期刊文献+
共找到11,977篇文章
< 1 2 250 >
每页显示 20 50 100
Exploration of the Application of Information Technology in Mathematics Curriculum
1
作者 Qing Zhang 《Journal of Contemporary Educational Research》 2025年第11期221-226,共6页
Mathematics is a basic course for cultivating advanced technical talents,a core course for students in the basic education stage,mathematical knowledge content is the foundation of professional courses,mathematical th... Mathematics is a basic course for cultivating advanced technical talents,a core course for students in the basic education stage,mathematical knowledge content is the foundation of professional courses,mathematical thinking ability is one of the abilities for students’sustainable development,mathematical literacy is a basic quality that students should possess,and it carries the function of implementing the fundamental task of fostering virtue and nurturing talent and developing quality-oriented education.It has the characteristics of being fundamental,developmental,applied,and vocational.In today’s era of rapid development of artificial intelligence and big data,mathematics plays a huge role in production and life.This paper briefly expounds and analyzes the current situation of mathematics teaching,explores the significance of information-based teaching for mathematics teaching,and on this basis,proposes relevant strategies for information-based mathematics teaching,including knowledge visualization,the use of information technology to create mathematics teaching scenarios,the realization of efficient mathematics teaching through micro-lessons,and the realization of teaching interaction through network platforms. 展开更多
关键词 Information-based teaching Mathematics teaching Teaching effectiveness
在线阅读 下载PDF
The Value of Modern Information Technology in Nursing Emergencies
2
作者 Xushan Zhou Ying Li +2 位作者 Henglong Xu Chenyan Li Hongling Sun 《Health》 2024年第9期849-855,共7页
In first aid, traditional information interchange has numerous shortcomings. For example, delayed information and disorganized departmental communication cause patients to miss out on critical rescue time. Information... In first aid, traditional information interchange has numerous shortcomings. For example, delayed information and disorganized departmental communication cause patients to miss out on critical rescue time. Information technology is becoming more and more mature, and as a result, its use across numerous industries is now standard. China is still in the early stages of developing its integration of emergency medical services with modern information technology;despite our progress, there are still numerous obstacles and constraints to overcome. Our goal is to integrate information technology into every aspect of emergency patient care, offering robust assistance for both patient rescue and the efforts of medical personnel. Information may be communicated in a fast, multiple, and effective manner by utilizing modern information technology. This study aims to examine the current state of this field’s development, current issues, and the field’s future course of development. 展开更多
关键词 Modern Information Technology Nursing First Aid Critical Care
暂未订购
Labor Education in Primary and Secondary Schools in the New Era Based on Modern Information Technology 被引量:1
3
作者 Liansen Wen 《Journal of Contemporary Educational Research》 2021年第11期89-94,共6页
With the rapid development of information technology represented by artificial intelligence(AI),there has been a great impact on educational methods,educational behaviors,and educational models.It can even be said tha... With the rapid development of information technology represented by artificial intelligence(AI),there has been a great impact on educational methods,educational behaviors,and educational models.It can even be said that there is a fundamental change.Especially under the influence of the pandemic,educational behaviors have undergone radical changes.The education management information system in primary and secondary schools strengthens the service of labor education for primary and secondary school students,with a data analysis system for labor education.A survey on labor education in 103 primary and secondary schools in the region has been carried out.Information technology can well improve the form of labor education in primary and secondary schools and promote the development of labor education.Big data can be used to objectively analyze the problems of labor education in primary and secondary schools,thus proposing a new era of labor education data analysis system and management for primary and secondary schools. 展开更多
关键词 New era Primary and secondary schools Labor education PROBLEMS COUNTERMEASURES
暂未订购
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
4
作者 Robert Brumnik Sergii Kavun 《Computer Technology and Application》 2015年第1期45-56,共12页
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in... Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony. 展开更多
关键词 Intelligence and counterintelligence activities electronic spy devices detection methods netwar counterterrorism.
在线阅读 下载PDF
The Impact of Information Technology on Investment Decision-Making:Problems and Prospects
5
作者 Gulnur MUSSAGULOVA Nurlan KULMURZAYEV +2 位作者 Bayanali DOSZHANOV Sarsenkul TILEUBAY Gulshat BAKALBAYEVA 《Journal of Systems Science and Information》 2025年第3期345-362,共18页
The purpose of the study is to develop an approach to optimising the investment decision-making process using the dynamic programming method and its further integration into the enterprise information system using new... The purpose of the study is to develop an approach to optimising the investment decision-making process using the dynamic programming method and its further integration into the enterprise information system using new technologies.The following methods were used in the study:System-structural analysis,dynamic programming method,graphical,and tabular methods.As a result of the conducted study,the role of information in the investment process was determined.An approach to the formation of the structure of an enterprise information system designed to optimise the investment decision-making process was proposed.The components of the structural elements of this system are considered—information collection,processing,and interpretation.A roadmap for information support for the development and implementation of an investment project is proposed,the blocks of which correspond to a certain direction of information processing,depending on the stage of implementation of the investment project—preparation,implementation,and final stage.The existing solutions are considered,and ready-made software products designed to optimise the investment process are characterised,primarily from the standpoint of risk assessment.An approach to optimising the investment decision-making process based on the dynamic programming method is proposed.An example of using this method to select one of the proposed alternatives according to the profit maximisation criterion is given.The results of the analysis can be used by the management board of enterprises to optimise the investment decision-making process. 展开更多
关键词 digitalisation INNOVATION dynamic programming method management process INVESTMENTS EFFICIENCY
原文传递
Ecological Risk Assessment of Shan Xin Mining Area Based on Remote Sensing and Geography Information System Technology 被引量:3
6
作者 Chaokui Li Jianhui Chen +2 位作者 Mengguang Liao Guo Chen Qinlan Zhou 《Journal of Geographic Information System》 2018年第2期234-246,共13页
In this paper, introducing new remote sensing and geographic information technology to solve the problem of data collection and analysis, this makes the study of ecological risk assessment very quick and accurate. Tak... In this paper, introducing new remote sensing and geographic information technology to solve the problem of data collection and analysis, this makes the study of ecological risk assessment very quick and accurate. Taking the Shan Xin mining area of the tin mine in Lengshuijiang of Hunan Province as the research object, using the remote sensing image data of three periods in 2005, 2010 and 2015, the remote sensing image is classified carefully and the landscape classification map of the mining area is obtained. The ecological risk index is introduced and the ecological risk values are sampled and interpolated on the ArcGIS platform. The ecological risk spatial distribution map based on the landscape pattern index was obtained. The ecological risk was divided into 5 levels by using the Jenks natural classification method, and each ecological risk grade area was counted. The research results show that: from year 2005 to year 2010, landscape ecological risk trend of the mining area is growing up;the trend rising area of landscape ecological risk is mainly in the southwest and northeast of the Shan Xin mining field;the area of higher and high ecological risk is increasing year by year;and the trend of dispersed development in space is obvious;the development trend of ecological risk in the mining area is rapidly increasing;in 2010 - 2015, the higher and high ecological risk area decrease slightly with the increasing of area of grassland and residential low vulnerability of landscape types;the ecological risk area showed a slow decreasing trend. The research results provide an objective reference for decision making of ecological environment governance. 展开更多
关键词 RS & GIS TECHNOLOGY Shan Xin MINING Field ECOLOGICAL RISK Assessment Jenks NATURE Classification RISK INDEX
暂未订购
Tactical planning:improving performance for information technology (IT) groups creating digital projects
7
作者 Melanie D.MYERS 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第11期927-930,共4页
Good planning and communication are crucial to the digitization process.The originators of project proposals and donors who finance the work are often not technically sophisticated.They may have vastly different expec... Good planning and communication are crucial to the digitization process.The originators of project proposals and donors who finance the work are often not technically sophisticated.They may have vastly different expectations of the complexity of the work, 展开更多
关键词 信息技术 项目组 成绩 IT 规划 战术 数字化进程 项目建议书
原文传递
School Level Information System (IS) Discontinuance Intention: A Case Study on Information System (IS) Discontinuance of Surigao State College of Technology SSCT
8
作者 Vrian Jay Ylaya 《Intelligent Information Management》 2020年第4期121-130,共10页
Educational institutions implement school information system (IS) solutions for efficient academic processes and improve the student experience, and thus tend to upgrade to new school IS, ceasing the use of old school... Educational institutions implement school information system (IS) solutions for efficient academic processes and improve the student experience, and thus tend to upgrade to new school IS, ceasing the use of old school IS. Extant studies of information system discontinuance are in organizational in general. This study is solely a school organization setting, specifically a thorough understanding of contributing factors that facilitate the intention of school information system (IS) discontinuance. Organizational level IS discontinuance intention OLIDI model was used as a lens and anchored by grounded theory. Semi-Structured interviews were used to collect data from school administrators and users of information system (IS) of Surigao State College of Technology. A qualitative statistics approach and coding of words are used to analyze the intention of IS discontinuance and provide model for school setting IS discontinuance. The findings show that system shortcomings, organizational initiative, environmental change, system investment, and institutional pressures were the critical determinants of increased intentions to replace the existing school information system (IS). The study findings are useful to school administrators to identify long term flexibility required for policies to overcome the capability of shortcomings that emerge over the system life span and underline risk associated with continued use of unsupported systems. 展开更多
关键词 Organizational Level Information System Discontinuance Intention OLIDI Information System (IS) Information System (IS) Discontinuance
在线阅读 下载PDF
Research on Information Security Technology of Online Insurance System Based on WEB
9
作者 Qingfeng Zhang 《Journal of Electronic Research and Application》 2018年第4期5-9,共5页
With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a... With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a system,it is necessary to manage the safe operation structure,thus effectively establishing complete supervision and maintenance.The system ensures that the management level of insured information security technology can be optimized.This paper briefly analyzes the framework of the WEB-based online insurance system and discusses the security mode and system implementation. 展开更多
关键词 WEB ONLINE INSURANCE SYSTEM FRAMEWORK SECURITY SYSTEM implementation
在线阅读 下载PDF
Three-dimension collision-free trajectory planning of UAVs based on ADS-B information in low-altitude urban airspace 被引量:2
10
作者 Chao DONG Yifan ZHANG +3 位作者 Ziye JIA Yiyang LIAO Lei ZHANG Qihui WU 《Chinese Journal of Aeronautics》 2025年第2期274-285,共12页
The environment of low-altitude urban airspace is complex and variable due to numerous obstacles,non-cooperative aircraft,and birds.Unmanned Aerial Vehicles(UAVs)leveraging environmental information to achieve three-d... The environment of low-altitude urban airspace is complex and variable due to numerous obstacles,non-cooperative aircraft,and birds.Unmanned Aerial Vehicles(UAVs)leveraging environmental information to achieve three-dimension collision-free trajectory planning is the prerequisite to ensure airspace security.However,the timely information of surrounding situation is difficult to acquire by UAVs,which further brings security risks.As a mature technology leveraged in traditional civil aviation,the Automatic Dependent Surveillance-Broadcast(ADS-B)realizes continuous surveillance of the information of aircraft.Consequently,we leverage ADS-B for surveillance and information broadcasting,and divide the aerial airspace into multiple sub-airspaces to improve flight safety in UAV trajectory planning.In detail,we propose the secure Sub-airSpaces Planning(SSP)algorithm and Particle Swarm Optimization Rapidly-exploring Random Trees(PSO-RRT)algorithm for the UAV trajectory planning in law-altitude airspace.The performance of the proposed algorithm is verified by simulations and the results show that SSP reduces both the maximum number of UAVs in the sub-airspace and the length of the trajectory,and PSO-RRT reduces the cost of UAV trajectory in the sub-airspace. 展开更多
关键词 Three-dimension trajectory planning of UAV Collision avoidance Sliding window ADS-B Low-altitude urban airspace
原文传递
Research on the Practical Strategy of 5G Mobile Communication Technology in Power Communication
11
作者 Wanshen Peng 《Journal of Electronic Research and Application》 2025年第3期119-124,共6页
With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communic... With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system. 展开更多
关键词 5G mobile communication technology Electric power communication Network slicing Edge computing Multi-technology collaboration
在线阅读 下载PDF
Research Progress in Marine Environmental Monitoring Technology
12
作者 Botao Xie Bigui Huang +1 位作者 Jiwen Song Feida Zhao 《Journal of Environmental & Earth Sciences》 2025年第8期376-407,共32页
Marine environmental monitoring and data platform technology plays a pivotal role in advancing marine scientific research,sustainable resource development,ecological conservation,and the effective utilization of ocean... Marine environmental monitoring and data platform technology plays a pivotal role in advancing marine scientific research,sustainable resource development,ecological conservation,and the effective utilization of ocean resources.Despite its growing importance in addressing global environmental and economic challenges,a comprehensive and systematic review of recent advancements in this field remains lacking.To address this gap,this paper synthesizes and analyzes academic literature published between 2021 and 2025,sourced from reputable databases including Scopus and Web of Science,while adhering to the PRISMA systematic review standards.It delineates core technologies employed in marine environmental monitoring,such as advanced sensor systems,robust data acquisition and transmission methods,and innovative data processing and analysis techniques.Furthermore,the study examines the architectural functionalities,data sharing mechanisms,and interoperability standards that underpin modern marine data platforms.The paper also addresses critical technical challenges encountered in deep-water monitoring operations,including equipment durability under extreme conditions,significant economic constraints,data management complexities,and emerging privacy and security concerns.Finally,future development trajectories are outlined,emphasizing the transformative potential of novel materials and artificial intelligence(AI)in enhancing deep-water monitoring capabilities,alongside the urgent need for strengthened global collaboration to improve data sharing protocols and management frameworks.Collectively,the continuous evolution of marine monitoring technologies promises to provide increasingly intelligent,integrated,and systematic support for global marine protection efforts and sustainable resource stewardship. 展开更多
关键词 Marine Environmental Marine Monitoring Sensor Technology Underwater Platforms Ocean Data Underwater Communication
在线阅读 下载PDF
Underwater Acoustic Communication:Technology Advances for Practical Marine Applications
13
作者 Botao Xie Bigui Huang +2 位作者 Tao Liu Jiwen Song Feida Zhao 《Sustainable Marine Structures》 2025年第4期56-83,共28页
Key areas such as marine resource exploration,real-time monitoring of ecological environments,and national defense security systems urgently require reliable underwater information transmission capabilities as a found... Key areas such as marine resource exploration,real-time monitoring of ecological environments,and national defense security systems urgently require reliable underwater information transmission capabilities as a foundation.Underwater acoustic communication(UAC),leveraging its unique advantages as the most effective method for long-range data transfer in aquatic environments,has become an indispensable enabling technology for supporting these core applications.This review systematically examines recent advancements in UAC technology and their critical role in enabling modern marine initiatives.The analysis covers key developments in both non-coherent and coherent communication systems,including single-carrier and multi-carrier modulation schemes such as OFDM.It highlights their respective advantages in terms of robustness and high-data-rate transmission.The significant impact of challenging underwater channel characteristics,notably severe multipath fading,time-varying Doppler shifts,limited bandwidth,and environmental noise,is discussed alongside corresponding mitigation strategies.Furthermore,the integration of machine learning for sophisticated channel estimation,adaptive equalization,and intelligent system optimization is explored as a promising frontier.Emerging technologies like spread-spectrum,full-duplex,and covert UAC are also evaluated for their potential in specialized and high-stakes applications.The paper concludes by identifying persistent challenges,including regulatory constraints,physical-layer security issues,interoperability across platforms,and energy efficiency demands.Finally,it outlines future research directions aimed at developing more intelligent,secure,and efficient next-generation underwater networks. 展开更多
关键词 Underwater Acoustic Communication Marine Applications Channel Characteristics Coherent Communication Multi-carrier Modulation
在线阅读 下载PDF
Exploring the Application of Blockchain and IoT Technology in Commodity Management
14
作者 Zhangjun Jiang Xiaojian Zhu 《Journal of Electronic Research and Application》 2025年第2期133-139,共7页
This study provides a detailed analysis of the application of blockchain and Internet of Things(IoT)technologies in various aspects of commodity management,addressing issues such as information asymmetry,data security... This study provides a detailed analysis of the application of blockchain and Internet of Things(IoT)technologies in various aspects of commodity management,addressing issues such as information asymmetry,data security and privacy challenges,insufficient supply chain transparency,and difficulties in regulation.The study also explores the challenges and strategies associated with the implementation of these technologies.Through this analysis,the article aims to provide theoretical support and practical reference for improving the efficiency and quality of commodity management,thereby promoting the digital transformation of commodity management. 展开更多
关键词 Blockchain Internet of Things(IoT) Commodity management PRICING Supply chain
在线阅读 下载PDF
Geological Hazard Susceptibility Assessment in Shouning County Based on Information Quantity Method
15
作者 ZHANG Min CHEN Jiai +2 位作者 CHEN Zhefeng ZHENG Zhe XUE Chengzhi 《Journal of Geodesy and Geoinformation Science》 2025年第3期70-91,共22页
This study develops a geological hazard evaluation index system for Shouning County,a key area for disaster prevention in Fujian Province.Through detailed investigation reports and field surveys,six factors were selec... This study develops a geological hazard evaluation index system for Shouning County,a key area for disaster prevention in Fujian Province.Through detailed investigation reports and field surveys,six factors were selected,including elevation,slope gradient,slope aspect,stratigraphic lithological group,distance from the water systems,and geological structures.A geological hazard susceptibility zoning map was created using the Information Quantity Method(IQM).The evaluation showed that elevation,slope aspect,and distance from the water systems are primary risk factors,with high and extremely high susceptibility areas covering 168.57 km^(2)(52.63%of the study area)and a disaster point density of 3.07 points/km^(2).The model achieved an accuracy of 0.73,validating its effectiveness in hazard assessment.These findings provide a valuable reference for disaster prediction and mitigation in Shouning County,supporting improved planning and risk management efforts. 展开更多
关键词 Shouning County geological hazards information quantity method susceptibility evaluation
在线阅读 下载PDF
Unsupervised Meteorological Downscaling Based on Dual Learning and Subgrid-scale Auxiliary Information
16
作者 Jing HU Jialing MU +1 位作者 Xiaomeng HUANG Xi WU 《Advances in Atmospheric Sciences》 2025年第1期53-66,共14页
Climate downscaling is used to transform large-scale meteorological data into small-scale data with enhanced detail,which finds wide applications in climate modeling,numerical weather forecasting,and renewable energy.... Climate downscaling is used to transform large-scale meteorological data into small-scale data with enhanced detail,which finds wide applications in climate modeling,numerical weather forecasting,and renewable energy.Although deeplearning-based downscaling methods effectively capture the complex nonlinear mapping between meteorological data of varying scales,the supervised deep-learning-based downscaling methods suffer from insufficient high-resolution data in practice,and unsupervised methods struggle with accurately inferring small-scale specifics from limited large-scale inputs due to small-scale uncertainty.This article presents DualDS,a dual-learning framework utilizing a Generative Adversarial Network–based neural network and subgrid-scale auxiliary information for climate downscaling.Such a learning method is unified in a two-stream framework through up-and downsamplers,where the downsampler is used to simulate the information loss process during the upscaling,and the upsampler is used to reconstruct lost details and correct errors incurred during the upscaling.This dual learning strategy can eliminate the dependence on high-resolution ground truth data in the training process and refine the downscaling results by constraining the mapping process.Experimental findings demonstrate that DualDS is comparable to several state-of-the-art deep learning downscaling approaches,both qualitatively and quantitatively.Specifically,for a single surface-temperature data downscaling task,our method is comparable with other unsupervised algorithms with the same dataset,and we can achieve a 0.469 dB higher peak signal-to-noise ratio,0.017 higher structural similarity,0.08 lower RMSE,and the best correlation coefficient.In summary,this paper presents a novel approach to addressing small-scale uncertainty issues in unsupervised downscaling processes. 展开更多
关键词 DOWNSCALING UNSUPERVISED deep learning dual learning auxiliary information
在线阅读 下载PDF
Detecting Plastic Pollution in Aquatic Environment Using Remote Sensing Technology:Cost-Saving Method in Pollution and Risk Management for Developing Countries
17
作者 Innocent Mugudamani Saheed Adeyinka Oke Hassan Ikrema 《Journal of Environmental & Earth Sciences》 2025年第6期395-413,共19页
One of the crucial elements that is directly tied to the quality of living organisms is the quality of the water.How-ever,water quality has been adversely affected by plastic pollution,a global environmental disaster ... One of the crucial elements that is directly tied to the quality of living organisms is the quality of the water.How-ever,water quality has been adversely affected by plastic pollution,a global environmental disaster that has an effect on aquatic life,wildlife,and human health.To prevent these effects,better monitoring,detection,characterisation,quanti-fication,and tracking of aquatic plastic pollution at regional and global scales is urgently needed.Remote sensing tech-nology is regarded as a useful technique,as it offers a promising new and less labour-intensive tool for the detection,quantification,and characterisation of aquatic plastic pollution.The study seeks to supplement to the body of scientific literature by compiling original data on the monitoring of plastic pollution in aquatic environments using remote sensing technology,which can function as a cost saving method for water pollution and risk management in developing nations.This article provides a profound analysis of plastic pollution,including its categories,sources,distribution,chemical properties,and potential risks.It also provides an in-depth review of remote sensing technologies,satellite-derived in-dices,and research trends related to their applicability.Additionally,the study clarifies the difficulties in using remote sensing technologies for aquatic plastic monitoring and practical ways to reduce aquatic plastic pollution.The study will improve the understanding of aquatic plastic pollution,health hazards,and the suitability of remote sensing technology for aquatic plastic contamination monitoring studies among researchers and interested parties. 展开更多
关键词 Remote Sensing Plastic Pollution Water Sources Micro-and Macro-Plastics Aquatic Environment Risk Management
在线阅读 下载PDF
TIPS:Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model
18
作者 Yue Liu Qinglang Guo +1 位作者 Chunyao Yang Yong Liao 《Computers, Materials & Continua》 2025年第5期2555-2572,共18页
Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information extraction.This data contains extensive entity information—such as people,locations,and ... Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information extraction.This data contains extensive entity information—such as people,locations,and events—while also involving reasoning tasks like personnel classification,relationship judgment,and implicit inference.Moreover,utilizing models for extracting information from police incident data poses a significant challenge—data scarcity,which limits the effectiveness of traditional rule-based and machine-learning methods.To address these,we propose TIPS.In collaboration with public security experts,we used de-identified police incident data to create templates that enable large language models(LLMs)to populate data slots and generate simulated data,enhancing data density and diversity.We then designed schemas to efficiently manage complex extraction and reasoning tasks,constructing a high-quality dataset and fine-tuning multiple open-source LLMs.Experiments showed that the fine-tuned ChatGLM-4-9B model achieved an F1 score of 87.14%,nearly 30%higher than the base model,significantly reducing error rates.Manual corrections further improved performance by 9.39%.This study demonstrates that combining largescale pre-trained models with limited high-quality domain-specific data can greatly enhance information extraction in low-resource environments,offering a new approach for intelligent public security applications. 展开更多
关键词 Public security information extraction large language model prompt engineering
在线阅读 下载PDF
Adaptive regulation-based Mutual Information Camouflage Poisoning Attack in Graph Neural Networks
19
作者 Jihui Yin Taorui Yang +3 位作者 Yifei Sun Jianzhi Gao Jiangbo Lu Zhi-Hui Zhan 《Journal of Automation and Intelligence》 2025年第1期21-28,共8页
Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks ... Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks to generate a set of fake nodes,injecting them into a clean GNNs to poison the graph structure and evaluate the robustness of GNNs.In the attack process,the computation of new node connections and the attack loss are independent,which affects the attack on the GNN.To improve this,a Fake Node Camouflage Attack based on Mutual Information(FNCAMI)algorithm is proposed.By incorporating Mutual Information(MI)loss,the distribution of nodes injected into the GNNs become more similar to the original nodes,achieving better attack results.Since the loss ratios of GNNs and MI affect performance,we also design an adaptive weighting method.By adjusting the loss weights in real-time through rate changes,larger loss values are obtained,eliminating local optima.The feasibility,effectiveness,and stealthiness of this algorithm are validated on four real datasets.Additionally,we use both global and targeted attacks to test the algorithm’s performance.Comparisons with baseline attack algorithms and ablation experiments demonstrate the efficiency of the FNCAMI algorithm. 展开更多
关键词 Mutual information Adaptive weighting Poisoning attack Graph neural networks
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部