期刊文献+
共找到526,234篇文章
< 1 2 250 >
每页显示 20 50 100
Application of virtual reality technology improves the functionality of brain networks in individuals experiencing pain 被引量:1
1
作者 Takahiko Nagamine 《World Journal of Clinical Cases》 SCIE 2025年第3期66-68,共3页
Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the u... Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the use of virtual reality(VR)technology.VR has been demonstrated to be an effective treatment for pain associated with medical procedures,as well as for chronic pain conditions for which no effective treatment has been established.The precise mechanism by which the diversion from reality facilitated by VR contributes to the diminution of pain and anxiety has yet to be elucidated.However,the provision of positive images through VR-based visual stimulation may enhance the functionality of brain networks.The salience network is diminished,while the default mode network is enhanced.Additionally,the medial prefrontal cortex may establish a stronger connection with the default mode network,which could result in a reduction of pain and anxiety.Further research into the potential of VR technology to alleviate pain could lead to a reduction in the number of individuals who overdose on painkillers and contribute to positive change in the medical field. 展开更多
关键词 Virtual reality PAIN ANXIETY Salience network Default mode network
在线阅读 下载PDF
Multi-Stage-Based Siamese Neural Network for Seal Image Recognition
2
作者 Jianfeng Lu Xiangye Huang +3 位作者 Caijin Li Renlin Xin Shanqing Zhang Mahmoud Emam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期405-423,共19页
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited... Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets. 展开更多
关键词 Seal recognition seal authentication document tampering siamese network spatial transformer network similarity comparison network
在线阅读 下载PDF
Dynamic Multi-Graph Spatio-Temporal Graph Traffic Flow Prediction in Bangkok:An Application of a Continuous Convolutional Neural Network
3
作者 Pongsakon Promsawat Weerapan Sae-dan +2 位作者 Marisa Kaewsuwan Weerawat Sudsutad Aphirak Aphithana 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期579-607,共29页
The ability to accurately predict urban traffic flows is crucial for optimising city operations.Consequently,various methods for forecasting urban traffic have been developed,focusing on analysing historical data to u... The ability to accurately predict urban traffic flows is crucial for optimising city operations.Consequently,various methods for forecasting urban traffic have been developed,focusing on analysing historical data to understand complex mobility patterns.Deep learning techniques,such as graph neural networks(GNNs),are popular for their ability to capture spatio-temporal dependencies.However,these models often become overly complex due to the large number of hyper-parameters involved.In this study,we introduce Dynamic Multi-Graph Spatial-Temporal Graph Neural Ordinary Differential Equation Networks(DMST-GNODE),a framework based on ordinary differential equations(ODEs)that autonomously discovers effective spatial-temporal graph neural network(STGNN)architectures for traffic prediction tasks.The comparative analysis of DMST-GNODE and baseline models indicates that DMST-GNODE model demonstrates superior performance across multiple datasets,consistently achieving the lowest Root Mean Square Error(RMSE)and Mean Absolute Error(MAE)values,alongside the highest accuracy.On the BKK(Bangkok)dataset,it outperformed other models with an RMSE of 3.3165 and an accuracy of 0.9367 for a 20-min interval,maintaining this trend across 40 and 60 min.Similarly,on the PeMS08 dataset,DMST-GNODE achieved the best performance with an RMSE of 19.4863 and an accuracy of 0.9377 at 20 min,demonstrating its effectiveness over longer periods.The Los_Loop dataset results further emphasise this model’s advantage,with an RMSE of 3.3422 and an accuracy of 0.7643 at 20 min,consistently maintaining superiority across all time intervals.These numerical highlights indicate that DMST-GNODE not only outperforms baseline models but also achieves higher accuracy and lower errors across different time intervals and datasets. 展开更多
关键词 Graph neural networks convolutional neural network deep learning dynamic multi-graph SPATIO-TEMPORAL
在线阅读 下载PDF
DIGNN-A:Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph
4
作者 Jizhao Liu Minghao Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期817-842,共26页
The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are cr... The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics. 展开更多
关键词 Intrusion detection graph neural networks attention mechanisms line graphs dynamic graph neural networks
在线阅读 下载PDF
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
5
作者 Khalil Ullah Song Jian +4 位作者 Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad 《Computers, Materials & Continua》 SCIE EI 2025年第1期1151-1169,共19页
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user... The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques. 展开更多
关键词 Next generation networks massive mimo communication network artificial intelligence 5G adversarial attacks channel estimation information security
在线阅读 下载PDF
Network pharmacology:Changes the treatment mode of"one disease-one target"in cancer treatment
6
作者 Shuai Liu Yong-Wei Yu 《World Journal of Gastrointestinal Oncology》 SCIE 2025年第1期268-271,共4页
The article concluded that network pharmacology provides new ideas and insights into the molecular mechanism of traditional Chinese medicine(TCM)treatment of cancer.TCM is a new choice and hot spot in the field of can... The article concluded that network pharmacology provides new ideas and insights into the molecular mechanism of traditional Chinese medicine(TCM)treatment of cancer.TCM is a new choice and hot spot in the field of cancer treatment.We have also previously published studies on TCM and network pharmacology.In this letter,we summarize the new paradigm of network pharmacology in cancer treatment mechanisms. 展开更多
关键词 network pharmacology CANCER MULTICOMPONENT Multitarget THERAPY
在线阅读 下载PDF
Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network
7
作者 Zhiguo Liu Yuqing Gui +1 位作者 Lin Wang Yingru Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期863-879,共17页
Satellite edge computing has garnered significant attention from researchers;however,processing a large volume of tasks within multi-node satellite networks still poses considerable challenges.The sharp increase in us... Satellite edge computing has garnered significant attention from researchers;however,processing a large volume of tasks within multi-node satellite networks still poses considerable challenges.The sharp increase in user demand for latency-sensitive tasks has inevitably led to offloading bottlenecks and insufficient computational capacity on individual satellite edge servers,making it necessary to implement effective task offloading scheduling to enhance user experience.In this paper,we propose a priority-based task scheduling strategy based on a Software-Defined Network(SDN)framework for satellite-terrestrial integrated networks,which clarifies the execution order of tasks based on their priority.Subsequently,we apply a Dueling-Double Deep Q-Network(DDQN)algorithm enhanced with prioritized experience replay to derive a computation offloading strategy,improving the experience replay mechanism within the Dueling-DDQN framework.Next,we utilize the Deep Deterministic Policy Gradient(DDPG)algorithm to determine the optimal resource allocation strategy to reduce the processing latency of sub-tasks.Simulation results demonstrate that the proposed d3-DDPG algorithm outperforms other approaches,effectively reducing task processing latency and thus improving user experience and system efficiency. 展开更多
关键词 Satellite network edge computing task scheduling computing offloading
在线阅读 下载PDF
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
8
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 Software defined networking failure detection failure recovery RESTORATION PROTECTION
在线阅读 下载PDF
3D tomographic analysis of equatorial plasma bubble using GNSS-TEC data from Indonesian GNSS Network
9
作者 Ihsan Naufal Muafiry Prayitno Abadi +5 位作者 Teguh N.Pratama Dyah R.Martiningrum Sri Ekawati Yuandhika GWismaya Febrylian FChabibi Gatot HPramono 《Earth and Planetary Physics》 EI CAS 2025年第1期127-136,共10页
Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other s... Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other seasons.The phenomenon significantly disrupts radio wave signals essential to communication and navigation systems.The national network of Global Navigation Satellite System(GNSS)receivers in Indonesia(>30°longitudinal range)provides an opportunity for detailed EPB studies.To explore this,we conducted preliminary 3D tomography of total electron content(TEC)data captured by GNSS receivers following a geomagnetic storm on December 3,2023,when at least four EPB clusters occurred in the Southeast Asian sector.TEC and extracted TEC depletion with a 120-minute running average were then used as inputs for a 3D tomography program.Their 2D spatial distribution consistently captured the four EPB clusters over time.These tomography results were validated through a classical checkerboard test and comparisons with other ionospheric data sources,such as the Global Ionospheric Map(GIM)and International Reference Ionosphere(IRI)profile.Validation of the results demonstrates the capability of the Indonesian GNSS network to measure peak ionospheric density.These findings highlight the potential for future three-dimensional research of plasma bubbles in low-latitude regions using existing GNSS networks,with extensive longitudinal coverage. 展开更多
关键词 EPB Indonesian GNSS network 3D tomography
在线阅读 下载PDF
A Generative Model-Based Network Framework for Ecological Data Reconstruction
10
作者 Shuqiao Liu Zhao Zhang +1 位作者 Hongyan Zhou Xuebo Chen 《Computers, Materials & Continua》 SCIE EI 2025年第1期929-948,共20页
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems.Combining Strengths,Weaknesses,Opportunities,Th... This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems.Combining Strengths,Weaknesses,Opportunities,Threats(SWOT)analysis data with Variation Autoencoder(VAE)and Generative AdversarialNetwork(GAN)the network framework model(SAE-GAN),is proposed for environmental data reconstruction.The model combines two popular generative models,GAN and VAE,to generate features conditional on categorical data embedding after SWOT Analysis.The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data.Reconstructed data is used to retain more semantic information to generate features.The model was applied to species in Southern California,USA,citing SWOT analysis data to train the model.Experiments show that the model is capable of integrating data from more comprehensive analyses than traditional methods and generating high-quality reconstructed data from them,effectively solving the problem of insufficient data collection in development environments.The model is further validated by the Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)classification assessment commonly used in the environmental data domain.This study provides a reliable and rich source of training data for species introduction site selection systems and makes a significant contribution to ecological and sustainable development. 展开更多
关键词 Convolutional Neural network(CNN) VAE GAN TOPSIS data reconstruction
在线阅读 下载PDF
Leveraging ROTI map derived from Indonesian GNSS receiver network for advancing study of Equatorial Plasma Bubble in Southeast/East Asia 被引量:1
11
作者 Prayitno Abadi Ihsan N.Muafiry +8 位作者 Teguh N.Pratama Angga Y.Putra Suraina Gatot H.Pramono Sidik T.Wibowo Febrylian F.Chabibi Umar A.Ahmad Wildan P.Tresna Asnawi 《Earth and Planetary Physics》 EI CAS 2025年第1期101-116,共16页
This paper highlights the crucial role of Indonesia’s GNSS receiver network in advancing Equatorial Plasma Bubble(EPB)studies in Southeast and East Asia,as ionospheric irregularities within EPB can disrupt GNSS signa... This paper highlights the crucial role of Indonesia’s GNSS receiver network in advancing Equatorial Plasma Bubble(EPB)studies in Southeast and East Asia,as ionospheric irregularities within EPB can disrupt GNSS signals and degrade positioning accuracy.Managed by the Indonesian Geospatial Information Agency(BIG),the Indonesia Continuously Operating Reference Station(Ina-CORS)network comprises over 300 GNSS receivers spanning equatorial to southern low-latitude regions.Ina-CORS is uniquely situated to monitor EPB generation,zonal drift,and dissipation across Southeast Asia.We provide a practical tool for EPB research,by sharing two-dimensional rate of Total Electron Content(TEC)change index(ROTI)derived from this network.We generate ROTI maps with a 10-minute resolution,and samples from May 2024 are publicly available for further scientific research.Two preliminary findings from the ROTI maps of Ina-CORS are noteworthy.First,the Ina-CORS ROTI maps reveal that the irregularities within a broader EPB structure persist longer,increasing the potential for these irregularities to migrate farther eastward.Second,we demonstrate that combined ROTI maps from Ina-CORS and GNSS receivers in East Asia and Australia can be used to monitor the development of ionospheric irregularities in Southeast and East Asia.We have demonstrated the combined ROTI maps to capture the development of ionospheric irregularities in the Southeast/East Asian sector during the G5 Geomagnetic Storm on May 11,2024.We observed simultaneous ionospheric irregularities in Japan and Australia,respectively propagating northwestward and southwestward,before midnight,whereas Southeast Asia’s equatorial and low-latitude regions exhibited irregularities post-midnight.By sharing ROTI maps from Indonesia and integrating them with regional GNSS networks,researchers can conduct comprehensive EPB studies,enhancing the understanding of EPB behavior across Southeast and East Asia and contributing significantly to ionospheric research. 展开更多
关键词 Equatorial Plasma Bubble(EPB) GNSS receivers’network Indonesia Continuously Operating Reference Station(Ina-CORS) ionospheric map Rate of TEC change index(ROTI)map
在线阅读 下载PDF
A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks
12
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期1087-1107,共21页
Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive s... Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries.As SDN adoption grows,ensuring efficient recovery from link failures in the data plane becomes crucial.In particular,data center networks(DCNs)demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements.This paper proposes an efficient Decentralized Failure Recovery(DFR)model for SDNs,meeting recovery time requirements and optimizing switch memory resource consumption.The DFR model enables switches to autonomously reroute traffic upon link failures without involving the controller,achieving fast recovery times while minimizing memory usage.DFR employs the Fast Failover Group in the OpenFlow standard for local recovery without requiring controller communication and utilizes the k-shortest path algorithm to proactively install backup paths,allowing immediate local recovery without controller intervention and enhancing overall network stability and scalability.DFR employs flow entry aggregation techniques to reduce switch memory usage.Instead of matching flow entries to the destination host’s MAC address,DFR matches packets to the destination switch’s MAC address.This reduces the switches’Ternary Content-Addressable Memory(TCAM)consumption.Additionally,DFR modifies Address Resolution Protocol(ARP)replies to provide source hosts with the destination switch’s MAC address,facilitating flow entry aggregation without affecting normal network operations.The performance of DFR is evaluated through the network emulator Mininet 2.3.1 and Ryu 3.1 as SDN controller.For different number of active flows,number of hosts per edge switch,and different network sizes,the proposed model outperformed various failure recovery models:restoration-based,protection by flow entries,protection by group entries and protection by Vlan-tagging model in terms of recovery time,switch memory consumption and controller overhead which represented the number of flow entry updates to recover from the failure.Experimental results demonstrate that DFR achieves recovery times under 20 milliseconds,satisfying carrier-grade requirements for rapid failure recovery.Additionally,DFR reduces switch memory usage by up to 95%compared to traditional protection methods and minimizes controller load by eliminating the need for controller intervention during failure recovery.Theresults underscore the efficiency and scalability of the DFR model,making it a practical solution for enhancing network resilience in SDN environments. 展开更多
关键词 Software defined networking failure detection failure recovery RESTORATION protection TCAM size
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
13
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
Global Piecewise Analysis of HIV Model with Bi-Infectious Categories under Ordinary Derivative and Non-Singular Operator with Neural Network Approach
14
作者 Ghaliah Alhamzi Badr Saad TAlkahtani +1 位作者 Ravi Shanker Dubey Mati ur Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期609-633,共25页
This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV i... This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV infection model has a susceptible class,a recovered class,along with a case of infection divided into three sub-different levels or categories and the recovered class.The total time interval is converted into two,which are further investigated for ordinary and fractional order operators of the AB derivative,respectively.The proposed model is tested separately for unique solutions and existence on bi intervals.The numerical solution of the proposed model is treated by the piece-wise numerical iterative scheme of Newtons Polynomial.The proposed method is established for piece-wise derivatives under natural order and non-singular Mittag-Leffler Law.The cross-over or bending characteristics in the dynamical system of HIV are easily examined by the aspect of this research having a memory effect for controlling the said disease.This study uses the neural network(NN)technique to obtain a better set of weights with low residual errors,and the epochs number is considered 1000.The obtained figures represent the approximate solution and absolute error which are tested with NN to train the data accurately. 展开更多
关键词 HIV infection model qualitative scheme approximate solution piecewise global operator neural network
在线阅读 下载PDF
Unlocking the future:Mitochondrial genes and neural networks in predicting ovarian cancer prognosis and immunotherapy response
15
作者 Zhi-Jian Tang Yuan-Ming Pan +2 位作者 Wei Li Rui-Qiong Ma Jian-Liu Wang 《World Journal of Clinical Oncology》 2025年第1期43-52,共10页
BACKGROUND Mitochondrial genes are involved in tumor metabolism in ovarian cancer(OC)and affect immune cell infiltration and treatment responses.AIM To predict prognosis and immunotherapy response in patients diagnose... BACKGROUND Mitochondrial genes are involved in tumor metabolism in ovarian cancer(OC)and affect immune cell infiltration and treatment responses.AIM To predict prognosis and immunotherapy response in patients diagnosed with OC using mitochondrial genes and neural networks.METHODS Prognosis,immunotherapy efficacy,and next-generation sequencing data of patients with OC were downloaded from The Cancer Genome Atlas and Gene Expression Omnibus.Mitochondrial genes were sourced from the MitoCarta3.0 database.The discovery cohort for model construction was created from 70% of the patients,whereas the remaining 30% constituted the validation cohort.Using the expression of mitochondrial genes as the predictor variable and based on neural network algorithm,the overall survival time and immunotherapy efficacy(complete or partial response)of patients were predicted.RESULTS In total,375 patients with OC were included to construct the prognostic model,and 26 patients were included to construct the immune efficacy model.The average area under the receiver operating characteristic curve of the prognostic model was 0.7268[95% confidence interval(CI):0.7258-0.7278]in the discovery cohort and 0.6475(95%CI:0.6466-0.6484)in the validation cohort.The average area under the receiver operating characteristic curve of the immunotherapy efficacy model was 0.9444(95%CI:0.8333-1.0000)in the discovery cohort and 0.9167(95%CI:0.6667-1.0000)in the validation cohort.CONCLUSION The application of mitochondrial genes and neural networks has the potential to predict prognosis and immunotherapy response in patients with OC,providing valuable insights into personalized treatment strategies. 展开更多
关键词 Ovarian cancer MITOCHONDRIA PROGNOSIS IMMUNOTHERAPY Neural network
在线阅读 下载PDF
Reconfiguration and Optimal Positioning of Multiple-Point Capacitors in a High-Voltage Distribution Network Using the NSGAII
16
作者 Arouna Oloulade Richard Gilles Agbokpanzo +6 位作者 Maurel Richy Aza-Gnandji Hassane Ousseyni Ibrahim Moussa Gonda Eméric Tokoudagba Juliano Sétondji François-Xavier Fifatin Adolphe Moukengue Imano 《Open Journal of Applied Sciences》 2025年第2期501-516,共16页
The distribution networks sometimes suffer from excessive losses and voltage violations in densely populated areas. The aim of the present study is to improve the performance of a distribution network by successively ... The distribution networks sometimes suffer from excessive losses and voltage violations in densely populated areas. The aim of the present study is to improve the performance of a distribution network by successively applying mono-capacitor positioning, multiple positioning and reconfiguration processes using GA-based algorithms implemented in a Matlab environment. From the diagnostic study of this network, it was observed that a minimum voltage of 0.90 pu induces a voltage deviation of 5.26%, followed by active and reactive losses of 425.08 kW and 435.09 kVAR, respectively. Single placement with the NSGAII resulted in the placement of a 3000 kVAR capacitor at node 128, which proved to be the invariably neuralgic point. Multiple placements resulted in a 21.55% reduction in losses and a 0.74% regression in voltage profile performance. After topology optimization, the loss profile improved by 65.08% and the voltage profile improved by 1.05%. Genetic algorithms are efficient and effective tools for improving the performance of distribution networks, whose degradation is often dynamic due to the natural variability of loads. 展开更多
关键词 RECONFIGURATION Capacitor Bank NSGA II Dynamic network Degradation Distribution network Reliability
在线阅读 下载PDF
Software Defined Networks: Strengths, Weaknesses, and Resilience to Failures
17
作者 Wendnéso Aïda Ouedraogo Rakissaga Hamidou Harouna Omar Pegdwindé Justin Kouraogo 《Engineering(科研)》 2025年第1期19-29,共11页
This article examines the architecture of software-defined networks (SDN) and its implications for the modern management of communications infrastructures. By decoupling the control plane from the data plane, SDN offe... This article examines the architecture of software-defined networks (SDN) and its implications for the modern management of communications infrastructures. By decoupling the control plane from the data plane, SDN offers increased flexibility and programmability, enabling rapid adaptation to changing user requirements. However, this new approach poses significant challenges in terms of security, fault tolerance, and interoperability. This paper highlights these challenges and explores current strategies to ensure the resilience and reliability of SDN networks in the face of threats and failures. In addition, we analyze the future outlook for SDN and the importance of integrating robust security solutions into these infrastructures. 展开更多
关键词 Software Defined networking (SDN) SDN Architecture Fault Tolerance network Security PROGRAMMABILITY Interoperability Communication Infrastructures
在线阅读 下载PDF
Unraveling the mechanism of action of Shangxia Liangji formula for treating insomnia:a metabolomics and network pharmacology approach
18
作者 Xia-Jie Quan Hao Liang +5 位作者 Yong-Hong Tang Li Jiang Xiong-Ying Ji Feng-Ying Zhang Ping Zhang Bo Ouyang 《Traditional Medicine Research》 2025年第2期16-29,共14页
Background:Insomnia is a prevalent clinical condition and Shangxia Liangji formula(SXLJF)is a well-established method of treatment.Nevertheless,the specific mechanism of action of SXLJF remains unclear.Methods:The mou... Background:Insomnia is a prevalent clinical condition and Shangxia Liangji formula(SXLJF)is a well-established method of treatment.Nevertheless,the specific mechanism of action of SXLJF remains unclear.Methods:The mouse model of insomnia was established by intraperitoneal injection of para-chlorophenylalanine.Forty-two mice were randomly divided into a negative control group,model group,SXLJF group(18.72 g/kg/day),and positive control group(diazepam,2 mg/kg)and treated with the corresponding drugs for 7 consecutive days.The open field test and pentobarbital-induced sleeping test were conducted.LC-MS-based untargeted metabolomics and network pharmacology were applied to explore the potential targets of SXLJF for treating insomnia.Finally,key targets were validated using RT-qPCR.Results:Behavioral tests demonstrated that SXLJF reduced the total distance,average velocity,central distance,and sleep latency,and prolonged sleep duration.Metabolomics and network pharmacology revealed potential targets,signaling pathways,metabolic pathways,and metabolites associated with the anti-insomnia effects of SXLJF.Specifically,tyrosine hydroxylase(TH)and tyrosine metabolism emerged as crucial metabolic pathways and targets,respectively.RT-qPCR results supported the role of TH in the mechanism of SXLJF in treating insomnia.Conclusion:In conclusion,TH and tyrosine metabolism may represent significant targets and pathways for SXLJF in treating insomnia. 展开更多
关键词 Shangxia Liangji formula INSOMNIA metabolomics network pharmacology tyrosine hydroxylase tyrosine metabolism
在线阅读 下载PDF
Learning the parameters of a class of stochastic Lotka-Volterra systems with neural networks
19
作者 WANG Zhanpeng WANG Lijin 《中国科学院大学学报(中英文)》 北大核心 2025年第1期20-25,共6页
In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained f... In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method. 展开更多
关键词 stochastic Lotka-Volterra systems neural networks Euler-Maruyama scheme parameter estimation
在线阅读 下载PDF
IDSSCNN-XgBoost:Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition
20
作者 Adnan Ahmad Zhao Li +1 位作者 Irfan Tariq Zhengran He 《Computers, Materials & Continua》 SCIE EI 2025年第1期729-749,共21页
Micro-expressions(ME)recognition is a complex task that requires advanced techniques to extract informative features fromfacial expressions.Numerous deep neural networks(DNNs)with convolutional structures have been pr... Micro-expressions(ME)recognition is a complex task that requires advanced techniques to extract informative features fromfacial expressions.Numerous deep neural networks(DNNs)with convolutional structures have been proposed.However,unlike DNNs,shallow convolutional neural networks often outperform deeper models in mitigating overfitting,particularly with small datasets.Still,many of these methods rely on a single feature for recognition,resulting in an insufficient ability to extract highly effective features.To address this limitation,in this paper,an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm(IDSSCNN-XgBoost)is introduced for ME Recognition.The proposed method utilizes a dual-stream architecture where motion vectors(temporal features)are extracted using Optical Flow TV-L1 and amplify subtle changes(spatial features)via EulerianVideoMagnification(EVM).These features are processed by IDSSCNN,with an attention mechanism applied to refine the extracted effective features.The outputs are then fused,concatenated,and classified using the XgBoost algorithm.This comprehensive approach significantly improves recognition accuracy by leveraging the strengths of both temporal and spatial information,supported by the robust classification power of XgBoost.The proposed method is evaluated on three publicly available ME databases named Chinese Academy of Sciences Micro-expression Database(CASMEII),Spontaneous Micro-Expression Database(SMICHS),and Spontaneous Actions and Micro-Movements(SAMM).Experimental results indicate that the proposed model can achieve outstanding results compared to recent models.The accuracy results are 79.01%,69.22%,and 68.99%on CASMEII,SMIC-HS,and SAMM,and the F1-score are 75.47%,68.91%,and 63.84%,respectively.The proposed method has the advantage of operational efficiency and less computational time. 展开更多
关键词 ME recognition dual stream shallow convolutional neural network euler video magnification TV-L1 XgBoost
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部