In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained f...In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.展开更多
This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli...This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm.展开更多
Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emp...Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.展开更多
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener...The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.展开更多
Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ...Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.展开更多
Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary a...Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.展开更多
Organic electrochemical transistors have emerged as a solution for artificial synapses that mimic the neural functions of the brain structure,holding great potentials to break the bottleneck of von Neumann architectur...Organic electrochemical transistors have emerged as a solution for artificial synapses that mimic the neural functions of the brain structure,holding great potentials to break the bottleneck of von Neumann architectures.However,current artificial synapses rely primarily on electrical signals,and little attention has been paid to the vital role of neurotransmitter-mediated artificial synapses.Dopamine is a key neurotransmitter associated with emotion regulation and cognitive processes that needs to be monitored in real time to advance the development of disease diagnostics and neuroscience.To provide insights into the development of artificial synapses with neurotransmitter involvement,this review proposes three steps towards future biomimic and bioinspired neuromorphic systems.We first summarize OECT-based dopamine detection devices,and then review advances in neurotransmitter-mediated artificial synapses and resultant advanced neuromorphic systems.Finally,by exploring the challenges and opportunities related to such neuromorphic systems,we provide a perspective on the future development of biomimetic and bioinspired neuromorphic systems.展开更多
In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in ...In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient.展开更多
As the main link of ground engineering,crude oil gathering and transportation systems require huge energy consumption and complex structures.It is necessary to establish an energy efficiency evaluation system for crud...As the main link of ground engineering,crude oil gathering and transportation systems require huge energy consumption and complex structures.It is necessary to establish an energy efficiency evaluation system for crude oil gathering and transportation systems and identify the energy efficiency gaps.In this paper,the energy efficiency evaluation system of the crude oil gathering and transportation system in an oilfield in western China is established.Combined with the big data analysis method,the GA-BP neural network is used to establish the energy efficiency index prediction model for crude oil gathering and transportation systems.The comprehensive energy consumption,gas consumption,power consumption,energy utilization rate,heat utilization rate,and power utilization rate of crude oil gathering and transportation systems are predicted.Considering the efficiency and unit consumption index of the crude oil gathering and transportation system,the energy efficiency evaluation system of the crude oil gathering and transportation system is established based on a game theory combined weighting method and TOPSIS evaluation method,and the subjective weight is determined by the triangular fuzzy analytic hierarchy process.The entropy weight method determines the objective weight,and the combined weight of game theory combines subjectivity with objectivity to comprehensively evaluate the comprehensive energy efficiency of crude oil gathering and transportation systems and their subsystems.Finally,the weak links in energy utilization are identified,and energy conservation and consumption reduction are improved.The above research provides technical support for the green,efficient and intelligent development of crude oil gathering and transportation systems.展开更多
The global Internet is composed of more than 70,000 autonomous domain networks interconnected through the Border Gateway Protocol(BGP).Studying the ecological evolution of BGP network is of great significance for anal...The global Internet is composed of more than 70,000 autonomous domain networks interconnected through the Border Gateway Protocol(BGP).Studying the ecological evolution of BGP network is of great significance for analyzing the evolution trend of the global Internet.This paper focuses on the evolution of Country-Level BGP network ecosystems in 24 years,and innovatively studies the relationship between Country-Level BGP network and economy,breaking through the limitations of traditional research that only focuses on BGP network.The results revealed that the number of global BGP networks has increased by nearly 23 times and that network interconnection has increased nearly 80 times over in 24 years.It was found that the growth of the global BGP network ecosystem has slowed overall due to major global security events,although the BGP network ecosystem in some Southeast Asian countries is developing against the trend.At the same time,there is a significant positive correlation between the BGP network ecology and the national economy in the time dimension;there is a strong positive correlation in the spatial dimension,but the trend is weakening year by year.展开更多
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ...The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.展开更多
The collective Unmanned Weapon System-of-Systems(UWSOS)network represents a fundamental element in modern warfare,characterized by a diverse array of unmanned combat platforms interconnected through hetero-geneous net...The collective Unmanned Weapon System-of-Systems(UWSOS)network represents a fundamental element in modern warfare,characterized by a diverse array of unmanned combat platforms interconnected through hetero-geneous network architectures.Despite its strategic importance,the UWSOS network is highly susceptible to hostile infiltrations,which significantly impede its battlefield recovery capabilities.Existing methods to enhance network resilience predominantly focus on basic graph relationships,neglecting the crucial higher-order dependencies among nodes necessary for capturing multi-hop meta-paths within the UWSOS.To address these limitations,we propose the Enhanced-Resilience Multi-Layer Attention Graph Convolutional Network(E-MAGCN),designed to augment the adaptability of UWSOS.Our approach employs BERT for extracting semantic insights from nodes and edges,thereby refining feature representations by leveraging various node and edge categories.Additionally,E-MAGCN integrates a regularization-based multi-layer attention mechanism and a semantic node fusion algo-rithm within the Graph Convolutional Network(GCN)framework.Through extensive simulation experiments,our model demonstrates an enhancement in resilience performance ranging from 1.2% to 7% over existing algorithms.展开更多
Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of whi...Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of which would induce random network delays.展开更多
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov...We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.展开更多
Shen et al’s retrospective study aims to compare the utility of two separate scoring systems for predicting mortality attributable to gastrointestinal(GI)injury in critically ill patients[the GI Dysfunction Score(GID...Shen et al’s retrospective study aims to compare the utility of two separate scoring systems for predicting mortality attributable to gastrointestinal(GI)injury in critically ill patients[the GI Dysfunction Score(GIDS)and the Acute Gastroin-testinal Injury(AGI)grade].The authors note that this study is the first proposal that suggests an equivalence between the ability of both scores to predict mor-tality at 28 days from intensive care unit(ICU)admission.Shen et al retrospec-tively analysed an ICU cohort of patients utilising two physicians administering both the AGI grade and GIDS score,using electronic healthcare records and ICU flowsheets.Where these physicians disagreed about the scores,the final decision as to the scores was made by an associate chief physician,or chief physician.We note that the primary reason for the development of GIDS was to create a clear score for GI dysfunction,with minimal subjectivity or inter-operator variability.The subjectivity inherent to the older AGI grading system is what ultimately led to the development of GIDS in 2021.By ensuring consensus between physicians administering the AGI,Shen et al have controlled for one of this grading systems biggest issues.We have concerns,however,that this does not represent the real-world challenges associated with applying the AGI compared to the newer GIDS,and wonder if this arbitration process had not been instituted,would the two scoring systems remain equivalent in terms of predicted mortality?展开更多
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes...The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.展开更多
With the ability to harness the power of big data,the digital twin(DT)technology has been increasingly applied to the modeling and management of structures and infrastructure systems,such as buildings,bridges,and powe...With the ability to harness the power of big data,the digital twin(DT)technology has been increasingly applied to the modeling and management of structures and infrastructure systems,such as buildings,bridges,and power distribution systems.Supporting these applications,an important family of methods are based on graphs.For DT applications in modeling and managing smart cities,large-scale knowledge graphs(KGs)are necessary to represent the complex interdependencies and model the urban infrastructure as a system of systems.To this end,this paper develops a conceptual framework:Automated knowledge Graphs for Complex Systems(AutoGraCS).In contrast to existing KGs developed for DTs,AutoGraCS can support KGs to account for interdependencies and statistical correlations across complex systems.The established KGs from AutoGraCS can then be easily turned into Bayesian networks for probabilistic modeling,Bayesian analysis,and adaptive decision supports.Besides,AutoGraCS provides flexibility in support of users’need to implement the ontology and rules when constructing the KG.With the user-defined ontology and rules,AutoGraCS can automatically generate a KG to represent a complex system consisting of multiple systems.The bridge network in Miami-Dade County,FL is used as an illustrative example to generate a KG that integrates multiple layers of data from the bridge network,traffic monitoring facilities,and flood water watch stations.展开更多
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication...This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.展开更多
In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical in...In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.展开更多
According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was d...According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was developed using principles from complex network theory.The vulnerability and risk level of each edge in this model were calculated,and high-risk edges and disaster chains were identified.The analysis reveals that the edge“floods→building collapses”has the highest vulnerability.Implementing measures to mitigate this edge is crucial for delaying the spread of secondary disasters.The highest risk is associated with the edge“building collapses→casualties,”and increased risks are also identified for chains such as“earthquake→building collapses→casualties,”“earthquake→landslides and debris flows→dammed lakes,”and“dammed lakes→floods→building collapses.”Following an earthquake,the prompt implementation of measures is crucial to effectively disrupt these chains and minimize the damage from secondary disasters.展开更多
基金Supported by the National Natural Science Foundation of China(11971458,11471310)。
文摘In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.
基金the National Natural Science Foundation of China(62203356)Fundamental Research Funds for the Central Universities of China(31020210502002)。
文摘This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm.
文摘Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.
文摘The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.
基金This work was supported by the Kyonggi University Research Grant 2022.
文摘Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.
基金supported by the National Natural Science Foundation of China(Grant No.82270892)Natural Science Foundation of Hubei Province(Grant No.2022CFB287)+2 种基金Xianning City Science and Technology Plan Project(Grant No.2022ZRKX052)School projects of Hubei University of Science and Technology(Grant No.2022T01,2021WG05,2021TNB01)Hubei University of Science and Technology School-level Fund(Grant No.BK202122).
文摘Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.
基金supported by the National Natural Science Foundation of China(Grant No.62074163)Beijing Natural Science Foundation(Grant No.JQ24030).
文摘Organic electrochemical transistors have emerged as a solution for artificial synapses that mimic the neural functions of the brain structure,holding great potentials to break the bottleneck of von Neumann architectures.However,current artificial synapses rely primarily on electrical signals,and little attention has been paid to the vital role of neurotransmitter-mediated artificial synapses.Dopamine is a key neurotransmitter associated with emotion regulation and cognitive processes that needs to be monitored in real time to advance the development of disease diagnostics and neuroscience.To provide insights into the development of artificial synapses with neurotransmitter involvement,this review proposes three steps towards future biomimic and bioinspired neuromorphic systems.We first summarize OECT-based dopamine detection devices,and then review advances in neurotransmitter-mediated artificial synapses and resultant advanced neuromorphic systems.Finally,by exploring the challenges and opportunities related to such neuromorphic systems,we provide a perspective on the future development of biomimetic and bioinspired neuromorphic systems.
基金supported in part by the Korea Research Institute for Defense Technology Planning and Advancement(KRIT)funded by the Korean Government’s Defense Acquisition Program Administration(DAPA)under Grant KRIT-CT-21-037in part by the Ministry of Education,Republic of Koreain part by the National Research Foundation of Korea under Grant RS-2023-00211871.
文摘In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient.
基金This work was financially supported by the National Natural Science Foundation of China(52074089 and 52104064)Natural Science Foundation of Heilongjiang Province of China(LH2019E019).
文摘As the main link of ground engineering,crude oil gathering and transportation systems require huge energy consumption and complex structures.It is necessary to establish an energy efficiency evaluation system for crude oil gathering and transportation systems and identify the energy efficiency gaps.In this paper,the energy efficiency evaluation system of the crude oil gathering and transportation system in an oilfield in western China is established.Combined with the big data analysis method,the GA-BP neural network is used to establish the energy efficiency index prediction model for crude oil gathering and transportation systems.The comprehensive energy consumption,gas consumption,power consumption,energy utilization rate,heat utilization rate,and power utilization rate of crude oil gathering and transportation systems are predicted.Considering the efficiency and unit consumption index of the crude oil gathering and transportation system,the energy efficiency evaluation system of the crude oil gathering and transportation system is established based on a game theory combined weighting method and TOPSIS evaluation method,and the subjective weight is determined by the triangular fuzzy analytic hierarchy process.The entropy weight method determines the objective weight,and the combined weight of game theory combines subjectivity with objectivity to comprehensively evaluate the comprehensive energy efficiency of crude oil gathering and transportation systems and their subsystems.Finally,the weak links in energy utilization are identified,and energy conservation and consumption reduction are improved.The above research provides technical support for the green,efficient and intelligent development of crude oil gathering and transportation systems.
文摘The global Internet is composed of more than 70,000 autonomous domain networks interconnected through the Border Gateway Protocol(BGP).Studying the ecological evolution of BGP network is of great significance for analyzing the evolution trend of the global Internet.This paper focuses on the evolution of Country-Level BGP network ecosystems in 24 years,and innovatively studies the relationship between Country-Level BGP network and economy,breaking through the limitations of traditional research that only focuses on BGP network.The results revealed that the number of global BGP networks has increased by nearly 23 times and that network interconnection has increased nearly 80 times over in 24 years.It was found that the growth of the global BGP network ecosystem has slowed overall due to major global security events,although the BGP network ecosystem in some Southeast Asian countries is developing against the trend.At the same time,there is a significant positive correlation between the BGP network ecology and the national economy in the time dimension;there is a strong positive correlation in the spatial dimension,but the trend is weakening year by year.
基金extend their appreciation to Researcher Supporting Project Number(RSPD2023R582)King Saud University,Riyadh,Saudi Arabia.
文摘The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.
基金This research was supported by the Key Research and Development Program of Shaanxi Province(2024GX-YBXM-010)the National Science Foundation of China(61972302).
文摘The collective Unmanned Weapon System-of-Systems(UWSOS)network represents a fundamental element in modern warfare,characterized by a diverse array of unmanned combat platforms interconnected through hetero-geneous network architectures.Despite its strategic importance,the UWSOS network is highly susceptible to hostile infiltrations,which significantly impede its battlefield recovery capabilities.Existing methods to enhance network resilience predominantly focus on basic graph relationships,neglecting the crucial higher-order dependencies among nodes necessary for capturing multi-hop meta-paths within the UWSOS.To address these limitations,we propose the Enhanced-Resilience Multi-Layer Attention Graph Convolutional Network(E-MAGCN),designed to augment the adaptability of UWSOS.Our approach employs BERT for extracting semantic insights from nodes and edges,thereby refining feature representations by leveraging various node and edge categories.Additionally,E-MAGCN integrates a regularization-based multi-layer attention mechanism and a semantic node fusion algo-rithm within the Graph Convolutional Network(GCN)framework.Through extensive simulation experiments,our model demonstrates an enhancement in resilience performance ranging from 1.2% to 7% over existing algorithms.
基金supported by the National Natural Science Foundation of China(62173002,62403010,52301408)the Beijing Natural Science Foundation(4222045)+1 种基金the Yuxiu Innovation Project of North China University of Technology(2024NC UTYXCX111)the China Postdoctoral Science Foundation(2024M750192)。
文摘Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of which would induce random network delays.
基金Project supported by the National Natural Science Foundation of China (Grant No.62073045)。
文摘We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.
文摘Shen et al’s retrospective study aims to compare the utility of two separate scoring systems for predicting mortality attributable to gastrointestinal(GI)injury in critically ill patients[the GI Dysfunction Score(GIDS)and the Acute Gastroin-testinal Injury(AGI)grade].The authors note that this study is the first proposal that suggests an equivalence between the ability of both scores to predict mor-tality at 28 days from intensive care unit(ICU)admission.Shen et al retrospec-tively analysed an ICU cohort of patients utilising two physicians administering both the AGI grade and GIDS score,using electronic healthcare records and ICU flowsheets.Where these physicians disagreed about the scores,the final decision as to the scores was made by an associate chief physician,or chief physician.We note that the primary reason for the development of GIDS was to create a clear score for GI dysfunction,with minimal subjectivity or inter-operator variability.The subjectivity inherent to the older AGI grading system is what ultimately led to the development of GIDS in 2021.By ensuring consensus between physicians administering the AGI,Shen et al have controlled for one of this grading systems biggest issues.We have concerns,however,that this does not represent the real-world challenges associated with applying the AGI compared to the newer GIDS,and wonder if this arbitration process had not been instituted,would the two scoring systems remain equivalent in terms of predicted mortality?
基金funded by Taif University,Taif,Saudi Arabia,Project No.(TUDSPP-2024-139).
文摘The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.
基金support received from US Department of Transportation Tier 1 University Transportation Center CREATE Award No.69A3552348330.
文摘With the ability to harness the power of big data,the digital twin(DT)technology has been increasingly applied to the modeling and management of structures and infrastructure systems,such as buildings,bridges,and power distribution systems.Supporting these applications,an important family of methods are based on graphs.For DT applications in modeling and managing smart cities,large-scale knowledge graphs(KGs)are necessary to represent the complex interdependencies and model the urban infrastructure as a system of systems.To this end,this paper develops a conceptual framework:Automated knowledge Graphs for Complex Systems(AutoGraCS).In contrast to existing KGs developed for DTs,AutoGraCS can support KGs to account for interdependencies and statistical correlations across complex systems.The established KGs from AutoGraCS can then be easily turned into Bayesian networks for probabilistic modeling,Bayesian analysis,and adaptive decision supports.Besides,AutoGraCS provides flexibility in support of users’need to implement the ontology and rules when constructing the KG.With the user-defined ontology and rules,AutoGraCS can automatically generate a KG to represent a complex system consisting of multiple systems.The bridge network in Miami-Dade County,FL is used as an illustrative example to generate a KG that integrates multiple layers of data from the bridge network,traffic monitoring facilities,and flood water watch stations.
基金supported in part by the National Natural Science Foundation of China (61933007,62273087,U22A2044,61973102,62073180)the Shanghai Pujiang Program of China (22PJ1400400)+1 种基金the Royal Society of the UKthe Alexander von Humboldt Foundation of Germany。
文摘This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.
基金supported in part by the National Natural Science Foundation of China(62073003,72131001)Hong Hong Research Grants Council under GRF grants(16200619,16201120,16205421,1620-3922)Shenzhen-Hong Kong-Macao Science and Technology Innovation Fund(SGDX20201103094600006)。
文摘In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.
基金National Key Research and Development Program of China(No.2022YFC3803000).
文摘According to news reports on severe earthquakes since 2008,a total of 51 cases with magnitudes of 6.0 or above were analyzed,and 14 frequently occurring secondary disasters were identified.A disaster chain model was developed using principles from complex network theory.The vulnerability and risk level of each edge in this model were calculated,and high-risk edges and disaster chains were identified.The analysis reveals that the edge“floods→building collapses”has the highest vulnerability.Implementing measures to mitigate this edge is crucial for delaying the spread of secondary disasters.The highest risk is associated with the edge“building collapses→casualties,”and increased risks are also identified for chains such as“earthquake→building collapses→casualties,”“earthquake→landslides and debris flows→dammed lakes,”and“dammed lakes→floods→building collapses.”Following an earthquake,the prompt implementation of measures is crucial to effectively disrupt these chains and minimize the damage from secondary disasters.