期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Securing the Future after Pager Bombs:Lifecycle Protection of Smart Devices via Blockchain Intelligence 被引量:1
1
作者 Fei Lin Qinghua Ni +7 位作者 Jing Yang Juanjuan Li Nan Zheng Levente Kovács Radu Prodan Mariagrazia Dotoli Qing-Long Han Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 CSCD 2024年第12期2355-2358,共4页
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabi... THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabilities in global supply chains from raw material manufacturing and distribution to the usage of devices and equipment,signaling the onset of a new wave of"supply chain warfare"[2]. 展开更多
关键词 Smart cycle CHAINS
在线阅读 下载PDF
An Enhanced Fuzzy Routing Protocol for Energy Optimization in the Underwater Wireless Sensor Networks
2
作者 Mehran Tarif Mohammadhossein Homaei Amir Mosavi 《Computers, Materials & Continua》 2025年第5期1791-1820,共30页
Underwater Wireless Sensor Networks(UWSNs)are gaining popularity because of their potential uses in oceanography,seismic activity monitoring,environmental preservation,and underwater mapping.Yet,these networks are fac... Underwater Wireless Sensor Networks(UWSNs)are gaining popularity because of their potential uses in oceanography,seismic activity monitoring,environmental preservation,and underwater mapping.Yet,these networks are faced with challenges such as self-interference,long propagation delays,limited bandwidth,and changing network topologies.These challenges are coped with by designing advanced routing protocols.In this work,we present Under Water Fuzzy-Routing Protocol for Low power and Lossy networks(UWF-RPL),an enhanced fuzzy-based protocol that improves decision-making during path selection and traffic distribution over different network nodes.Our method extends RPL with the aid of fuzzy logic to optimize depth,energy,Received Signal Strength Indicator(RSSI)to Expected Transmission Count(ETX)ratio,and latency.Theproposed protocol outperforms other techniques in that it offersmore energy efficiency,better packet delivery,lowdelay,and no queue overflow.It also exhibits better scalability and reliability in dynamic underwater networks,which is of very high importance in maintaining the network operations efficiency and the lifetime of UWSNs optimized.Compared to other recent methods,it offers improved network convergence time(10%–23%),energy efficiency(15%),packet delivery(17%),and delay(24%). 展开更多
关键词 Underwater sensor networks(UWSNs) ROUTING energy fuzzy logic MULTIPATH load balancing
在线阅读 下载PDF
Physics-Informed Neural Networks for Multiaxial Fatigue Life Prediction of Aluminum Alloy
3
作者 Ehsan Akbari Tajbakhsh Navid Chakherlou +1 位作者 Hamed Tabrizchi Amir Mosavi 《Computer Modeling in Engineering & Sciences》 2025年第10期305-325,共21页
The ability to predict multiaxial fatigue life of Al-Alloy 7075-T6 under complex loading conditions is critical to assessing its durability under complex loading conditions,particularly in aerospace,automotive,and str... The ability to predict multiaxial fatigue life of Al-Alloy 7075-T6 under complex loading conditions is critical to assessing its durability under complex loading conditions,particularly in aerospace,automotive,and structural applications.This paper presents a physical-informed neural network(PINN)model to predict the fatigue life of Al-Alloy 7075-T6 over a variety of multiaxial stresses.The model integrates the principles of the Geometric Multiaxial Fatigue Life(GMFL)approach,which is a novel fatigue life prediction approach to estimating fatigue life by combining multiple fatigue criteria.The proposed model aims to estimate fatigue damage accumulation by the GMFL method.The proposed GMFL-PINN combines this physics-based approach with data-driven neural networks.Experimental validation demonstrates that GMFL-PINN outperforms FS,Smith–Watson–Topper(SWT)and Li–Zhang(LZH)fatigue life prediction methods which provides a reliable and scalable solution for structural health assessment and fatigue analysis. 展开更多
关键词 Multiaxial fatigue criteria fatigue machine learning deep learning data science artificial intelligence big data aluminum alloy fatigue function critical plane analysis
在线阅读 下载PDF
Parallel Theaters in CPSS:From Shadows of ISDOS to Intelligence of Decision Theaters
4
作者 Qinghua Ni Buday Viktória +4 位作者 Fei Lin Jun Huang Levente Kovács Nan Zheng Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 2025年第6期1059-1062,共4页
As Artificial Intelligence(AI)is moving fast from Large Language Models(LLMs)to AI Agents and Agentic Intelligence,the need to incorporate new AI into Decision Intelligence(DI)is becoming more and more urgent for both... As Artificial Intelligence(AI)is moving fast from Large Language Models(LLMs)to AI Agents and Agentic Intelligence,the need to incorporate new AI into Decision Intelligence(DI)is becoming more and more urgent for both practical and theoretic reasons:both decision and process complexities would be significantly increased due to the use of advanced AI tools and agents,and both traditional and recent thinking must be rethought and reconstructed accordingly.Our perspective would like to address this important issue based on some historical milestone developments in Computer-Aided Software Engineering(CASE)and recent efforts in digital theatrical technology[1]. 展开更多
关键词 traditional recent thinking large language models llms agentic intelligencethe parallel theaters ai agents shadows isdos artificial intelligence ai decision intelligence di
在线阅读 下载PDF
A Fused Machine Learning Approach for Intrusion Detection System 被引量:3
5
作者 Muhammad Sajid Farooq Sagheer Abbas +3 位作者 Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2607-2623,共17页
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network... The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and discretion.Machine learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit activities.An intrusion detection system controls the flow of network traffic with the help of computer systems.Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic.For this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network intrusion.The Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious attacks.The proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection. 展开更多
关键词 Fused machine learning heterogeneous network intrusion detection
在线阅读 下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
6
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
在线阅读 下载PDF
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
7
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2641-2659,共19页
Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one... Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results. 展开更多
关键词 Intrusion prevention system SPAMMING KNN classification SPAM cyber security BOTNET
在线阅读 下载PDF
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
8
作者 Sagheer Abbas Syed Ali Raza +4 位作者 MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3263-3278,共16页
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ... File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems. 展开更多
关键词 Automated file labeling file organization machine learning topic modeling
在线阅读 下载PDF
Exploring Biocomplexity in Cancer: A Comprehensive Review
9
作者 Andras Szasz Gyula Peter Szigeti 《Open Journal of Biophysics》 2024年第2期154-238,共85页
Living objects have complex internal and external interactions. The complexity is regulated and controlled by homeostasis, which is the balance of multiple opposing influences. The environmental effects finally guide ... Living objects have complex internal and external interactions. The complexity is regulated and controlled by homeostasis, which is the balance of multiple opposing influences. The environmental effects finally guide the self-organized structure. The living systems are open, dynamic structures performing random, stationary, stochastic, self-organizing processes. The self-organizing procedure is defined by the spatial-temporal fractal structure, which is self-similar both in space and time. The system’s complexity appears in its energetics, which tries the most efficient use of the available energies;for that, it organizes various well-connected networks. The controller of environmental relations is the Darwinian selection on a long-time scale. The energetics optimize the healthy processes tuned to the highest efficacy and minimal loss (minimalization of the entropy production). The organism is built up by morphogenetic rules and develops various networks from the genetic level to the organism. The networks have intensive crosstalk and form a balance in the Nash equilibrium, which is the homeostatic state in healthy conditions. Homeostasis may be described as a Nash equilibrium, which ensures energy distribution in a “democratic” way regarding the functions of the parts in the complete system. Cancer radically changes the network system in the organism. Cancer is a network disease. Deviation from healthy networking appears at every level, from genetic (molecular) to cells, tissues, organs, and organisms. The strong proliferation of malignant tissue is the origin of most of the life-threatening processes. The weak side of cancer development is the change of complex information networking in the system, being vulnerable to immune attacks. Cancer cells are masters of adaptation and evade immune surveillance. This hiding process can be broken by electromagnetic nonionizing radiation, for which the malignant structure has no adaptation strategy. Our objective is to review the different sides of living complexity and use the knowledge to fight against cancer. 展开更多
关键词 Complexity Networks SMALL-WORLD Genetic Mutations SELF-ORGANIZING Self-Symmetry Energetic Balance Entropy Nash Equilibrium GAMES Evolution CANCER Therapy
暂未订购
Parallel Deep Foundation Model:A Co-Evolution Framework for Analogical Imagination and Embodied Cognition of Parallel Intelligence 被引量:1
10
作者 Yonglin Tian Fei Lin +3 位作者 Cong Wang Jingwei Ge Zhiyao Luo Fei-Yue Wang 《The International Journal of Intelligent Control and Systems》 2025年第1期83-90,共8页
The rise of foundation models has brought significant advances to artificial intelligence,especially in reasoning,commonsense understanding,and tool use.These capabilities,when integrated into agent systems,hold great... The rise of foundation models has brought significant advances to artificial intelligence,especially in reasoning,commonsense understanding,and tool use.These capabilities,when integrated into agent systems,hold great promise for real-world applications such as vision-language navigation(VLN)and vision-language action(VLA).However,deploying such models in practice presents ongoing challenges,particularly in adapting and optimizing them across diverse and changing environments.This letter proposes a parallel deep foundation model(PDFM)framework to support continuous model evolution in cloud-edge-device systems.The framework establishes a co-evolution process between two complementary capabilities:embodied cognition,which reflects the model’s grounded understanding and task adaptation in physical systems,and analogical imagination,which enables creative exploration and capacity expansion in virtual environments.Through three core processes,learning and training,experiment and evaluation,and management and control,the system supports iterative refinement and dynamic interaction between virtual and real spaces.This enables general-purpose models to gradually converge toward domain-specific intelligence,supporting longterm,adaptive deployment. 展开更多
关键词 parallel d artificial intelligenceespecially foundation models adapting optimizing them embodied cognition parallel deep foundation model agent systemshold co evolution
在线阅读 下载PDF
New AI for Diabetes Control and Management,Part I:A Survey and Perspective on LLM-Based Interpretation of Stress,Exercise,and Glucose Dynamics
11
作者 Adina Chotbaeva Mengmeng Zhang +5 位作者 MátéSiket Jing Wang Levente Kovács György Eigner Xuanting Ding Fei-Yue Wang 《The International Journal of Intelligent Control and Systems》 2025年第3期207-217,共11页
Large language models(LLMs)offer new opportunities in diabetes research by integrating contextual behavioral data with physiological biosignals,supporting more personalized care.This review surveys recent studies on t... Large language models(LLMs)offer new opportunities in diabetes research by integrating contextual behavioral data with physiological biosignals,supporting more personalized care.This review surveys recent studies on the application of LLMs to interpret interactions among stress,physical activity,and glucose dynamics across type 1,type 2,gestational,and monogenic diabetes(MODY).We examine methods for capturing contextual data beyond traditional patient diaries,including wearable sensors,lifestyle logs,and digital health tools,and discuss how these data are combined with continuous glucose monitoring.After retrieving 39 relevant studies and finally retaining 25 after screening,we summarize the current capabilities,limitations,and clinical implications of LLM-assisted multimodal approaches in diabetes management.The findings highlight both the promise and challenges of applying LLMs to synthesize heterogeneous data,providing insights for future research on enhancing individualized and evidence-based diabetes care. 展开更多
关键词 Large language models(LLMs) diabetes mellitus multimodal data integration digital health
在线阅读 下载PDF
Autonomous Drug Discovery With Parallel Intelligence
12
作者 Fei Lin Jing Yang +2 位作者 Dali Sun Levente Kovács Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 2025年第8期1742-1744,共3页
Dear Editor,The 2024 Nobel Prize in Chemistry was awarded to David Baker,Demis Hassabis,and John Jumper,recognizing their groundbreaking contributions to protein design and the prediction of complex protein structures... Dear Editor,The 2024 Nobel Prize in Chemistry was awarded to David Baker,Demis Hassabis,and John Jumper,recognizing their groundbreaking contributions to protein design and the prediction of complex protein structures[1].This accomplishment advances the frontier of“Artificial Intelligence(AI)for Science”.It marks a milestone in studying complex systems,highlighting a shift in scientific exploration from traditional causal inference to a comprehensive approach centered on solving complex system problems. 展开更多
关键词 studying complex systemshighlighting complex protein structures comprehensive approach complex system problems prediction complex protein structures protein design artificial intelligence scientific exploration
在线阅读 下载PDF
Cybernetic and Autonomous Science and Engineering for Intelligent Control:SEE^(2)H_(3)O+AIR^(2)IST+LaSEE^(2)CiSEE 被引量:2
13
作者 Fei-Yue Wang 《The International Journal of Intelligent Control and Systems》 2025年第1期1-2,共2页
CASE,control and automatic science engineering,cybernetics and automation science engineering,or convergence and autonomous science engineering,has been proposed to integrate and evolve traditional basic courses in ma... CASE,control and automatic science engineering,cybernetics and automation science engineering,or convergence and autonomous science engineering,has been proposed to integrate and evolve traditional basic courses in mathematics,physics,chemistry,biology,literature,and social sciences into new fundamental courses at all levels of education from kindergarten to post-graduate programs,i.e.,the new K21 educational system.Our goal is to build a future intelligent ecosystem through three major sociotechnical transformations:from AIR(automation,intelligence,and robotics)to IST(intelligent science and technology),LaSEE(low-altitude space economy and ecology)to CiSEE(circular in situ economy and ecology),and finally,SEE(sleeping well,eating well,and exercising well)to H_(3)O(happy,health,and help organized,operated,and optimized)for a new humanity with advanced AI.IJICS will play a major role in this important process. 展开更多
关键词 convergence autonomous science engineeringhas sociotechnical transfo autonomous science intelligent control automation CYBERNETICS integrate evolve traditional basic courses engineering
在线阅读 下载PDF
New AI for New Human in New Society
14
作者 Fei-Yue Wang 《The International Journal of Intelligent Control and Systems》 2025年第2期91-92,共2页
intelligence(AI)has entered a new stage,shifting from“artificial”to“agentic”and then to“autonomous”systems that are transforming knowledge,professions,and societal structures.Generative models,autonomous robotic... intelligence(AI)has entered a new stage,shifting from“artificial”to“agentic”and then to“autonomous”systems that are transforming knowledge,professions,and societal structures.Generative models,autonomous robotics,and intelligent ecosystems are no longer confined to laboratories but are shaping economies,governance,and cultural life worldwide.IJICS will serve as a platform to examine these shifts,focusing on the redefinition of professional expertise,the emergence of new roles of academic publications for bridging humans and machines,and the urgent demand for transparent and accountable governance.From AI for science and digital intelligence to autonomous organizations and decentralized governance,IJICS will highlight the trajectories most critical to the evolution of intelligent systems.Through long-term vision,pragmatic innovation,and international cooperation,our journal is aiming to enhance discourse and practice,ensuring that AI development remains aligned with human values and the common good. 展开更多
关键词 modelsautonomous roboticsand redefinition professional expertisethe agentic systems autonomous systems generative models intelligent ecosystems autonomous robotics artificial intelligence
在线阅读 下载PDF
Understanding Social Voice in Sociolinguistic Perception and Its Working Mechanism
15
作者 Wei Wang Lili Fan +3 位作者 Jiaxi Liu Hui Yu Qinghua Ni Levente Kovacs 《The International Journal of Intelligent Control and Systems》 2025年第3期218-226,共9页
A cognitive model of“social voice”in sociolinguistic perception is proposed in this paper,which explores how language use reflects social identity and how listeners interpret these linguistic features to form social... A cognitive model of“social voice”in sociolinguistic perception is proposed in this paper,which explores how language use reflects social identity and how listeners interpret these linguistic features to form social judgments.Moreover,social meaning involves the stereotypes or judgments people attach to certain ways of speaking.The social cognition processes how speakers perceive these linguistic cues to form those judgments.Linguistic features act as indexes of social categories.Context determines how these features are interpreted.This interplay between language,identity,and cognition reveals how societal norms,biases,and cognitive processes shape communication.Social voice in sociolinguistic perception reveals how language both reflects and reinforces social hierarchies.By understanding the cognitive mechanisms behind these processes,such as automatic stereotyping and contextual flexibility,we can challenge biases and promote equitable communication.Future research should prioritize intersectionality,technological ethics,and strategies to amplify marginalized voices,fostering a society in which linguistic diversity is celebrated rather than stigmatized. 展开更多
关键词 Social vision social voice sociolinguistic perception social meaning social cognition forensic phonetics social context sociophonetic variation
在线阅读 下载PDF
TransRAG for parallel transportation:toward reliable and trustworthy transportation systems via retrieval-augmented generation
16
作者 Jing YANG Xingyuan DAI +2 位作者 Yisheng LV Levente KOVáCS Fei-Yue WANG 《Frontiers of Information Technology & Electronic Engineering》 2025年第1期20-26,共7页
Parallel transportation serves as a holistic paradigm for achieving intelligent traffic management and control,focusing on addressing the complexity of human and social factors.Recently,the emergence and development o... Parallel transportation serves as a holistic paradigm for achieving intelligent traffic management and control,focusing on addressing the complexity of human and social factors.Recently,the emergence and development of foundational models(FMs)have ushered in a new era for the realization of parallel transportation.However,the inherent issues of“hallucinations,”outdated knowledge,and the“black-box”nature of FMs render their generated decisions unreliable and untrustworthy.To address these issues,we propose a TransRAG framework for parallel transportation based on retrieval-augmented generation and chain-of-thought(CoT)prompting.TransRAG is composed of three interacting layers,storage,management,and execution,which work together to deliver personalized and diverse traffic services to users.The external knowledge from the storage layer is incorporated to augment the FM in management layers for computational experiments. 展开更多
关键词 PROMPT services transportation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部