in age.Rumi-nation subtypes were assessed using the Ruminative Response Scale,and 12 NSSI behaviors were evaluated using a validated questionnaire.Network analysis was applied to explore symptom-level associations and identify central symptoms.RESULTS The network analysis revealed close connections between rumination subtypes and NSSI behaviors.Brooding was linked to behaviors such as hitting objects and burning.Scratching emerged as the most influential NSSI symptom.Symptomfocused rumination served as a key bridge connecting rumination and NSSI.CONCLUSION Symptom-focused rumination and scratching were identified as potential intervention targets.These findings highlight the psychological significance of specific cognitive-behavioral links in adolescent depression and suggest directions for tailored prevention and treatment.However,the cross-sectional,single-site design limits causal inference and generalizability.Future longitudinal and multi-center studies are needed to confirm causal pathways and verify the generalizability of the findings to broader adolescent populations. 展开更多
关键词 Depressive disorders Adolescents network analysis RUMINATION Non-suicidal self-injury
暂未订购
Recurrent MAPPO for Joint UAV Trajectory and Traffic Offloading in Space-Air-Ground Integrated Networks
11
作者 Zheyuan Jia Fenglin Jin +1 位作者 Jun Xie Yuan He 《Computers, Materials & Continua》 2026年第1期447-461,共15页
This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential g... This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs. 展开更多
关键词 Space-air-ground integrated networks UAV traffic offloading reinforcement learning
在线阅读 下载PDF
Defect Identification Method of Power Grid Secondary Equipment Based on Coordination of Knowledge Graph and Bayesian Network Fusion
12
作者 Jun Xiong Peng Yang +1 位作者 Bohan Chen Zeming Chen 《Energy Engineering》 2026年第1期296-313,共18页
The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermo... The reliable operation of power grid secondary equipment is an important guarantee for the safety and stability of the power system.However,various defects could be produced in the secondary equipment during longtermoperation.The complex relationship between the defect phenomenon andmulti-layer causes and the probabilistic influence of secondary equipment cannot be described through knowledge extraction and fusion technology by existing methods,which limits the real-time and accuracy of defect identification.Therefore,a defect recognition method based on the Bayesian network and knowledge graph fusion is proposed.The defect data of secondary equipment is transformed into the structured knowledge graph through knowledge extraction and fusion technology.The knowledge graph of power grid secondary equipment is mapped to the Bayesian network framework,combined with historical defect data,and introduced Noisy-OR nodes.The prior and conditional probabilities of the Bayesian network are then reasonably assigned to build a model that reflects the probability dependence between defect phenomena and potential causes in power grid secondary equipment.Defect identification of power grid secondary equipment is achieved by defect subgraph search based on the knowledge graph,and defect inference based on the Bayesian network.Practical application cases prove this method’s effectiveness in identifying secondary equipment defect causes,improving identification accuracy and efficiency. 展开更多
关键词 Knowledge graph Bayesian network secondary equipment defect identification
在线阅读 下载PDF
Investigating the potential mechanisms of Wenqing Yin against atopic dermatitis based on network pharmacology,experimental pharmacology,and molecular docking
13
作者 Yi Wang Zhen Liu +3 位作者 Si-Man Li Lin Lin Wei Dai Meng-Yue Ren 《Traditional Medicine Research》 2026年第2期1-11,共11页
Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY o... Background:Wenqing Yin(WQY)is a classic prescription used to treat skin diseases like atopic dermatitis(AD)in China,and the aim of this study is to investigate the therapeutic effects and molecular mechanisms of WQY on AD.Methods:The DNFB-induced mouse models of AD were established to investigate the therapeutic effects of WQY on AD.The symptoms of AD in the ears and backs of the mice were assessed,while inflammatory factors in the ear were quantified using quantitative real-time-polymerase chain reaction(qRT-PCR),and the percentages of CD4^(+)and CD8^(+)cells in the spleen were analyzed through flow cytometry.The compounds in WQY were identified using ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS)analysis and the key targets and pathways of WQY to treat AD were predicted by network pharmacology.Subsequently,the key genes were tested and verified by qRT-PCR,and the potential active components and target proteins were verified by molecular docking.Results:WQY relieved the AD symptoms and histopathological injuries in the ear and back skin of mice with AD.Meanwhile,WQY significantly reduced the levels of inflammatory factors IL-6 and IL-1βin ear tissue,as well as the ratio of CD4^(+)/CD8^(+)cells in spleen.Additionally,a total of 142 compounds were identified from the water extract of WQY by UPLC-Orbitrap-MS/MS.39 key targets related to AD were screened out by network pharmacology methods.The KEGG analysis indicated that the effects of WQY were primarily mediated through pathways associated with Toll-like receptor signaling and T cell receptor signaling.Moreover,the results of qRT-PCR demonstrated that WQY significantly reduced the mRNA expressions of IL-4,IL-10,GATA3 and FOXP3,and molecular docking simulation verified that the active components of WQY had excellent binding abilities with IL-4,IL-10,GATA3 and FOXP3 proteins.Conclusion:The present study demonstrated that WQY effectively relieved AD symptoms in mice,decreased the inflammatory factors levels,regulated the balance of CD4^(+)and CD8^(+)cells,and the mechanism may be associated with the suppression of Th2 and Treg cell immune responses. 展开更多
关键词 Wenqing Yin atopic dermatitis mouse model UPLC-Orbitrap-MS/MS network pharmacology
暂未订购
Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features
14
作者 Ghadah Naif Alwakid Samabia Tehsin +3 位作者 Mamoona Humayun Asad Farooq Ibrahim Alrashdi Amjad Alsirhani 《Computers, Materials & Continua》 2026年第1期1964-1984,共21页
Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and ... Skin diseases affect millions worldwide.Early detection is key to preventing disfigurement,lifelong disability,or death.Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance,and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks(CNNs).We frame skin lesion recognition as graph-based reasoning and,to ensure fair evaluation and avoid data leakage,adopt a strict lesion-level partitioning strategy.Each image is first over-segmented using SLIC(Simple Linear Iterative Clustering)to produce perceptually homogeneous superpixels.These superpixels form the nodes of a region-adjacency graph whose edges encode spatial continuity.Node attributes are 1280-dimensional embeddings extracted with a lightweight yet expressive EfficientNet-B0 backbone,providing strong representational power at modest computational cost.The resulting graphs are processed by a five-layer Graph Attention Network(GAT)that learns to weight inter-node relationships dynamically and aggregates multi-hop context before classifying lesions into seven classes with a log-softmax output.Extensive experiments on the DermaMNIST benchmark show the proposed pipeline achieves 88.35%accuracy and 98.04%AUC,outperforming contemporary CNNs,AutoML approaches,and alternative graph neural networks.An ablation study indicates EfficientNet-B0 produces superior node descriptors compared with ResNet-18 and DenseNet,and that roughly five GAT layers strike a good balance between being too shallow and over-deep while avoiding oversmoothing.The method requires no data augmentation or external metadata,making it a drop-in upgrade for clinical computer-aided diagnosis systems. 展开更多
关键词 Graph neural network image classification DermaMNIST dataset graph representation
在线阅读 下载PDF
A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection
15
作者 Zheng Zhang Jie Hao +2 位作者 Liquan Chen Tianhao Hou Yanan Liu 《Computers, Materials & Continua》 2026年第1期1119-1140,共22页
With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion det... With the increasing severity of network security threats,Network Intrusion Detection(NID)has become a key technology to ensure network security.To address the problem of low detection rate of traditional intrusion detection models,this paper proposes a Dual-Attention model for NID,which combines Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM)to design two modules:the FocusConV and the TempoNet module.The FocusConV module,which automatically adjusts and weights CNN extracted local features,focuses on local features that are more important for intrusion detection.The TempoNet module focuses on global information,identifies more important features in time steps or sequences,and filters and weights the information globally to further improve the accuracy and robustness of NID.Meanwhile,in order to solve the class imbalance problem in the dataset,the EQL v2 method is used to compute the class weights of each class and to use them in the loss computation,which optimizes the performance of the model on the class imbalance problem.Extensive experiments were conducted on the NSL-KDD,UNSW-NB15,and CIC-DDos2019 datasets,achieving average accuracy rates of 99.66%,87.47%,and 99.39%,respectively,demonstrating excellent detection accuracy and robustness.The model also improves the detection performance of minority classes in the datasets.On the UNSW-NB15 dataset,the detection rates for Analysis,Exploits,and Shellcode attacks increased by 7%,7%,and 10%,respectively,demonstrating the Dual-Attention CNN-BiLSTM model’s excellent performance in NID. 展开更多
关键词 network intrusion detection class imbalance problem deep learning
在线阅读 下载PDF
P4LoF: Scheduling Loop-Free Multi-Flow Updates in Programmable Networks
16
作者 Jiqiang Xia Qi Zhan +2 位作者 Le Tian Yuxiang Hu Jianhua Peng 《Computers, Materials & Continua》 2026年第1期1236-1254,共19页
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H... The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency. 展开更多
关键词 network management update consistency programmable data plane P4
在线阅读 下载PDF
FMCSNet: Mobile Devices-Oriented Lightweight Multi-Scale Object Detection via Fast Multi-Scale Channel Shuffling Network Model
17
作者 Lijuan Huang Xianyi Liu +1 位作者 Jinping Liu Pengfei Xu 《Computers, Materials & Continua》 2026年第1期1292-1311,共20页
The ubiquity of mobile devices has driven advancements in mobile object detection.However,challenges in multi-scale object detection in open,complex environments persist due to limited computational resources.Traditio... The ubiquity of mobile devices has driven advancements in mobile object detection.However,challenges in multi-scale object detection in open,complex environments persist due to limited computational resources.Traditional approaches like network compression,quantization,and lightweight design often sacrifice accuracy or feature representation robustness.This article introduces the Fast Multi-scale Channel Shuffling Network(FMCSNet),a novel lightweight detection model optimized for mobile devices.FMCSNet integrates a fully convolutional Multilayer Perceptron(MLP)module,offering global perception without significantly increasing parameters,effectively bridging the gap between CNNs and Vision Transformers.FMCSNet achieves a delicate balance between computation and accuracy mainly by two key modules:the ShiftMLP module,including a shift operation and an MLP module,and a Partial group Convolutional(PGConv)module,reducing computation while enhancing information exchange between channels.With a computational complexity of 1.4G FLOPs and 1.3M parameters,FMCSNet outperforms CNN-based and DWConv-based ShuffleNetv2 by 1%and 4.5%mAP on the Pascal VOC 2007 dataset,respectively.Additionally,FMCSNet achieves a mAP of 30.0(0.5:0.95 IoU threshold)with only 2.5G FLOPs and 2.0M parameters.It achieves 32 FPS on low-performance i5-series CPUs,meeting real-time detection requirements.The versatility of the PGConv module’s adaptability across scenarios further highlights FMCSNet as a promising solution for real-time mobile object detection. 展开更多
关键词 Object detection lightweight network partial group convolution multilayer perceptron
在线阅读 下载PDF
Combined Fault Tree Analysis and Bayesian Network for Reliability Assessment of Marine Internal Combustion Engine
18
作者 Ivana Jovanović Çağlar Karatuğ +1 位作者 Maja Perčić Nikola Vladimir 《哈尔滨工程大学学报(英文版)》 2026年第1期239-258,共20页
This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for ... This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for identifying critical failure modes and their root causes,while BN introduces flexibility in probabilistic reasoning,enabling dynamic updates based on new evidence.This dual methodology overcomes the limitations of static FTA models,offering a comprehensive framework for system reliability analysis.Critical failures,including External Leakage(ELU),Failure to Start(FTS),and Overheating(OHE),were identified as key risks.By incorporating redundancy into high-risk components such as pumps and batteries,the likelihood of these failures was significantly reduced.For instance,redundant pumps reduced the probability of ELU by 31.88%,while additional batteries decreased the occurrence of FTS by 36.45%.The results underscore the practical benefits of combining FTA and BN for enhancing system reliability,particularly in maritime applications where operational safety and efficiency are critical.This research provides valuable insights for maintenance planning and highlights the importance of redundancy in critical systems,especially as the industry transitions toward more autonomous vessels. 展开更多
关键词 Fault tree analysis Bayesian network RELIABILITY REDUNDANCY Internal combustion engine
在线阅读 下载PDF
Multi-Objective Evolutionary Framework for High-Precision Community Detection in Complex Networks
19
作者 Asal Jameel Khudhair Amenah Dahim Abbood 《Computers, Materials & Continua》 2026年第1期1453-1483,共31页
Community detection is one of the most fundamental applications in understanding the structure of complicated networks.Furthermore,it is an important approach to identifying closely linked clusters of nodes that may r... Community detection is one of the most fundamental applications in understanding the structure of complicated networks.Furthermore,it is an important approach to identifying closely linked clusters of nodes that may represent underlying patterns and relationships.Networking structures are highly sensitive in social networks,requiring advanced techniques to accurately identify the structure of these communities.Most conventional algorithms for detecting communities perform inadequately with complicated networks.In addition,they miss out on accurately identifying clusters.Since single-objective optimization cannot always generate accurate and comprehensive results,as multi-objective optimization can.Therefore,we utilized two objective functions that enable strong connections between communities and weak connections between them.In this study,we utilized the intra function,which has proven effective in state-of-the-art research studies.We proposed a new inter-function that has demonstrated its effectiveness by making the objective of detecting external connections between communities is to make them more distinct and sparse.Furthermore,we proposed a Multi-Objective community strength enhancement algorithm(MOCSE).The proposed algorithm is based on the framework of the Multi-Objective Evolutionary Algorithm with Decomposition(MOEA/D),integrated with a new heuristic mutation strategy,community strength enhancement(CSE).The results demonstrate that the model is effective in accurately identifying community structures while also being computationally efficient.The performance measures used to evaluate the MOEA/D algorithm in our work are normalized mutual information(NMI)and modularity(Q).It was tested using five state-of-the-art algorithms on social networks,comprising real datasets(Zachary,Dolphin,Football,Krebs,SFI,Jazz,and Netscience),as well as twenty synthetic datasets.These results provide the robustness and practical value of the proposed algorithm in multi-objective community identification. 展开更多
关键词 Multi-objective optimization evolutionary algorithms community detection HEURISTIC METAHEURISTIC hybrid social network MODELS
在线阅读 下载PDF
A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications
20
作者 Haoran Wang Shuhong Yang +2 位作者 Kuan Shao Tao Xiao Zhenyong Zhang 《Computers, Materials & Continua》 2026年第1期1354-1371,共18页
With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan... With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail. 展开更多
关键词 Artificial Intelligence of Things(AIoT) convolutional neural network PRIVACY-PRESERVING fully homomorphic encryption
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部