期刊文献+
共找到326,526篇文章
< 1 2 250 >
每页显示 20 50 100
Neonatal ketamine exposure-induced hippocampal neuroapoptosis in the developing brain impairs adult spatial learning ability 被引量:7
1
作者 Dan Lyu Ning Tang +2 位作者 Andrew W. Womack Yong-Jin He Qing Lin 《Neural Regeneration Research》 SCIE CAS CSCD 2020年第5期880-886,共7页
Ketamine exposure can lead to selective neuroapoptosis in the developing brain.p66ShcA,the cellular adapter protein expressed selectively in immature neurons,is a known pro-apoptotic molecule that triggers neuroapopto... Ketamine exposure can lead to selective neuroapoptosis in the developing brain.p66ShcA,the cellular adapter protein expressed selectively in immature neurons,is a known pro-apoptotic molecule that triggers neuroapoptosis when activated.Sprague-Dawley rats at postnatal day 7 were subcutaneously injected in the neck with ketamine 20 mg/kg,six times at 2-hour intervals.At 0,1,3,and 6 hours after final injection,western blot assay was used to detect the expression of cleaved caspase-3,p66ShcA,and phosphorylated p66ShcA.We found that the expression of activated p66ShcA and caspase-3 increased after ketamine exposure and peaked at 3 hours.The same procedure was performed on a different group of rats.At the age of 4 weeks,spatial learning and memory abilities were tested with the Morris water maze.Latency to find the hidden platform for these rats was longer than it was for control rats,although the residence time in the target quadrant was similar.These findings indicate that ketamine exposure resulted in p66ShcA being activated in the course of an apoptotic cascade during the neonatal period.This may have contributed to the deficit in spatial learning and memory that persisted into adulthood.The experimental protocol was approved by the Institutional Animal Care and Use Committee at the University of Texas at Arlington,USA (approval No.A13.008) on January 22,2013. 展开更多
关键词 caspase-3 DEVELOPMENTAL neuroapoptosis hippocampus KETAMINE MORRIS water MAZE N-METHYL-D-ASPARTATE acid receptors p66ShcA SPATIAL learning
下载PDF
Astrocytic endothelin-1 overexpression impairs learning and memory ability in ischemic stroke via altered hippocampal neurogenesis and lipid metabolism 被引量:5
2
作者 Jie Li Wen Jiang +9 位作者 Yuefang Cai Zhenqiu Ning Yingying Zhou Chengyi Wang Sookja Ki Chung Yan Huang Jingbo Sun Minzhen Deng Lihua Zhou Xiao Cheng 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第3期650-656,共7页
Vascular etiology is the second most prevalent cause of cognitive impairment globally.Endothelin-1,which is produced and secreted by endothelial cells and astrocytes,is implicated in the pathogenesis of stroke.However... Vascular etiology is the second most prevalent cause of cognitive impairment globally.Endothelin-1,which is produced and secreted by endothelial cells and astrocytes,is implicated in the pathogenesis of stroke.However,the way in which changes in astrocytic endothelin-1 lead to poststroke cognitive deficits following transient middle cerebral artery occlusion is not well understood.Here,using mice in which astrocytic endothelin-1 was overexpressed,we found that the selective overexpression of endothelin-1 by astrocytic cells led to ischemic stroke-related dementia(1 hour of ischemia;7 days,28 days,or 3 months of reperfusion).We also revealed that astrocytic endothelin-1 overexpression contributed to the role of neural stem cell proliferation but impaired neurogenesis in the dentate gyrus of the hippocampus after middle cerebral artery occlusion.Comprehensive proteome profiles and western blot analysis confirmed that levels of glial fibrillary acidic protein and peroxiredoxin 6,which were differentially expressed in the brain,were significantly increased in mice with astrocytic endothelin-1 overexpression in comparison with wild-type mice 28 days after ischemic stroke.Moreover,the levels of the enriched differentially expressed proteins were closely related to lipid metabolism,as indicated by Kyoto Encyclopedia of Genes and Genomes pathway analysis.Liquid chromatography-mass spectrometry nontargeted metabolite profiling of brain tissues showed that astrocytic endothelin-1 overexpression altered lipid metabolism products such as glycerol phosphatidylcholine,sphingomyelin,and phosphatidic acid.Overall,this study demonstrates that astrocytic endothelin-1 overexpression can impair hippocampal neurogenesis and that it is correlated with lipid metabolism in poststroke cognitive dysfunction. 展开更多
关键词 astrocytic endothelin-1 dentate gyrus differentially expressed proteins HIPPOCAMPUS ischemic stroke learning and memory deficits lipid metabolism neural stem cells NEUROGENESIS proliferation
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
4
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active learning Adversarial learning Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber Security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised learning Sequence Analysis Statistical learning Transduction
下载PDF
A Whale Optimization Algorithm with Distributed Collaboration and Reverse Learning Ability 被引量:2
5
作者 Zhedong Xu Yongbo Su +1 位作者 Fang Yang Ming Zhang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5965-5986,共22页
Due to the development of digital transformation,intelligent algorithms are getting more and more attention.The whale optimization algorithm(WOA)is one of swarm intelligence optimization algorithms and is widely used ... Due to the development of digital transformation,intelligent algorithms are getting more and more attention.The whale optimization algorithm(WOA)is one of swarm intelligence optimization algorithms and is widely used to solve practical engineering optimization problems.However,with the increased dimensions,higher requirements are put forward for algorithm performance.The double population whale optimization algorithm with distributed collaboration and reverse learning ability(DCRWOA)is proposed to solve the slow convergence speed and unstable search accuracy of the WOA algorithm in optimization problems.In the DCRWOA algorithm,the novel double population search strategy is constructed.Meanwhile,the reverse learning strategy is adopted in the population search process to help individuals quickly jump out of the non-ideal search area.Numerical experi-ments are carried out using standard test functions with different dimensions(10,50,100,200).The optimization case of shield construction parameters is also used to test the practical application performance of the proposed algo-rithm.The results show that the DCRWOA algorithm has higher optimization accuracy and stability,and the convergence speed is significantly improved.Therefore,the proposed DCRWOA algorithm provides a better method for solving practical optimization problems. 展开更多
关键词 Whale optimization algorithm double population cooperation DISTRIBUTION reverse learning convergence speed
下载PDF
DEBRA: On the Unsupervised Learning of Concept Hierarchies from (Literary) Text
6
作者 Peter J. Worth Domagoj Doresic 《International Journal of Intelligence Science》 2023年第4期81-130,共50页
With this work, we introduce a novel method for the unsupervised learning of conceptual hierarchies, or concept maps as they are sometimes called, which is aimed specifically for use with literary texts, as such disti... With this work, we introduce a novel method for the unsupervised learning of conceptual hierarchies, or concept maps as they are sometimes called, which is aimed specifically for use with literary texts, as such distinguishing itself from the majority of research literature on the topic which is primarily focused on building ontologies from a vast array of different types of data sources, both structured and unstructured, to support various forms of AI, in particular, the Semantic Web as envisioned by Tim Berners-Lee. We first elaborate on mutually informing disciplines of philosophy and computer science, or more specifically the relationship between metaphysics, epistemology, ontology, computing and AI, followed by a technically in-depth discussion of DEBRA, our dependency tree based concept hierarchy constructor, which as its name alludes to, constructs a conceptual map in the form of a directed graph which illustrates the concepts, their respective relations, and the implied ontological structure of the concepts as encoded in the text, decoded with standard Python NLP libraries such as spaCy and NLTK. With this work we hope to both augment the Knowledge Representation literature with opportunities for intellectual advancement in AI with more intuitive, less analytical, and well-known forms of knowledge representation from the cognitive science community, as well as open up new areas of research between Computer Science and the Humanities with respect to the application of the latest in NLP tools and techniques upon literature of cultural significance, shedding light on existing methods of computation with respect to documents in semantic space that effectively allows for, at the very least, the comparison and evolution of texts through time, using vector space math. 展开更多
关键词 Ontology learning Ontology Engineering Concept Hierarchies Concept Mapping Concept Maps Artificial Intelligence PHILOSOPHY Natural Language Processing Knowledge Representation Knowledge Representation and Reasoning Machine learning Natural Language Processing NLP Computer Science Theoretical Computer Science EPISTEMOLOGY METAPHYSICS PHILOSOPHY Logic Computing Ontology First Order Logic Predicate Calculus
下载PDF
Oral English Autonomous Learning Ability of English Majors Under the Background of the Internet and Its Improvement
7
作者 Xiaohong Zhu 《Journal of Contemporary Educational Research》 2023年第10期166-172,共7页
The Internet is an important means of communication for contemporary college students,especially those majoring in English,to acquire knowledge about information and improve their oral proficiency.However,research on ... The Internet is an important means of communication for contemporary college students,especially those majoring in English,to acquire knowledge about information and improve their oral proficiency.However,research on the relevant oral English autonomous learning ability of English majors shows that the overall learning situation is not satisfying.Based on the development of the concept of autonomous learning,this article explores the current situation and existing problems in oral English autonomous learning of English majors under the context of the Internet,and proposes corresponding autonomous learning strategies for improving their oral English skill. 展开更多
关键词 Oral English Autonomous learning ability INTERNET English majors
下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
8
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
下载PDF
Semantic model and optimization of creative processes at mathematical knowledge formation
9
作者 Victor Egorovitch Firstov 《Natural Science》 2010年第8期915-922,共8页
The aim of this work is mathematical education through the knowledge system and mathematical modeling. A net model of formation of mathematical knowledge as a deductive theory is suggested here. Within this model the ... The aim of this work is mathematical education through the knowledge system and mathematical modeling. A net model of formation of mathematical knowledge as a deductive theory is suggested here. Within this model the formation of deductive theory is represented as the development of a certain informational space, the elements of which are structured in the form of the orientated semantic net. This net is properly metrized and characterized by a certain system of coverings. It allows injecting net optimization parameters, regulating qualitative aspects of knowledge system under consideration. To regulate the creative processes of the formation and realization of mathematical know- edge, stochastic model of formation deductive theory is suggested here in the form of branching Markovian process, which is realized in the corresponding informational space as a semantic net. According to this stochastic model we can get correct foundation of criterion of optimization creative processes that leads to “great main points” strategy (GMP-strategy) in the process of realization of the effective control in the research work in the sphere of mathematics and its applications. 展开更多
关键词 The Cybernetic Conception Optimization of CONTROL Quantitative And Qualitative Information Measures Modelling Intellectual Systems Neural Network MATHEMATICAL Education The CONTROL of Pedagogical PROCESSES CREATIVE Pedagogics Cognitive And CREATIVE PROCESSES Informal Axiomatic Thery SEMANTIC NET NET Optimization Parameters The Topology of SEMANTIC NET Metrization The System of Coverings Stochastic Model of CREATIVE PROCESSES At The Formation of MATHEMATICAL Knowledge Branching Markovian Process Great Main Points Strategy (GMP-Strategy) of The CREATIVE PROCESSES CONTROL Interdisciplinary learning: Colorimetric Barycenter
下载PDF
The effect of self-observation on the self-directed learning ability of nursing students: An experimental study 被引量:1
10
作者 Dong-Hee Kim 《Open Journal of Nursing》 2013年第8期517-523,共7页
Background: Patients expect nurses to be both technically competent and psychosocially skilled. Enhancing the quality of patient care and patient safety in healthcare settings has increased, resulting in limited oppor... Background: Patients expect nurses to be both technically competent and psychosocially skilled. Enhancing the quality of patient care and patient safety in healthcare settings has increased, resulting in limited opportunities for students to practice clinical skills in healthcare settings. Achieving competence in these skills is viewed as an essential task to be completed during the school curriculum. Objective: The purpose of this study was to evaluate the use of self-observation through cellular recordings as an adjunct to the clinical skills teaching of a blood sugar test to undergraduate nursing. Design: The research design consisted of pre- and post-test consecutive experimental design through a control group. Settings: This study targeted nursing students enrolled in baccalaureate programs running in Korea. Participant: The participants were 64 students including 34 for the experimental group and 30 for the control group. Methods: Those in the control group received standard teaching methods using lectures and skills classes and facilitated the use of self-study methods. Those in the experimental group received standard teaching using lectures and skills classes and facilitated use of cell phone recorded self-observation. The self-confidence of practicing a blood sugar test, satisfaction with the learning method, self-study participation, level of interest in nursing practice, and self-directed learning ability were measured using questionnaires. Results: Significant between-groups differences were detected in self-confidence of practicing a blood sugar test (t = 2.067, p = 0.043), satisfaction with the learning method (t = 2.818, p = 0.044), self-study participation (χ2 = 7.635, p = 0.022), and average self-directed learning ability (t = 3.202, p = 0.002). Conclusions: Self-observation through cellular phone recordings is an effective learning method as an adjunct to teach clinical skills. 展开更多
关键词 Cellular PHONE ANIMATION SELF-CONFIDENCE SATISFACTION learning NURSING SKILL
下载PDF
The Evil of ‘Reciting’
11
作者 邢蓓蓓 《科技经济市场》 2007年第8期41-42,共2页
  First of all it is necessary to point out that 'reciting' is the wrong term for what Chinese students are often asked to do when they are learning English. The correct terms are, 'learning by heart'...   First of all it is necessary to point out that 'reciting' is the wrong term for what Chinese students are often asked to do when they are learning English. The correct terms are, 'learning by heart' or 'rote learning'. In this article the term 'rote learning' will be used.…… 展开更多
关键词 ROTE learning language learning First of all it IS necessary to point out that 'reciting' IS the WRONG TERM for what Chinese students ARE often asked to do when they ARE learning English. The correct terms are 'learning by heart' or 'rote learning'. In this article the TERM 'rote learning' will be used.
下载PDF
Evaluation of Technical Education by Using a Modern Structured MOODLE Laboratory Course, in Relation to Recent Data
12
作者 Gerasimos Vlassopoulos George Albert Karikas +4 位作者 Efstathia Papageorgiou Ioannis Psaromiligkos Niki Giannouli Pigi Vlassopoulou Petros Karkalousos 《Journal of Intelligent Learning Systems and Applications》 2024年第3期316-339,共24页
E-learning platforms support education systems worldwide, transferring theoretical knowledge as well as soft skills. In the present study high-school pupils’, and adult students’ opinions were evaluated through a mo... E-learning platforms support education systems worldwide, transferring theoretical knowledge as well as soft skills. In the present study high-school pupils’, and adult students’ opinions were evaluated through a modern structured MOODLE interactive course, designed for the needs of the laboratory course “Automotive Systems”. The study concerns Greek secondary vocational education pupils aged 18 and vocational training adult students aged 20 to 50 years. The multistage, equal size simple random cluster sample was used as a sampling method. Pupils and adult students of each cluster completed structured 10-question questionnaires both before and after attending the course. A total of 120 questionnaires were collected. In general, our findings disclosed that the majority of pupils and adult students had significantly improved their knowledge and skills from using MOODLE. They reported strengthening conventional teaching, using the new MOODLE technology. The satisfaction indices improved quite, with the differences in their mean values being statistically significant. 展开更多
关键词 Information and Communication Technologies (ICT) Distance learning E-learning Students Opinions Education in Greece I.C.T. in Greece STUDENTS Pupils Adults Adult Students MOODLE MOOC (V.H.S.) Vocational High Schools (S.H.V.T.) Schools of Higher Vocational Training VOCATIONAL Profession Interactive Lessons Courses Training Laboratory Course Secondary Education Automotive Systems Car Systems
下载PDF
A Novel Hybrid Ensemble Learning Approach for Enhancing Accuracy and Sustainability in Wind Power Forecasting
13
作者 Farhan Ullah Xuexia Zhang +2 位作者 Mansoor Khan Muhammad Abid Abdullah Mohamed 《Computers, Materials & Continua》 SCIE EI 2024年第5期3373-3395,共23页
Accurate wind power forecasting is critical for system integration and stability as renewable energy reliance grows.Traditional approaches frequently struggle with complex data and non-linear connections. This article... Accurate wind power forecasting is critical for system integration and stability as renewable energy reliance grows.Traditional approaches frequently struggle with complex data and non-linear connections. This article presentsa novel approach for hybrid ensemble learning that is based on rigorous requirements engineering concepts.The approach finds significant parameters influencing forecasting accuracy by evaluating real-time Modern-EraRetrospective Analysis for Research and Applications (MERRA2) data from several European Wind farms usingin-depth stakeholder research and requirements elicitation. Ensemble learning is used to develop a robust model,while a temporal convolutional network handles time-series complexities and data gaps. The ensemble-temporalneural network is enhanced by providing different input parameters including training layers, hidden and dropoutlayers along with activation and loss functions. The proposed framework is further analyzed by comparing stateof-the-art forecasting models in terms of Root Mean Squared Error (RMSE) and Mean Absolute Error (MAE),respectively. The energy efficiency performance indicators showed that the proposed model demonstrates errorreduction percentages of approximately 16.67%, 28.57%, and 81.92% for MAE, and 38.46%, 17.65%, and 90.78%for RMSE for MERRAWind farms 1, 2, and 3, respectively, compared to other existingmethods. These quantitativeresults show the effectiveness of our proposed model with MAE values ranging from 0.0010 to 0.0156 and RMSEvalues ranging from 0.0014 to 0.0174. This work highlights the effectiveness of requirements engineering in windpower forecasting, leading to enhanced forecast accuracy and grid stability, ultimately paving the way for moresustainable energy solutions. 展开更多
关键词 Ensemble learning machine learning real-time data analysis stakeholder analysis temporal convolutional network wind power forecasting
下载PDF
Extensive identification of landslide boundaries using remote sensing images and deep learning method
14
作者 Chang-dong Li Peng-fei Feng +3 位作者 Xi-hui Jiang Shuang Zhang Jie Meng Bing-chen Li 《China Geology》 CAS CSCD 2024年第2期277-290,共14页
The frequent occurrence of extreme weather events has rendered numerous landslides to a global natural disaster issue.It is crucial to rapidly and accurately determine the boundaries of landslides for geohazards evalu... The frequent occurrence of extreme weather events has rendered numerous landslides to a global natural disaster issue.It is crucial to rapidly and accurately determine the boundaries of landslides for geohazards evaluation and emergency response.Therefore,the Skip Connection DeepLab neural network(SCDnn),a deep learning model based on 770 optical remote sensing images of landslide,is proposed to improve the accuracy of landslide boundary detection.The SCDnn model is optimized for the over-segmentation issue which occurs in conventional deep learning models when there is a significant degree of similarity between topographical geomorphic features.SCDnn exhibits notable improvements in landslide feature extraction and semantic segmentation by combining an enhanced Atrous Spatial Pyramid Convolutional Block(ASPC)with a coding structure that reduces model complexity.The experimental results demonstrate that SCDnn can identify landslide boundaries in 119 images with MIoU values between 0.8and 0.9;while 52 images with MIoU values exceeding 0.9,which exceeds the identification accuracy of existing techniques.This work can offer a novel technique for the automatic extensive identification of landslide boundaries in remote sensing images in addition to establishing the groundwork for future inve stigations and applications in related domains. 展开更多
关键词 GEOHAZARD Landslide boundary detection Remote sensing image Deep learning model Steep slope Large annual rainfall Human settlements INFRASTRUCTURE Agricultural land Eastern Tibetan Plateau Geological hazards survey engineering
下载PDF
Recent Progress in Reinforcement Learning and Adaptive Dynamic Programming for Advanced Control Applications 被引量:4
15
作者 Ding Wang Ning Gao +2 位作者 Derong Liu Jinna Li Frank L.Lewis 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期18-36,共19页
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ... Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence. 展开更多
关键词 Adaptive dynamic programming(ADP) advanced control complex environment data-driven control event-triggered design intelligent control neural networks nonlinear systems optimal control reinforcement learning(RL)
下载PDF
Cultivation and Improvement of Autonomous Learning Ability
16
作者 Jie ZHU Ping CHEN Wenjun JIA 《Asian Agricultural Research》 2019年第5期107-110,共4页
In the age of network information,autonomous learning has become an important way of learning. Improving autonomous learning ability will help to cultivate students’ autonomous learning habits,innovation consciousnes... In the age of network information,autonomous learning has become an important way of learning. Improving autonomous learning ability will help to cultivate students’ autonomous learning habits,innovation consciousness and practical ability. This paper analyzes the development,characteristic connotation,advantages and current status of autonomous learning and puts forward strategies for cultivating college students’ autonomous learning ability. This paper is of guiding significance for enhancing learners’ awareness of autonomous learning,developing learners’ autonomous learning strategies and methods and improving learners’ autonomous learning ability,and it will lay a foundation for cultivating students’ lifelong learning consciousness. 展开更多
关键词 AUTONOMOUS learning Development STATUS STRATEGIES Network RESOURCES
下载PDF
TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection
17
作者 Isha Sood Varsha Sharm 《Computers, Materials & Continua》 SCIE EI 2024年第11期2791-2818,共28页
Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations ... Ransomware has emerged as a critical cybersecurity threat,characterized by its ability to encrypt user data or lock devices,demanding ransom for their release.Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases,rendering them less effective against evolving ransomware families.This paper introduces TLERAD(Transfer Learning for Enhanced Ransomware Attack Detection),a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains,enabling robust detection of both known and unknown ransomware variants.The proposed method achieves high detection accuracy,with an AUC of 0.98 for known ransomware and 0.93 for unknown ransomware,significantly outperforming baseline methods.Comprehensive experiments demonstrate TLERAD’s effectiveness in real-world scenarios,highlighting its adapt-ability to the rapidly evolving ransomware landscape.The paper also discusses future directions for enhancing TLERAD,including real-time adaptation,integration with lightweight and post-quantum cryptography,and the incorporation of explainable AI techniques. 展开更多
关键词 Ransomware detection transfer learning unsupervised learning CO-CLUSTERING CYBERSECURITY machine learning lightweight cryptography post-quantum cryptography explainable AI TLERAD
下载PDF
THAPE: A Tunable Hybrid Associative Predictive Engine Approach for Enhancing Rule Interpretability in Association Rule Learning for the Retail Sector
18
作者 Monerah Alawadh Ahmed Barnawi 《Computers, Materials & Continua》 SCIE EI 2024年第6期4995-5015,共21页
Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only f... Association rule learning(ARL)is a widely used technique for discovering relationships within datasets.However,it often generates excessive irrelevant or ambiguous rules.Therefore,post-processing is crucial not only for removing irrelevant or redundant rules but also for uncovering hidden associations that impact other factors.Recently,several post-processing methods have been proposed,each with its own strengths and weaknesses.In this paper,we propose THAPE(Tunable Hybrid Associative Predictive Engine),which combines descriptive and predictive techniques.By leveraging both techniques,our aim is to enhance the quality of analyzing generated rules.This includes removing irrelevant or redundant rules,uncovering interesting and useful rules,exploring hidden association rules that may affect other factors,and providing backtracking ability for a given product.The proposed approach offers a tailored method that suits specific goals for retailers,enabling them to gain a better understanding of customer behavior based on factual transactions in the target market.We applied THAPE to a real dataset as a case study in this paper to demonstrate its effectiveness.Through this application,we successfully mined a concise set of highly interesting and useful association rules.Out of the 11,265 rules generated,we identified 125 rules that are particularly relevant to the business context.These identified rules significantly improve the interpretability and usefulness of association rules for decision-making purposes. 展开更多
关键词 Association rule learning POST-PROCESSING PREDICTIVE machine learning rule interpretability
下载PDF
Enhancing constitutive description and workability characterization of Mg alloy during hot deformation using machine learning-based Arrhenius-type model
19
作者 Jinchuan Long Lei Deng +6 位作者 Junsong Jin Mao Zhang Xuefeng Tang Pan Gong Xinyun Wang Gangfeng Xiao Qinxiang Xia 《Journal of Magnesium and Alloys》 SCIE EI CAS CSCD 2024年第7期3003-3023,共21页
Hot deformation is a commonly employed processing technique to enhance the ductility and workability of Mg alloy.However,the hot deformation of Mg alloy is highly sensitive to factors such as temperature,strain rate,a... Hot deformation is a commonly employed processing technique to enhance the ductility and workability of Mg alloy.However,the hot deformation of Mg alloy is highly sensitive to factors such as temperature,strain rate,and strain,leading to complex flow behavior and an exceptionally narrow processing window for Mg alloy.To overcome the shortcomings of the conventional Arrhenius-type(AT)model,this study developed machine learning-based Arrhenius-type(ML-AT)models by combining the genetic algorithm(GA),particle swarm optimization(PSO),and artificial neural network(ANN).Results indicated that when describing the flow behavior of the AQ80 alloy,the PSO-ANN-AT model demonstrates the most prominent prediction accuracy and generalization ability among all ML-AT and AT models.Moreover,an activation energy-processing(AEP)map was established using the reconstructed flow stress and activation energy fields based on the PSO-ANN-AT model.Experimental validations revealed that this AEP map exhibits superior predictive capability for microstructure evolution compared to the one established by the traditional interpolation methods,ultimately contributing to the precise determination of the optimum processing window.These findings provide fresh insights into the accurate constitutive description and workability characterization of Mg alloy during hot deformation. 展开更多
关键词 Constitutive description Workability characterization Machine learning Mg alloy Hot deformation
下载PDF
HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
20
作者 Zhihui Song Jinchen Xu +1 位作者 Kewei Li Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第6期4573-4601,共29页
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representation... Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality. 展开更多
关键词 Vulnerability detection deep learning CST-PDG code representation tree-graph-gated-attention network CROSS-LANGUAGE
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部