期刊文献+
共找到463篇文章
< 1 2 24 >
每页显示 20 50 100
Performance Evaluation of Traffic Engineering Signal Protocols in IPV6 MPLS Networks 被引量:2
1
作者 Mahmoud M. Al-Quzwini Sarmad K. Ibrahim 《Communications and Network》 2012年第4期298-305,共8页
This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely;Constraint Based Routed Label Distribution Protocol LDP... This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely;Constraint Based Routed Label Distribution Protocol LDP (CR-LDP) and Resource Reservation Protocol (RSVP). Furthermore, the performance of an MPLS network uses these TE signal protocols is compared to that of a conventional Internet Protocol (IP) network. Different applications including voice, video, File Transfer Protocol (FTP) and Hyperlink Text Transfer Protocol (HTTP) are used for the performance evaluation. Simulation results show superior performance of the MPLS network with CR-LDP TE signal protocol in all tested applications. 展开更多
关键词 MPLS LSP Traffic Engineering LSR LER LDP FEC QOS
在线阅读 下载PDF
Valley-dependent transport in strain engineering graphene heterojunctions
2
作者 Fei Wan X R Wang +6 位作者 L H Liao J Y Zhang M N Chen G H Zhou Z B Siu Mansoor B.A.Jalil Yuan Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第7期509-515,共7页
We study the effect of strain on band structure and valley-dependent transport properties of graphene heterojunctions.It is found that valley-dependent separation of electrons can be achieved by utilizing strain and o... We study the effect of strain on band structure and valley-dependent transport properties of graphene heterojunctions.It is found that valley-dependent separation of electrons can be achieved by utilizing strain and on-site energies.In the presence of strain,the values of transmission can be effectively adjusted by changing the strengths of the strain,while the transport angle basically keeps unchanged.When an extra on-site energy is simultaneously applied to the central scattering region,not only are the electrons of valleys K and K'separated into two distinct transmission lobes in opposite transverse directions,but the transport angles of two valleys can be significantly changed.Therefore,one can realize an effective modulation of valley-dependent transport by changing the strength and stretch angle of the strain and on-site energies,which can be exploited for graphene-based valleytronics devices. 展开更多
关键词 strain engineering valley-dependent separation GRAPHENE on-site energy
原文传递
Status of tissue engineering and regenerative medicine in Iran and related advanced tools: Bioreactors and scaffolds
3
作者 Anneh Mohammad Gharravi Mahmoud Orazizadeh +4 位作者 Mahmoud Hashemitabar Karim Ansari-Asl Salem Banoni Ali Alifard Sina Izadi 《Journal of Biomedical Science and Engineering》 2012年第4期217-227,共11页
Because of increased need to tissue and organ transplantation, tissue engineering (TE) researches have significantly increased in recent years in Iran. The present study explored briefly the advances in the TE approac... Because of increased need to tissue and organ transplantation, tissue engineering (TE) researches have significantly increased in recent years in Iran. The present study explored briefly the advances in the TE approaches in Iran. Through comprehensive search, we explored main TE components researches include cell, scaffold, growth factor and bioreactor conducted in Iran. The field of TE and regenerative medicine in Iran dates back to the early part of the 1990 decade and the advent of stem cell researches. During past two decades, Iran was one of leader in stem cell research in Middle East. The next major step in TE was application and fabrication of scaffolds for TE in the early 2000s with focused on engineering bone and nerve tissue. Iranian researchers extensively used natural scaffolds in their studies and hybridized natural polymers and inorganic scaffolds. There are many universities and government research institutes are conducting active research on tissue-engineering technologies. Limitations to TE in Iran include property design and validation of bioreactors. In conclusion, in the last few years, fields of tissue engineering and regenerative medicine such as stem cell technology and scaffolds have progressed in Iran, but one of the biggest challenges for TE is bioreactors researches. 展开更多
关键词 Iran TISSUE Engineering Cell SCAFFOLD Signal BIOREACTOR
暂未订购
Measurement of emissivity with a new grey body and novel IR thermal sensor dubbed TMOS
4
作者 Moshe Avraham Shlomi Bouscher +2 位作者 Jonathan Nemirovsky Yael Nemirovsky 《红外与毫米波学报》 北大核心 2025年第1期17-24,共8页
The concept of emissivity has been with the scientific and engineering world since Planck formulated his blackbody radiation law more than a century ago.Nevertheless,emissivity is an elusive concept even for ex⁃perts.... The concept of emissivity has been with the scientific and engineering world since Planck formulated his blackbody radiation law more than a century ago.Nevertheless,emissivity is an elusive concept even for ex⁃perts.It is a vague and fuzzy concept for the wider community of engineers.The importance of remote sensing of temperature by measuring IR radiation has been recognized in a wide range of industrial,medical,and environ⁃mental uses.One of the major sources of errors in IR radiometry is the emissivity of the surface being measured.In real experiments,emissivity may be influenced by many factors:surface texture,spectral properties,oxida⁃tion,and aging of surfaces.While commercial blackbodies are prevalent,the much-needed grey bodies with a known emissivity,are unavailable.This study describes how to achieve a calibrated and stable emissivity with a blackbody,a perforated screen,and a reliable and linear novel IR thermal sensor,18 dubbed TMOS.The Digital TMOS is now a low-cost commercial product,it requires low power,and it has a small form factor.The method⁃ology is based on two-color measurements,with two different optical filters,with selected wavelengths conform⁃ing to the grey body definition of the use case under study.With a photochemically etched perforated screen,the effective emissivity of the screen is simply the hole density area of the surface area that emits according to the blackbody temperature radiation.The concept is illustrated with ray tracing simulations,which demonstrate the approach.Measured results are reported. 展开更多
关键词 BLACKBODY grey body graybody cavity blackbody extended area blackbody EMISSIVITY IR thermometry remote temperature measurement
在线阅读 下载PDF
Simulation-Based Novel Hybrid Proportional Derivative/H-Infinity Controller Design for Improved Trajectory Tracking of a Two-Link Robot Arm
5
作者 BANKOLE Adesola Temitope IGBONOBA Ezekiel Endurance Chukwuemeke 《Journal of Shanghai Jiaotong university(Science)》 2025年第6期1179-1187,共9页
A hybrid control strategy integrating proportional derivative(PD)and the H-infinity control methodology is proposed for a serial two-link robotic manipulator with the goal of improving the tracking performance of the ... A hybrid control strategy integrating proportional derivative(PD)and the H-infinity control methodology is proposed for a serial two-link robotic manipulator with the goal of improving the tracking performance of the robot arm.The H-infinity controller has the ability to achieve a high performance and robustness in the presence of disturbances and uncertainties,while the PD controller is effective in stabilizing the manipulator.Simulation results using Matlab and Simulink show that the proposed hybrid controller,which integrates the advantages of both PD and H-infinity controllers,has the lowest rise time for the second link,the lowest settling time for the two links,the lowest peak time for both links,and the fastest decay of the error response.In addition,the hybrid control scheme also has the lowest mean square error value,with a 53.3%improvement over the H-infinity controller and a 91.8%improvement over the PD controller,indicating an improved trajectory tracking performance when compared with pure PD and pure H-infinity controllers,respectively.It was also found that the hybrid controller has the lowest integral absolute error,integral square error,integral time absolute error,and integral time square error for the second link,while the error values for the first link are satisfactory,showing a superior performance of the hybrid controller above the PD and H-infinity controllers,respectively. 展开更多
关键词 robot arm trajectory tracking proportional derivative(PD)control H-infinity control hybrid PD/H-infinity control
原文传递
Zero-Shot Based Spatial AI Algorithm for Up-to-Date 3D Vision Map Generations in Highly Complex Indoor Environments
6
作者 Sehun Lee Taehoon Kim Junho Ahn 《Computers, Materials & Continua》 2025年第8期3623-3648,共26页
This paper proposes a zero-shot based spatial recognition AI algorithm by fusing and developing multidimensional vision identification technology adapted to the situation in large indoor and underground spaces.With th... This paper proposes a zero-shot based spatial recognition AI algorithm by fusing and developing multidimensional vision identification technology adapted to the situation in large indoor and underground spaces.With the expansion of large shopping malls and underground urban spaces(UUS),there is an increasing need for new technologies that can quickly identify complex indoor structures and changes such as relocation,remodeling,and construction for the safety and management of citizens through the provision of the up-to-date indoor 3D site maps.The proposed algorithm utilizes data collected by an unmanned robot to create a 3D site map of the up-to-date indoor site and recognizes complex indoor spaces based on zero-shot learning.This research specifically addresses two major challenges:the difficulty of detecting walls and floors due to complex patterns and the difficulty of spatial perception due to unknown obstacles.The proposed algorithm addresses the limitations of the existing foundation model,detects floors and obstacles without expensive sensors,and improves the accuracy of spatial recognition by combining floor detection,vanishing point detection,and fusion obstacle detection algorithms.The experimental results show that the algorithm effectively detects the floor and obstacles in various indoor environments,with F1 scores of 0.96 and 0.93 in the floor detection and obstacle detection experiments,respectively. 展开更多
关键词 Spatial AI VISION foundation model zero-shot learning image segmentation
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
7
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
SNN-IoMT:A Novel AI-Driven Model for Intrusion Detection in Internet of Medical Things
8
作者 Mourad Benmalek Abdessamed Seddiki Kamel-Dine Haouam 《Computer Modeling in Engineering & Sciences》 2025年第4期1157-1184,共28页
The Internet of MedicalThings(IoMT)connects healthcare devices and sensors to the Internet,driving transformative advancements in healthcare delivery.However,expanding IoMT infrastructures face growing security threat... The Internet of MedicalThings(IoMT)connects healthcare devices and sensors to the Internet,driving transformative advancements in healthcare delivery.However,expanding IoMT infrastructures face growing security threats,necessitating robust IntrusionDetection Systems(IDS).Maintaining the confidentiality of patient data is critical in AI-driven healthcare systems,especially when securing interconnected medical devices.This paper introduces SNN-IoMT(Stacked Neural Network Ensemble for IoMT Security),an AI-driven IDS framework designed to secure dynamic IoMT environments.Leveraging a stacked deep learning architecture combining Multi-Layer Perceptron(MLP),Convolutional Neural Networks(CNN),and Long Short-Term Memory(LSTM),the model optimizes data management and integration while ensuring system scalability and interoperability.Trained on the WUSTL-EHMS-2020 and IoT-Healthcare-Security datasets,SNN-IoMT surpasses existing IDS frameworks in accuracy,precision,and detecting novel threats.By addressing the primary challenges in AI-driven healthcare systems,including privacy,reliability,and ethical data management,our approach exemplifies the importance of AI to enhance security and trust in IoMT-enabled healthcare. 展开更多
关键词 Healthcare Internet of Medical Things artificial intelligence deep learning intrusion detection system
在线阅读 下载PDF
Cooperative RISE learning-based circumnavigation of networked unmanned aerial vehicles with collision avoidance and connectivity preservation
9
作者 Jawhar Ghommam Amani Ayeb +1 位作者 Brahim Brahmi Maarouf Saad 《Control Theory and Technology》 2025年第2期266-293,共28页
In this paper, a bearing-based three-dimensional self-localization and distributed circumnavigation with connectivity preservation and collision avoidance are investigated for a group of quadrotor-type unmanned aerial... In this paper, a bearing-based three-dimensional self-localization and distributed circumnavigation with connectivity preservation and collision avoidance are investigated for a group of quadrotor-type unmanned aerial vehicles (UAVs). A leader–follower structure is adopted, wherein the leader moves with reference dynamics (a target). Different from the existing approaches that necessitate full knowledge of the time-varying reference trajectory, in this paper, it is assumed that only some vehicles (at least one) have access to the bearing relative to the target, and all other vehicles are equipped with sensors capable of measuring the bearings relative to neighboring vehicles. In this paper, a consensus estimator is proposed to estimate the global position for each vehicle using relative bearing measurements and an estimate of neighboring vehicles received from a direct communication network. Then, a continuous robust integral of the sign of the error (RISE) control approach is effectively integrated with the distributed vector field approach to ensure UAV formation orbiting around the moving target while avoiding obstacles and maintaining network links within available communication ranges. In contrast to the classical RISE control rule, a \(\tanh (\cdot )\) function is used instead of the \(\text {sgn}(\cdot )\) function to further decrease the high-gain feedback and to obtain a smoother control signal. Furthermore, by using the localized radial basis function (RBF) neural networks (NNs) in a cooperative way, deterministic learning theory is employed to accurately identify/learn model uncertainties resulting from the attitude dynamics. The convergence of the entire closed-loop system is illustrated using the Lyapunov theory and is shown to be uniformly ultimately bounded. Finally, numerical simulations show the effectiveness of the proposed approach. 展开更多
关键词 RISE-based backstepping approach Input constraints Auxiliary compensated systems Circumnavigation Distributed localization Collision avoidance Vector-field potential
原文传递
Prediction and Comparative Analysis of Rooftop PV Solar Energy Efficiency Considering Indoor and Outdoor Parameters under Real Climate Conditions Factors with Machine Learning Model
10
作者 Gokhan Sahin Ihsan Levent +2 位作者 Gültekin Isik Wilfriedvan Sark Sabir Rustemli 《Computer Modeling in Engineering & Sciences》 2025年第4期1215-1248,共34页
This research investigates the influence of indoor and outdoor factors on photovoltaic(PV)power generation at Utrecht University to accurately predict PV system performance by identifying critical impact factors and i... This research investigates the influence of indoor and outdoor factors on photovoltaic(PV)power generation at Utrecht University to accurately predict PV system performance by identifying critical impact factors and improving renewable energy efficiency.To predict plant efficiency,nineteen variables are analyzed,consisting of nine indoor photovoltaic panel characteristics(Open Circuit Voltage(Voc),Short Circuit Current(Isc),Maximum Power(Pmpp),Maximum Voltage(Umpp),Maximum Current(Impp),Filling Factor(FF),Parallel Resistance(Rp),Series Resistance(Rs),Module Temperature)and ten environmental factors(Air Temperature,Air Humidity,Dew Point,Air Pressure,Irradiation,Irradiation Propagation,Wind Speed,Wind Speed Propagation,Wind Direction,Wind Direction Propagation).This study provides a new perspective not previously addressed in the literature.In this study,different machine learning methods such as Multilayer Perceptron(MLP),Multivariate Adaptive Regression Spline(MARS),Multiple Linear Regression(MLR),and Random Forest(RF)models are used to predict power values using data from installed PVpanels.Panel values obtained under real field conditions were used to train the models,and the results were compared.The Multilayer Perceptron(MLP)model was achieved with the highest classification accuracy of 0.990%.The machine learning models used for solar energy forecasting show high performance and produce results close to actual values.Models like Multi-Layer Perceptron(MLP)and Random Forest(RF)can be used in diverse locations based on load demand. 展开更多
关键词 Machine learning model multi-layer perceptrons(MLP) random forest(RF) solar photovoltaic panel energy efficiency indoor and outdoor parameters forecasting
在线阅读 下载PDF
SIFT: Sifting fle types—application of explainable artifcial intelligence in cyber forensics
11
作者 Shahid Alam Alper Kamil Demir 《Cybersecurity》 2025年第4期119-141,共23页
Artifcial Intelligence (AI) is being applied to improve the efciency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the felds of AI that int... Artifcial Intelligence (AI) is being applied to improve the efciency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the felds of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the rel-evanceof the input features to the output of an AI model. File fragment classifcation is one of the vital issues of fle carving in Cyber Forensics (CF) and becomes challenging when the flesystem metadata is missing. Other major challenges it faces are: proliferation of fle formats, fle embeddings, automation, We leverage and utilize interpretations provided by XAI to optimize the classifcation of fle fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a fle fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize fle fragment classifcation. To improve multinomial classifcation, a Multilayer Per-ceptronmodel is developed and optimized with fve hidden layers, each layer with i × n neurons, where i = the layer number and n = the total number of classes in the dataset. When tested with 47,482 samples of 20 fle types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the frst efort of applying XAI in CF for optimizing fle fragment classifcation. 展开更多
关键词 Explainable artifcial intelligence Deep learning Cyber forensics File fragment classifcation
原文传递
A Two-Layer Network Intrusion Detection Method Incorporating LSTM and Stacking Ensemble Learning
12
作者 Jun Wang Chaoren Ge +4 位作者 Yihong Li Huimin Zhao Qiang Fu Kerang Cao Hoekyung Jung 《Computers, Materials & Continua》 2025年第6期5129-5153,共25页
Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class at... Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network environments.To improve the detection capability of minority-class attacks,this study proposes an intrusion detection method based on a two-layer structure.The first layer employs a CNN-BiLSTM model incorporating an attention mechanism to classify network traffic into normal traffic,majority class attacks,and merged minority class attacks.The second layer further segments the minority class attacks through Stacking ensemble learning.The datasets are selected from the generic network dataset CIC-IDS2017,NSL-KDD,and the industrial network dataset Mississippi Gas Pipeline dataset to enhance the generalization and practical applicability of the model.Experimental results show that the proposed model achieves an overall detection accuracy of 99%,99%,and 95%on the CIC-IDS2017,NSL-KDD,and industrial network datasets,respectively.It also significantly outperforms traditional methods in terms of detection accuracy and recall rate for minority class attacks.Compared with the single-layer deep learning model,the two-layer structure effectively reduces the false alarm rate while improving the minority-class attack detection performance.The research in this paper not only improves the adaptability of NIDS to complex network environments but also provides a new solution for minority-class attack detection in industrial network security. 展开更多
关键词 Two-layer architecture minority class attack stacking ensemble learning network intrusion detection
在线阅读 下载PDF
Enhancing Multi-Class Cyberbullying Classification with Hybrid Feature Extraction and Transformer-Based Models
13
作者 Suliman Mohamed Fati Mohammed A.Mahdi +4 位作者 Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Mohammed Gamal Ragab Mohammed Al-Shalabi 《Computer Modeling in Engineering & Sciences》 2025年第5期2109-2131,共23页
Cyberbullying on social media poses significant psychological risks,yet most detection systems over-simplify the task by focusing on binary classification,ignoring nuanced categories like passive-aggressive remarks or... Cyberbullying on social media poses significant psychological risks,yet most detection systems over-simplify the task by focusing on binary classification,ignoring nuanced categories like passive-aggressive remarks or indirect slurs.To address this gap,we propose a hybrid framework combining Term Frequency-Inverse Document Frequency(TF-IDF),word-to-vector(Word2Vec),and Bidirectional Encoder Representations from Transformers(BERT)based models for multi-class cyberbullying detection.Our approach integrates TF-IDF for lexical specificity and Word2Vec for semantic relationships,fused with BERT’s contextual embeddings to capture syntactic and semantic complexities.We evaluate the framework on a publicly available dataset of 47,000 annotated social media posts across five cyberbullying categories:age,ethnicity,gender,religion,and indirect aggression.Among BERT variants tested,BERT Base Un-Cased achieved the highest performance with 93%accuracy(standard deviation across±1%5-fold cross-validation)and an average AUC of 0.96,outperforming standalone TF-IDF(78%)and Word2Vec(82%)models.Notably,it achieved near-perfect AUC scores(0.99)for age and ethnicity-based bullying.A comparative analysis with state-of-the-art benchmarks,including Generative Pre-trained Transformer 2(GPT-2)and Text-to-Text Transfer Transformer(T5)models highlights BERT’s superiority in handling ambiguous language.This work advances cyberbullying detection by demonstrating how hybrid feature extraction and transformer models improve multi-class classification,offering a scalable solution for moderating nuanced harmful content. 展开更多
关键词 Cyberbullying classification multi-class classification BERT models machine learning TF-IDF Word2Vec social media analysis transformer models
在线阅读 下载PDF
Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification
14
作者 Rim Amdouni Mahdi Madani +2 位作者 Mohamed Ali Hajjaji El Bay Bourennane Mohamed Atri 《Computers, Materials & Continua》 2025年第9期5527-5553,共27页
Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blo... Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images. 展开更多
关键词 Medical image encryption chaotic maps blockchain substitution-Box security INTEGRITY
在线阅读 下载PDF
Artificial intelligence and the impact of multiomics on the reporting of case reports
15
作者 Aishwarya Boini Vincent Grasso +1 位作者 Heba Taher Andrew A Gumbs 《World Journal of Clinical Cases》 2025年第15期1-6,共6页
The integration of artificial intelligence(AI)and multiomics has transformed clinical and life sciences,enabling precision medicine and redefining disease understanding.Scientific publications grew significantly from ... The integration of artificial intelligence(AI)and multiomics has transformed clinical and life sciences,enabling precision medicine and redefining disease understanding.Scientific publications grew significantly from 2.1 million in 2012 to 3.3 million in 2022,with AI research tripling during this period.Multiomics fields,including genomics and proteomics,also advanced,exemplified by the Human Proteome Project achieving a 90%complete blueprint by 2021.This growth highlights opportunities and challenges in integrating AI and multiomics into clinical reporting.A review of studies and case reports was conducted to evaluate AI and multiomics integration.Key areas analyzed included diagnostic accuracy,predictive modeling,and personalized treatment approaches driven by AI tools.Case examples were studied to assess impacts on clinical decision-making.AI and multiomics enhanced data integration,predictive insights,and treatment personalization.Fields like radiomics,genomics,and proteomics improved diagnostics and guided therapy.For instance,the“AI radiomics,geno-mics,oncopathomics,and surgomics project”combined radiomics and genomics for surgical decision-making,enabling preoperative,intraoperative,and post-operative interventions.AI applications in case reports predicted conditions like postoperative delirium and monitored cancer progression using genomic and imaging data.AI and multiomics enable standardized data analysis,dynamic updates,and predictive modeling in case reports.Traditional reports often lack objectivity,but AI enhances reproducibility and decision-making by processing large datasets.Challenges include data standardization,biases,and ethical concerns.Overcoming these barriers is vital for optimizing AI applications and advancing personalized medicine.AI and multiomics integration is revolutionizing clinical research and practice.Standardizing data reporting and addressing challenges in ethics and data quality will unlock their full potential.Emphasizing collaboration and transparency is essential for leveraging these tools to improve patient care and scientific communication. 展开更多
关键词 Artificial intelligence Multiomics Precision medicine GENOMICS PROTEOMICS Metabolomics Radiomics Pathomics Surgomics Predictive modeling
暂未订购
轻型评论的情感分析研究 被引量:49
16
作者 张林 钱冠群 +2 位作者 樊卫国 华琨 张莉 《软件学报》 EI CSCD 北大核心 2014年第12期2790-2807,共18页
以在智能移动设备上发表的用户评论作为研究对象,并将该类评论称为轻型评论.指出了轻型评论与早期互联网评论及短文本研究的异同点,并通过实验总结轻型评论的独有特性:字数少、跨度大,短小评论数量众多,评论长度与数量满足幂率分布.同时... 以在智能移动设备上发表的用户评论作为研究对象,并将该类评论称为轻型评论.指出了轻型评论与早期互联网评论及短文本研究的异同点,并通过实验总结轻型评论的独有特性:字数少、跨度大,短小评论数量众多,评论长度与数量满足幂率分布.同时,针对轻型评论的情感分类研究展开了一系列的实验研究,发现:(1)情感分类效果随着评论长度的增加而下降;(2)传统的特征筛选方法以及特征加权方法对于轻型评论效果都不够理想;(3)极性词在短评论中比例高于长评论;(4)长、短评论在用词上存在较高的重叠度.在此基础上,提出了一种基于短评论特征共现的特征筛选方法,将短小评论中的优势信息和传统的特征筛选方法相结合,在筛选掉无用噪音的同时增补有利于分类的有效特征.实验结果表明,该方法可以有效地提高轻型评论中较长评论的分类效果. 展开更多
关键词 情感分析 用户评论 短文本 意见挖掘
在线阅读 下载PDF
基于RLS算法的有源滤波器自适应基波检测方法(英文) 被引量:7
17
作者 姜孝华 金济 Ale Emedi 《仪器仪表学报》 EI CAS CSCD 北大核心 2006年第1期1-8,18,共9页
揭示了有源电力滤波器中谐波补偿指令相位的微小变化都将对谐波控制效果产生很大的负面影响,并导致新的谐波产生。而谐波补偿指令相位偏差主要是由谐波检测算法产生。针对电力系统中信号波形的局部周期性,提出和研究了基于递推最小二乘... 揭示了有源电力滤波器中谐波补偿指令相位的微小变化都将对谐波控制效果产生很大的负面影响,并导致新的谐波产生。而谐波补偿指令相位偏差主要是由谐波检测算法产生。针对电力系统中信号波形的局部周期性,提出和研究了基于递推最小二乘算法(RLS)的自适应谐波能量最小化基波检测算法,给出了均方意义下的收敛性分析结果。研究表明,在电力系统中出现过渡带及基波信号发生时变时,采用FFT算法的估计结果存在较大的相位偏移。RLS谐波检测方案较Kalman滤波器尤其是FFT方法计算量小,适时跟踪性能好,是有源滤波器中补偿指令检测的有效方法。 展开更多
关键词 电力谐波 检测 RLS算法 FFT 卡尔曼滤波 有源滤波
在线阅读 下载PDF
DESIGN OF NONLINEAR OBSERVER FOR NONLINEAR SYSTEM BASED ON RBF NEURAL NETWORKS
18
作者 龚华军 Chowdhury F N 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2006年第4期311-315,共5页
A new type of nonlinear observer for nonlinear systems is presented. Instead of approximating thc cntire nonlinear system with the neural network (NN), only the un-modeled part left over after the lincarization is a... A new type of nonlinear observer for nonlinear systems is presented. Instead of approximating thc cntire nonlinear system with the neural network (NN), only the un-modeled part left over after the lincarization is approximated. Compared with the conventional linear observer, the observer provides more accurate estimation of the state. The state estimation error is proved to asymptotically approach zero with the Lyapunov method. The simulation result shows that the proposed observer scheme is effective and has a potential application ability in the fault detection and identification (FDI), and the state estimation. 展开更多
关键词 observer nonlinear system state estimation neural network
在线阅读 下载PDF
ON THE STRUCTURES OF RAM-BASED CHINESE CHARACTER LIBRARIES
19
作者 钱培德 《苏州大学学报(自然科学版)》 CAS 1991年第2期140-147,共8页
The Chinese character library is one of the important data structures in the Chinese information Processing system.The behavior of the whole system depends directly on the reasonableness of design for its structure.Th... The Chinese character library is one of the important data structures in the Chinese information Processing system.The behavior of the whole system depends directly on the reasonableness of design for its structure.This paper expounds the structures of RAM-based Chinese character libraries,static and dynamic ,The paper offers a descriptive method for this behavior and inquires into some algorithms related to the structures mentioned above. 展开更多
关键词 汉字库 数据结构 自适应库 多层次库
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部