期刊文献+
共找到4,997篇文章
< 1 2 250 >
每页显示 20 50 100
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
1
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of Things(IoT) HCI CNN LSTM random forest intelligent secure solutions
在线阅读 下载PDF
OSSerCopilot:An LLM-driven Tutoring System for Fostering Open Source Competency in Software Engineering Education
2
作者 Xin Tan Jingyi Tan +4 位作者 Weimiao Ren Keqing Fan Xiao Long Fang Liu Li Zhang 《计算机教育》 2026年第3期119-129,共11页
In the context of large language model(LLM)reshaping software engineering education,this paper presents OSSerCopilot,a LLM-based tutoring system designed to address the critical challenge faced by newcomers(especially... In the context of large language model(LLM)reshaping software engineering education,this paper presents OSSerCopilot,a LLM-based tutoring system designed to address the critical challenge faced by newcomers(especially student contributors)in open source software(OSS)communities.Leveraging natural language processing,code semantic understanding,and learner profiling,the system functions as an intelligent tutor to scaffold three core competency domains:contribution guideline interpretation,project architecture comprehension,and personalized task matching.By transforming traditional onboarding barriers-such as complex contribution documentation and opaque project structures-into interactive learning journeys,OSSerCopilot enables newcomers to complete their first OSS contribution more easily and confidently.This paper highlights how LLM technologies can redefine software engineering education by bridging the gap between theoretical knowledge and practical OSS participation,offering implications for curriculum design,competency assessment,and sustainable OSS ecosystem cultivation.A demonstration video of the system is available at https://figshare.com/articles/media/OSSerCopilot_Introduction_mp4/29510276. 展开更多
关键词 Software engineering education Open source software education Intelligent tutoring systems Newcomer onboarding Large language models AI-driven educational tools OSS contribution
在线阅读 下载PDF
Harmonization of Heart Disease Dataset for Accurate Diagnosis:A Machine Learning Approach Enhanced by Feature Engineering
3
作者 Ruhul Amin Md.Jamil Khan +2 位作者 Tonway Deb Nath Md.Shamim Reza Jungpil Shin 《Computers, Materials & Continua》 2025年第3期3907-3919,共13页
Heart disease includes a multiplicity of medical conditions that affect the structure,blood vessels,and general operation of the heart.Numerous researchers have made progress in correcting and predicting early heart d... Heart disease includes a multiplicity of medical conditions that affect the structure,blood vessels,and general operation of the heart.Numerous researchers have made progress in correcting and predicting early heart disease,but more remains to be accomplished.The diagnostic accuracy of many current studies is inadequate due to the attempt to predict patients with heart disease using traditional approaches.By using data fusion from several regions of the country,we intend to increase the accuracy of heart disease prediction.A statistical approach that promotes insights triggered by feature interactions to reveal the intricate pattern in the data,which cannot be adequately captured by a single feature.We processed the data using techniques including feature scaling,outlier detection and replacement,null and missing value imputation,and more to improve the data quality.Furthermore,the proposed feature engineering method uses the correlation test for numerical features and the chi-square test for categorical features to interact with the feature.To reduce the dimensionality,we subsequently used PCA with 95%variation.To identify patients with heart disease,hyperparameter-based machine learning algorithms like RF,XGBoost,Gradient Boosting,LightGBM,CatBoost,SVM,and MLP are utilized,along with ensemble models.The model’s overall prediction performance ranges from 88%to 92%.In order to attain cutting-edge results,we then used a 1D CNN model,which significantly enhanced the prediction with an accuracy score of 96.36%,precision of 96.45%,recall of 96.36%,specificity score of 99.51%and F1 score of 96.34%.The RF model produces the best results among all the classifiers in the evaluation matrix without feature interaction,with accuracy of 90.21%,precision of 90.40%,recall of 90.86%,specificity of 90.91%,and F1 score of 90.63%.Our proposed 1D CNN model is 7%superior to the one without feature engineering when compared to the suggested approach.This illustrates how interaction-focused feature analysis can produce precise and useful insights for heart disease diagnosis. 展开更多
关键词 Heart disease HARMONIZATION feature interaction PCA model hyper tuning machine learning
在线阅读 下载PDF
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering
4
作者 Dae-Kyoo Kim 《Computers, Materials & Continua》 2025年第8期2549-2572,共24页
Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints... Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems. 展开更多
关键词 METAMODELING no-cloning theorem quantum software software engineering
在线阅读 下载PDF
Computer Modeling Approaches for Blockchain-Driven Supply Chain Intelligence:A Review on Enhancing Transparency,Security,and Efficiency
5
作者 Puranam Revanth Kumar Gouse Baig Mohammad +4 位作者 Pallati Narsimhulu Dharnisha Narasappa Lakshmana Phaneendra Maguluri Subhav Singh Shitharth Selvarajan 《Computer Modeling in Engineering & Sciences》 2025年第9期2779-2818,共40页
Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have probl... Blockchain Technology(BT)has emerged as a transformative solution for improving the efficacy,security,and transparency of supply chain intelligence.Traditional Supply Chain Management(SCM)systems frequently have problems such as data silos,a lack of visibility in real time,fraudulent activities,and inefficiencies in tracking and traceability.Blockchain’s decentralized and irreversible ledger offers a solid foundation for dealing with these issues;it facilitates trust,security,and the sharing of data in real-time among all parties involved.Through an examination of critical technologies,methodology,and applications,this paper delves deeply into computer modeling based-blockchain framework within supply chain intelligence.The effect of BT on SCM is evaluated by reviewing current research and practical applications in the field.As part of the process,we delved through the research on blockchain-based supply chain models,smart contracts,Decentralized Applications(DApps),and how they connect to other cutting-edge innovations like Artificial Intelligence(AI)and the Internet of Things(IoT).To quantify blockchain’s performance,the study introduces analytical models for efficiency improvement,security enhancement,and scalability,enabling computational assessment and simulation of supply chain scenarios.These models provide a structured approach to predicting system performance under varying parameters.According to the results,BT increases efficiency by automating transactions using smart contracts,increases security by using cryptographic techniques,and improves transparency in the supply chain by providing immutable records.Regulatory concerns,challenges with interoperability,and scalability all work against broad adoption.To fully automate and intelligently integrate blockchain with AI and the IoT,additional research is needed to address blockchain’s current limitations and realize its potential for supply chain intelligence. 展开更多
关键词 Blockchain supply chain management TRANSPARENCY SECURITY smart contracts DECENTRALIZATION EFFICIENCY
在线阅读 下载PDF
Digital Twins and Cyber-Physical Systems:A New Frontier in Computer Modeling
6
作者 Vidyalakshmi G S Gopikrishnan +2 位作者 Wadii Boulila Anis Koubaa Gautam Srivastava 《Computer Modeling in Engineering & Sciences》 2025年第4期51-113,共63页
Cyber-Physical Systems(CPS)represent an integration of computational and physical elements,revolutionizing industries by enabling real-time monitoring,control,and optimization.A complementary technology,Digital Twin(D... Cyber-Physical Systems(CPS)represent an integration of computational and physical elements,revolutionizing industries by enabling real-time monitoring,control,and optimization.A complementary technology,Digital Twin(DT),acts as a virtual replica of physical assets or processes,facilitating better decision making through simulations and predictive analytics.CPS and DT underpin the evolution of Industry 4.0 by bridging the physical and digital domains.This survey explores their synergy,highlighting how DT enriches CPS with dynamic modeling,realtime data integration,and advanced simulation capabilities.The layered architecture of DTs within CPS is examined,showcasing the enabling technologies and tools vital for seamless integration.The study addresses key challenges in CPS modeling,such as concurrency and communication,and underscores the importance of DT in overcoming these obstacles.Applications in various sectors are analyzed,including smart manufacturing,healthcare,and urban planning,emphasizing the transformative potential of CPS-DT integration.In addition,the review identifies gaps in existing methodologies and proposes future research directions to develop comprehensive,scalable,and secure CPSDT systems.By synthesizing insights fromthe current literature and presenting a taxonomy of CPS and DT,this survey serves as a foundational reference for academics and practitioners.The findings stress the need for unified frameworks that align CPS and DT with emerging technologies,fostering innovation and efficiency in the digital transformation era. 展开更多
关键词 Cyber physical systems digital twin efficiency Industry 4.0 robustness and intelligence
在线阅读 下载PDF
Enhancing Employee Turnover Prediction:An Advanced Feature Engineering Analysis with CatBoost
7
作者 Md Monir Ahammod Bin Atique Md Ilias Bappi +3 位作者 Kwanghoon Choi Kyungbaek Kim Md Abul Ala Walid Pranta Kumar Sarkar 《Computer Systems Science & Engineering》 2025年第1期455-479,共25页
Employee turnover presents considerable challenges for organizations,leading to increased recruitment costs and disruptions in ongoing operations.High voluntary attrition rates can result in substantial financial loss... Employee turnover presents considerable challenges for organizations,leading to increased recruitment costs and disruptions in ongoing operations.High voluntary attrition rates can result in substantial financial losses,making it essential for Human Resource(HR)departments to prioritize turnover reduction.In this context,Artificial Intelligence(AI)has emerged as a vital tool in strengthening business strategies and people management.This paper incorporates two new representative features,introducing three types of feature engineering to enhance the analysis of employee turnover in the IBM HR Analytics dataset.Key Machine Learning(ML)techniques were subsequently employed in this work,such as Support Vector Machine(SVM),Random Forest(RF),Logistic Regression(LR),Extreme Gradient Boosting(XGBoost),and especially Categorical Boosting(CatBoost),a gradient boosting algorithm optimized for categorical data to analyze employee turnover.Adopting the unique feature engineering process enables CatBoost to enhance model accuracy and robustness while effectively analyzing complex patterns within employee data.Experimental results demonstrate the effectiveness of our proposed methodology,achieving the highest accuracy of 90.14%and an F1-score of 0.88 on the IBM dataset.To assess the capability of our detection system,we have also used an extended dataset,achieving an optimal accuracy of 98.10%and an F1-score of 0.98.These results strongly indicate the efficiency of our proposed methodology and highlight the impact of feature engineering on predictive performance.Moreover,by pinpointing the top ten factors influencing attrition,including“Monthly Income”,“Over Time”,“Total Satisfaction”,and others,this research equips HR departments with insights to implement targeted retention strategies,such as enhancing compensation or job satisfaction,to retain key talent before they consider leaving. 展开更多
关键词 Employee attrition CatBoost feature engineering machine learning artificial intelligence
在线阅读 下载PDF
Attention U-Net for Precision Skeletal Segmentation in Chest X-Ray Imaging:Advancing Person Identification Techniques in Forensic Science
8
作者 Hazem Farah Akram Bennour +3 位作者 Hama Soltani Mouaaz Nahas Rashiq Rafiq Marie Mohammed Al-Sarem 《Computers, Materials & Continua》 2025年第11期3335-3348,共14页
This study presents an advanced method for post-mortem person identification using the segmentation of skeletal structures from chest X-ray images.The proposed approach employs the Attention U-Net architecture,enhance... This study presents an advanced method for post-mortem person identification using the segmentation of skeletal structures from chest X-ray images.The proposed approach employs the Attention U-Net architecture,enhanced with gated attention mechanisms,to refine segmentation by emphasizing spatially relevant anatomical features while suppressing irrelevant details.By isolating skeletal structures which remain stable over time compared to soft tissues,this method leverages bones as reliable biometric markers for identity verification.The model integrates custom-designed encoder and decoder blocks with attention gates,achieving high segmentation precision.To evaluate the impact of architectural choices,we conducted an ablation study comparing Attention U-Net with and without attentionmechanisms,alongside an analysis of data augmentation effects.Training and evaluation were performed on a curated chest X-ray dataset,with segmentation performance measured using Dice score,precision,and loss functions,achieving over 98% precision and 94% Dice score.The extracted bone structures were further processed to derive unique biometric patterns,enabling robust and privacy-preserving person identification.Our findings highlight the effectiveness of attentionmechanisms in improving segmentation accuracy and underscore the potential of chest bonebased biometrics in forensic and medical imaging.This work paves the way for integrating artificial intelligence into real-world forensic workflows,offering a non-invasive and reliable solution for post-mortem identification. 展开更多
关键词 Bone extraction segmentation of skeletal structures chest X-ray images person identification deep learning attention mechanisms U-Net
在线阅读 下载PDF
Feature Engineering Methods for Analyzing Blood Samples for Early Diagnosis of Hepatitis Using Machine Learning Approaches
9
作者 Mohamed A.G.Hazber Ebrahim Mohammed Senan Hezam Saud Alrashidi 《Computer Modeling in Engineering & Sciences》 2025年第3期3229-3254,共26页
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to serious.Hepatitis is diagnosed through many blood tests and factors;Artificial Int... Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to serious.Hepatitis is diagnosed through many blood tests and factors;Artificial Intelligence(AI)techniques have played an important role in early diagnosis and help physicians make decisions.This study evaluated the performance of Machine Learning(ML)algorithms on the hepatitis data set.The dataset contains missing values that have been processed and outliers removed.The dataset was counterbalanced by the Synthetic Minority Over-sampling Technique(SMOTE).The features of the data set were processed in two ways:first,the application of the Recursive Feature Elimination(RFE)algorithm to arrange the percentage of contribution of each feature to the diagnosis of hepatitis,then selection of important features using the t-distributed Stochastic Neighbor Embedding(t-SNE)and Principal Component Analysis(PCA)algorithms.Second,the SelectKBest function was applied to give scores for each attribute,followed by the t-SNE and PCA algorithms.Finally,the classification algorithms K-Nearest Neighbors(KNN),Support Vector Machine(SVM),Artificial Neural Network(ANN),Decision Tree(DT),and Random Forest(RF)were fed by the dataset after processing the features in different methods are RFE with t-SNE and PCA and SelectKBest with t-SNE and PCA).All algorithms yielded promising results for diagnosing hepatitis data sets.The RF with RFE and PCA methods achieved accuracy,Precision,Recall,and AUC of 97.18%,96.72%,97.29%,and 94.2%,respectively,during the training phase.During the testing phase,it reached accuracy,Precision,Recall,and AUC by 96.31%,95.23%,97.11%,and 92.67%,respectively. 展开更多
关键词 HEPATITIS machine learning PCA RFE SelectKBest t-SNE
在线阅读 下载PDF
Type-I Heavy-Tailed Burr XII Distribution with Applications to Quality Control,Skewed Reliability Engineering Systems and Lifetime Data
10
作者 Okechukwu J.Obulezi Hatem E.Semary +4 位作者 Sadia Nadir Chinyere P.Igbokwe Gabriel O.Orji A.S.Al-Moisheer Mohammed Elgarhy 《Computer Modeling in Engineering & Sciences》 2025年第9期2991-3027,共37页
This study introduces the type-I heavy-tailed Burr XII(TIHTBXII)distribution,a highly flexible and robust statistical model designed to address the limitations of conventional distributions in analyzing data character... This study introduces the type-I heavy-tailed Burr XII(TIHTBXII)distribution,a highly flexible and robust statistical model designed to address the limitations of conventional distributions in analyzing data characterized by skewness,heavy tails,and diverse hazard behaviors.We meticulously develop the TIHTBXII’s mathematical foundations,including its probability density function(PDF),cumulative distribution function(CDF),and essential statistical properties,crucial for theoretical understanding and practical application.A comprehensive Monte Carlo simulation evaluates four parameter estimation methods:maximum likelihood(MLE),maximum product spacing(MPS),least squares(LS),and weighted least squares(WLS).The simulation results consistently show that as sample sizes increase,the Bias and RMSE of all estimators decrease,with WLS and LS often demonstrating superior and more stable performance.Beyond theoretical development,we present a practical application of the TIHTBXII distribution in constructing a group acceptance sampling plan(GASP)for truncated life tests.This application highlights how the TIHTBXII model can optimize quality control decisions by minimizing the average sample number(ASN)while effectively managing consumer and producer risks.Empirical validation using real-world datasets,including“Active Repair Duration,”“Groundwater Contaminant Measurements,”and“Dominica COVID-19 Mortality,”further demonstrates the TIHTBXII’s superior fit compared to existing models.Our findings confirm the TIHTBXII distribution as a powerful and reliable alternative for accurately modeling complex data in fields such as reliability engineering and quality assessment,leading to more informed and robust decision-making. 展开更多
关键词 Acceptance sampling heavy-tailed models parameter estimation reliability engineering
在线阅读 下载PDF
Bat algorithm based on kinetic adaptation and elite communication for engineering problems
11
作者 Chong Yuan Dong Zhao +4 位作者 Ali Asghar Heidari Lei Liu Shuihua Wang Huiling Chen Yudong Zhang 《CAAI Transactions on Intelligence Technology》 2025年第4期1174-1200,共27页
The Bat algorithm,a metaheuristic optimization technique inspired by the foraging behaviour of bats,has been employed to tackle optimization problems.Known for its ease of implementation,parameter tunability,and stron... The Bat algorithm,a metaheuristic optimization technique inspired by the foraging behaviour of bats,has been employed to tackle optimization problems.Known for its ease of implementation,parameter tunability,and strong global search capabilities,this algorithm finds application across diverse optimization problem domains.However,in the face of increasingly complex optimization challenges,the Bat algorithm encounters certain limitations,such as slow convergence and sensitivity to initial solutions.In order to tackle these challenges,the present study incorporates a range of optimization compo-nents into the Bat algorithm,thereby proposing a variant called PKEBA.A projection screening strategy is implemented to mitigate its sensitivity to initial solutions,thereby enhancing the quality of the initial solution set.A kinetic adaptation strategy reforms exploration patterns,while an elite communication strategy enhances group interaction,to avoid algorithm from local optima.Subsequently,the effectiveness of the proposed PKEBA is rigorously evaluated.Testing encompasses 30 benchmark functions from IEEE CEC2014,featuring ablation experiments and comparative assessments against classical algorithms and their variants.Moreover,real-world engineering problems are employed as further validation.The results conclusively demonstrate that PKEBA ex-hibits superior convergence and precision compared to existing algorithms. 展开更多
关键词 Bat algorithm engineering optimization global optimization metaheuristic algorithms
在线阅读 下载PDF
Enhancing Military Visual Communication in Harsh Environments Using Computer Vision Techniques
12
作者 Shitharth Selvarajan Hariprasath Manoharan +2 位作者 Taher Al-Shehari Nasser A Alsadhan Subhav Singh 《Computers, Materials & Continua》 2025年第8期3541-3557,共17页
This research investigates the application of digital images in military contexts by utilizing analytical equations to augment human visual capabilities.A comparable filter is used to improve the visual quality of the... This research investigates the application of digital images in military contexts by utilizing analytical equations to augment human visual capabilities.A comparable filter is used to improve the visual quality of the photographs by reducing truncations in the existing images.Furthermore,the collected images undergo processing using histogram gradients and a flexible threshold value that may be adjusted in specific situations.Thus,it is possible to reduce the occurrence of overlapping circumstances in collective picture characteristics by substituting grey-scale photos with colorized factors.The proposed method offers additional robust feature representations by imposing a limiting factor to reduce overall scattering values.This is achieved by visualizing a graphical function.Moreover,to derive valuable insights from a series of photos,both the separation and in-version processes are conducted.This involves analyzing comparison results across four different scenarios.The results of the comparative analysis show that the proposed method effectively reduces the difficulties associated with time and space to 1 s and 3%,respectively.In contrast,the existing strategy exhibits higher complexities of 3 s and 9.1%,respectively. 展开更多
关键词 Image enhancement visual information harsh environment computer vision
在线阅读 下载PDF
Complex adaptive systems science in the era of global sustainability crisis
13
作者 Li An B.L.Turner II +4 位作者 Jianguo Liu Volker Grimm Qi Zhang Zhangyang Wang Ruihong Huang 《Geography and Sustainability》 2025年第1期14-24,共11页
A significant number and range of challenges besetting sustainability can be traced to the actions and inter actions of multiple autonomous agents(people mostly)and the entities they create(e.g.,institutions,policies,... A significant number and range of challenges besetting sustainability can be traced to the actions and inter actions of multiple autonomous agents(people mostly)and the entities they create(e.g.,institutions,policies,social network)in the corresponding social-environmental systems(SES).To address these challenges,we need to understand decisions made and actions taken by agents,the outcomes of their actions,including the feedbacks on the corresponding agents and environment.The science of complex adaptive systems-complex adaptive sys tems(CAS)science-has a significant potential to handle such challenges.We address the advantages of CAS science for sustainability by identifying the key elements and challenges in sustainability science,the generic features of CAS,and the key advances and challenges in modeling CAS.Artificial intelligence and data science combined with agent-based modeling promise to improve understanding of agents’behaviors,detect SES struc tures,and formulate SES mechanisms. 展开更多
关键词 Social-environmental systems Complex adaptive systems Sustainability science Agent-based models Artificial intelligence Data science
在线阅读 下载PDF
多液柱调谐阻尼器对浮式风机基础运动的抑制效果
14
作者 陈淑玲 韩长志 +2 位作者 李国明 崔福音 YAN Shiqiang 《船舶工程》 北大核心 2026年第1期23-30,共8页
[目的]为研究半潜浮式风机平台俯仰运动对平台的疲劳载荷和气动性能的影响,并探讨多液柱调谐阻尼器(TLMCD)对平台运动的抑制效果,[方法]以OC4 DeepCWind半潜浮式平台为例,开展TLMCD对浮式风机平台运动的抑制作用研究。基于该平台的结构... [目的]为研究半潜浮式风机平台俯仰运动对平台的疲劳载荷和气动性能的影响,并探讨多液柱调谐阻尼器(TLMCD)对平台运动的抑制效果,[方法]以OC4 DeepCWind半潜浮式平台为例,开展TLMCD对浮式风机平台运动的抑制作用研究。基于该平台的结构和系泊特点设计3种不同规格的TLMCD,并利用聚焦波模型模拟真实海况中的波浪载荷,在保持原缆索系泊方式不变的情况下,分析TLMCD的调谐频率及其对平台运动响应的影响。[结果]结果表明:TLMCD对平台纵摇运动有显著的抑制效果,尤其是在平台固有频率、波浪谱峰频率和TLMCD调谐频率三者吻合条件下,调谐效率最佳。[结论]研究成果可为半潜浮式平台的运动控制设计和优化提供一定参考。 展开更多
关键词 多液柱调谐阻尼器(TLMCD) 运动抑制 浮式风机
原文传递
Bridging AI and Cyber Defense:A Stacked Ensemble Deep Learning Model with Explainable Insights
15
作者 Faisal Albalwy Muhannad Almohaimeed 《Computers, Materials & Continua》 2026年第5期559-578,共20页
Intrusion detection in Internet of Things(IoT)environments presents challenges due to heterogeneous devices,diverse attack vectors,and highly imbalanced datasets.Existing research on the ToN-IoT dataset has largely em... Intrusion detection in Internet of Things(IoT)environments presents challenges due to heterogeneous devices,diverse attack vectors,and highly imbalanced datasets.Existing research on the ToN-IoT dataset has largely emphasized binary classification and single-model pipelines,which often showstrong performance but limited generalizability,probabilistic reliability,and operational interpretability.This study proposes a stacked ensemble deep learning framework that integrates random forest,extreme gradient boosting,and a deep neural network as base learners,with CatBoost as the meta-learner.On the ToN-IoT Linux process dataset,the model achieved near-perfect discrimination(macro area under the curve=0.998),robust calibration,and superior F1-scores compared with standalone classifiers.Interpretability was achieved through SHapley Additive exPlanations–based feature attribution,which highlights actionable drivers ofmalicious behavior,such as command-line patterns,process scheduling anomalies,and CPU usage spikes,and aligns these indicators with MITRE ATT&CK tactics and techniques.Complementary analyses,including cumulative lift and sensitivity-specificity trade-offs,revealed the framework’s suitability for deployment in security operations centers,where calibrated risk scores,transparent explanations,and resource-aware triage are essential.These contributions bridge methodological rigor in artificial intelligence/machine learning with operational priorities in cybersecurity,delivering a scalable and explainable intrusion detection system suitable for real-world deployment in IoT environments. 展开更多
关键词 CYBERSECURITY IoT intrusion detection stacked ensemble learning deep learning explainable AI(XAI) probability calibration SHAP interpretability ToN-IoT dataset MITRE ATT&CK
在线阅读 下载PDF
On the Use of the Nelder-Mead Simplex Method in Control Design and Systems Theory
16
作者 Laura Menini Corrado Possieri Antonio Tornambe 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期186-204,共19页
The Nelder-Mead simplex method is a well-known algorithm enabling the minimization of functions that are not available in closed-form and that need not be differentiable or convex.Furthermore,it is particularly parsim... The Nelder-Mead simplex method is a well-known algorithm enabling the minimization of functions that are not available in closed-form and that need not be differentiable or convex.Furthermore,it is particularly parsimonious on the number of function evaluations,thus making it preferable to convex optimization paradigms in the case,common when dealing with control design problems,that the objective function of the optimization problem is non-differentiable,non-convex,and its closed-form is not available or difficult to be computed analytically.The main goal of this paper is to show how the joint use of the Nelder-Mead simplex method and the Morrison algorithm can be successfully used to solve relevant and challenging control problems that cannot be easily solved using analytic methods.In particular,it is shown how the problems of strong stabilization,static output feedback stabilization,and design of robust controllers having fixed structure can be framed as optimization problems,which,in turn,can be efficiently solved by coupling the two above mentioned algorithms.The performance of this procedure is compared with state-of-the-art techniques on dozens of static output feedback benchmark case studies,and its effectiveness is demonstrated by several examples. 展开更多
关键词 Optimization method robust controller static output feedback strong stabilizability
在线阅读 下载PDF
A comprehensive analysis of artificial intelligence,machine learning,deep learning and computer vision in food science
17
作者 Premkumar Borugadda Hemantha Kumar Kalluri 《Journal of Future Foods》 2026年第6期975-991,共17页
Providing safe and quality food is crucial for every household and is of extreme significance in the growth of any society.It is a complex procedure that deals with all issues focusing on the development of food proce... Providing safe and quality food is crucial for every household and is of extreme significance in the growth of any society.It is a complex procedure that deals with all issues focusing on the development of food processing from seed to harvest,storage,preparation,and consumption.This current paper seeks to demystify the importance of artificial intelligence,machine learning(ML),deep learning(DL),and computer vision(CV)in ensuring food safety and quality.By stressing the importance of these technologies,the audience will feel reassured and confident in their potential.These are very handy for such problems,giving assurance over food safety.CV is incredibly noble in today's generation because it improves food processing quality and positively impacts firms and researchers.Thus,at the present production stage,rich in image processing and computer visioning is incorporated into all facets of food production.In this field,DL and ML are implemented to identify the type of food in addition to quality.Concerning data and result-oriented perceptions,one has found similarities regarding various approaches.As a result,the findings of this study will be helpful for scholars looking for a proper approach to identify the quality of food offered.It helps to indicate which food products have been discussed by other scholars and lets the reader know papers by other scholars inclined to research further.Also,DL is accurately integrated with identifying the quality and safety of foods in the market.This paper describes the current practices and concerns of ML,DL,and probable trends for its future development. 展开更多
关键词 Artificial intelligence Computer vision Deep learning Food quality Food recognition Machine learning
在线阅读 下载PDF
A brief review on comparative analysis of IoT-based healthcare system for breast cancer prediction
18
作者 Krishna Murari Rajiv Ranjan Suman 《Medical Data Mining》 2026年第1期46-58,共13页
The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare I... The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts. 展开更多
关键词 IOT healthcare system machine learning breast cancer prediction medical data mining security challenges
在线阅读 下载PDF
DRAGON-MINE:Deep Reinforcement Adaptive Gradient Optimization Network for Mining Rare Events in Healthcare
19
作者 Mohammed Abdullah Alsuwaiket 《Computer Modeling in Engineering & Sciences》 2026年第3期967-996,共30页
The healthcare field is fraught with challenges associated with severe class imbalance,wherein such critical conditions like sepsis,cardiac arrest,and drug adverse reactions are rare but have dire clinical consequence... The healthcare field is fraught with challenges associated with severe class imbalance,wherein such critical conditions like sepsis,cardiac arrest,and drug adverse reactions are rare but have dire clinical consequences.This paper presents a new framework,Deep Reinforcement Adaptive Gradient Optimization Network to Mining Rare Events(DRAGON-MINE),to demonstrate how deep reinforcement learning can be used synergistically with adaptive gradient optimization and address the inherent weaknesses of current methods in the prediction of rare health events.The suggested architecture uses a dual-pathway consisting of a reinforcement learning agent to dynamically reweigh samples and an adaptive gradient optimizer to follow novel learning rates.With extensive experiments on the MIMIC-IV and eICU-CRD datasets,DRAGON-MINE consistently outperforms recent state-of-the-art methods for sepsis,cardiac arrest,and adverse drug reaction prediction,achieving AUROC values of 92.3%and 91.6%for sepsis prediction on MIMIC-IV and eICU-CRD,respectively,while consistently outperforming Transformer-,CNN-RNN-,and Fed-Ensemble-based methods across all evaluated tasks and datasets,with particularly strong gains observed in precision-recall performance under severe class imbalance.With its high sensitivity(88.4%)and specificity(90.2%),DRAGON-MINE enables reliable early warning of rare clinical events in critical care settings while minimizing false alarms,supporting safer clinical decision support systems,and demonstrating strong potential for scalable deployment across multi-institutional intensive care environments through federated learning. 展开更多
关键词 Deep reinforcement learning rare event prediction class imbalance healthcare AI adaptive gradient optimization sepsis detection federated learning
在线阅读 下载PDF
Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT
20
作者 He Duan Shi Zhang Dayu Li 《Computers, Materials & Continua》 2026年第2期872-896,共25页
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass... Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost. 展开更多
关键词 Cloud computing Internet of Things ABSE multi-keyword fuzzy matching outsourcing decryption
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部