期刊文献+
共找到503,739篇文章
< 1 2 250 >
每页显示 20 50 100
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
1
作者 Yuji Waizumi Hiroshi Tsunoda +1 位作者 Masashi Tsuji Yoshiaki Nemoto 《Journal of Information Security》 2012年第1期18-24,共7页
Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection sy... Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection systems which use a series of packets exchanged between two terminals as a unit of observation, have an advantage of being able to detect anomaly which is included in only some specific sessions. However, in large-scale networks where a large number of communications takes place, analyzing every flow is not practical. On the other hand, a timeslot-based detection systems need not to prepare a number of buffers although it is difficult to specify anomaly communications. In this paper, we propose a multi-stage anomaly detection system which is combination of timeslot-based and flow-based detectors. The proposed system can reduce the number of flows which need to be subjected to flow-based analysis but yet exhibits high detection accuracy. Through experiments using data set, we present the effectiveness of the proposed method. 展开更多
关键词 network Anomaly Detection Timeslot-Based ANALYSIS Flow-Based ANALYSIS multi-stage Traffic ANALYSIS FLOW Reduction
下载PDF
Multi-Stage Multidisciplinary Design Optimization Method for Enhancing Complete Artillery Internal Ballistic Firing Performance
2
作者 Jipeng Xie Guolai Yang +1 位作者 Liqun Wang Lei Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期793-819,共27页
To enhance the comprehensive performance of artillery internal ballistics—encompassing power,accuracy,and service life—this study proposed a multi-stage multidisciplinary design optimization(MS-MDO)method.First,the ... To enhance the comprehensive performance of artillery internal ballistics—encompassing power,accuracy,and service life—this study proposed a multi-stage multidisciplinary design optimization(MS-MDO)method.First,the comprehensive artillery internal ballistic dynamics(AIBD)model,based on propellant combustion,rotation band engraving,projectile axial motion,and rifling wear models,was established and validated.This model was systematically decomposed into subsystems from a system engineering perspective.The study then detailed the MS-MDO methodology,which included Stage I(MDO stage)employing an improved collaborative optimization method for consistent design variables,and Stage II(Performance Optimization)focusing on the independent optimization of local design variables and performance metrics.The methodology was applied to the AIBD problem.Results demonstrated that the MS-MDO method in Stage I effectively reduced iteration and evaluation counts,thereby accelerating system-level convergence.Meanwhile,Stage II optimization markedly enhanced overall performance.These comprehensive evaluation results affirmed the effectiveness of the MS-MDO method. 展开更多
关键词 ARTILLERY internal ballistics dynamics multi-stage optimization multi-disciplinary design optimization collaborative optimization
下载PDF
Research on Regulation Method of Energy Storage System Based on Multi-Stage Robust Optimization
3
作者 Zaihe Yang Shuling Wang +3 位作者 Runhang Zhu Jiao Cui Ji Su Liling Chen 《Energy Engineering》 EI 2024年第3期807-820,共14页
To address the scheduling problem involving energy storage systems and uncertain energy,we propose a method based on multi-stage robust optimization.This approach aims to regulate the energy storage system by using a ... To address the scheduling problem involving energy storage systems and uncertain energy,we propose a method based on multi-stage robust optimization.This approach aims to regulate the energy storage system by using a multi-stage robust optimal control method,which helps overcome the limitations of traditional methods in terms of time scale.The goal is to effectively utilize the energy storage power station system to address issues caused by unpredictable variations in environmental energy and fluctuating load throughout the day.To achieve this,a mathematical model is constructed to represent uncertain energy sources such as photovoltaic and wind power.The generalized Benders Decomposition method is then employed to solve the multi-stage objective optimization problem.By decomposing the problem into a series of sub-objectives,the system scale is effectively reduced,and the algorithm’s convergence ability is improved.Compared with other algorithms,the multi-stage robust optimization model has better economy and convergence ability and can be used to guide the power dispatching of uncertain energy and energy storage systems. 展开更多
关键词 multi-stage robust optimization energy storage system regulation methods output uncertainty
下载PDF
Privacy-Preserving Federated Deep Learning Diagnostic Method for Multi-Stage Diseases
4
作者 Jinbo Yang Hai Huang +2 位作者 Lailai Yin Jiaxing Qu Wanjuan Xie 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3085-3099,共15页
Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources,including clinical symptoms,physical signs,biochemical test results,imaging findings,pathological examination data,and even ... Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources,including clinical symptoms,physical signs,biochemical test results,imaging findings,pathological examination data,and even genetic data.When applying machine learning modeling to predict and diagnose multi-stage diseases,several challenges need to be addressed.Firstly,the model needs to handle multimodal data,as the data used by doctors for diagnosis includes image data,natural language data,and structured data.Secondly,privacy of patients’data needs to be protected,as these data contain the most sensitive and private information.Lastly,considering the practicality of the model,the computational requirements should not be too high.To address these challenges,this paper proposes a privacy-preserving federated deep learning diagnostic method for multi-stage diseases.This method improves the forward and backward propagation processes of deep neural network modeling algorithms and introduces a homomorphic encryption step to design a federated modeling algorithm without the need for an arbiter.It also utilizes dedicated integrated circuits to implement the hardware Paillier algorithm,providing accelerated support for homomorphic encryption in modeling.Finally,this paper designs and conducts experiments to evaluate the proposed solution.The experimental results show that in privacy-preserving federated deep learning diagnostic modeling,the method in this paper achieves the same modeling performance as ordinary modeling without privacy protection,and has higher modeling speed compared to similar algorithms. 展开更多
关键词 Vertical federation homomorphic encryption deep neural network intelligent diagnosis machine learning and big data
下载PDF
A Shortest Path Algorithm for Multi-stage Network with Linear Parameter 被引量:2
5
作者 GAOTai-ping WANGChuan-long 《Systems Science and Systems Engineering》 CSCD 2002年第3期341-344,共4页
关键词 the shortest path algorithm multi-stage network linear parameter
原文传递
Trace Elements of Multi-stage Minerals and Titanite U-Pb Dating for the Gneisses from Liansan Island,Sulu UHPM Belt 被引量:1
6
作者 SONG Lihao CAO Yuting +4 位作者 XIE Tianhe CHEN Yuyao GAO Yuan WANG Songjie LI Xuping 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2023年第6期1640-1656,共17页
Gneisses with anatectic characteristics from the Liansan island in the Sulu UHPM(ultra-high pressure metamorphic)belt were studied for petrography,titanite U-Pb dating and mineral geochemistry.Three origins of garnets... Gneisses with anatectic characteristics from the Liansan island in the Sulu UHPM(ultra-high pressure metamorphic)belt were studied for petrography,titanite U-Pb dating and mineral geochemistry.Three origins of garnets are distinguished:metamorphic garnet,peritectic garnet and anatectic garnet,which are formed in the stages of peak metamorphism,retrograde anatexis and melt crystallization,respectively.The euhedral titanite has a high content of REE and high Th/U ratios,which is interpreted as indicating that it was newly-formed from an anatectic melt.The LA-ICP-MS titanite U-Pb dating yields 214-217 Ma ages for the titanite(melt)crystallization.The distribution of trace elements varies in response to the different host minerals at different stages.At the peak metamorphic stage,Y and HREE are mainly hosted by garnet,Ba and Rb by phengite,Sr,Nb,Ta,Pb,Th,U and LREE by allanite and Y,U and HREE by zircon.During partial melting,Y,Pb,Th,U and REE are released into the melt,which causes a dramatic decline of these element contents in the retrograde minerals.Finally,titanite absorbs most of the Nb,U,LREE and HREE from the melt.Therefore,the different stages of metamorphism have different mineral assemblages,which host different trace elements. 展开更多
关键词 partial melting multi-stage minerals trace element migration titanite U-Pb dating Sulu UHPM belt
下载PDF
Overview of multi-stage charging strategies for Li-ion batteries 被引量:1
7
作者 Muhammad Usman Tahir Ariya Sangwongwanich +1 位作者 Daniel-Ioan Stroe Frede Blaabjerg 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第9期228-241,共14页
To reduce the carbon footprint in the transportation sector and improve overall vehicle efficiency,a large number of electric vehicles are being manufactured.This is due to the fact that environmental concerns and the... To reduce the carbon footprint in the transportation sector and improve overall vehicle efficiency,a large number of electric vehicles are being manufactured.This is due to the fact that environmental concerns and the depletion of fossil fuels have become significant global problems.Lithium-ion batteries(LIBs)have been distinguished themselves from alternative energy storage technologies for electric vehicles(EVs) due to superior qualities like high energy and power density,extended cycle life,and low maintenance cost to a competitive price.However,there are still certain challenges to be solved,like EV fast charging,longer lifetime,and reduced weight.For fast charging,the multi-stage constant current(MSCC) charging technique is an emerging solution to improve charging efficiency,reduce temperature rise during charging,increase charging/discharging capacities,shorten charging time,and extend the cycle life.However,there are large variations in the implementation of the number of stages,stage transition criterion,and C-rate selection for each stage.This paper provides a review of these problems by compiling information from the literature.An overview of the impact of different design parameters(number of stages,stage transition,and C-rate) that the MSCC charging techniques have had on the LIB performance and cycle life is described in detail and analyzed.The impact of design parameters on lifetime,charging efficiency,charging and discharging capacity,charging speed,and rising temperature during charging is presented,and this review provides guidelines for designing advanced fast charging strategies and determining future research gaps. 展开更多
关键词 multi-stage constant current(MSCC)charging Electric vehicles(EVs) Li-ion batteries(LIBs) Fast charging strategies
下载PDF
Multi-Stage Hierarchical Channel Allocation in UAV-Assisted D2D Networks:A Stackelberg Game Approach 被引量:4
8
作者 Tao Fang DanWu +1 位作者 MengWang Jiaxin Chen 《China Communications》 SCIE CSCD 2021年第2期13-26,共14页
UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising te... UAV-assisted D2D networks can provide auxiliary communication for areas with poor communication facilities by using the characteristics of easy deployment of unmanned aerial vehicle(UAV),then it becomes a promising technology.However,the coexistence of UAV and D2D aggravates the conflict of spectrum resources.In addition,when the UAV performs the communication service,it will inevitably cause the location change,which will make the original channel allocation no longer applicable.Inspired by the influence of frequent channel switching on channel allocation,we define the communication utility as a tradeoff between the throughput and channel switching cost.In the considered model,we investigate the multi-stage hierarchical spectrum access problem with maximizing aggregate communication utilities in UAV-assisted D2D networks.In particular,due to the hierarchical feature of the considered network,we adopt Stackelberg game to formulate this spectrum access problem where both the throughput and channel switching cost are considered.We prove that the proposed game has a stable Stackelberg equilibrium(SE),and the heterogeneous network based channel allocation(HN-CA)algorithm is proposed to achieve the desired solution.Simulation results verify the validity of the proposed game and show the effectiveness of the HN-CA algorithm. 展开更多
关键词 UAV D2D multi-stage heterogeneous spectrum access stackelberg game
下载PDF
Multi-Stage Improvement of Marine Predators Algorithm and Its Application
9
作者 Chuandong Qin Baole Han 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期3097-3119,共23页
The metaheuristic algorithms are widely used in solving the parameters of the optimization problem.The marine predators algorithm(MPA)is a novel population-based intelligent algorithm.Although MPA has shown a talented... The metaheuristic algorithms are widely used in solving the parameters of the optimization problem.The marine predators algorithm(MPA)is a novel population-based intelligent algorithm.Although MPA has shown a talented foraging strategy,it still needs a balance of exploration and exploitation.Therefore,a multi-stage improvement of marine predators algorithm(MSMPA)is proposed in this paper.The algorithm retains the advantage of multistage search and introduces a linear flight strategy in the middle stage to enhance the interaction between predators.Predators further away from the historical optimum are required to move,increasing the exploration capability of the algorithm.In the middle and late stages,the searchmechanism of particle swarmoptimization(PSO)is inserted,which enhances the exploitation capability of the algorithm.This means that the stochasticity is decreased,that is the optimal region where predators jumping out is effectively stifled.At the same time,self-adjusting weight is used to regulate the convergence speed of the algorithm,which can balance the exploration and exploitation capability of the algorithm.The algorithm is applied to different types of CEC2017 benchmark test functions and threemultidimensional nonlinear structure design optimization problems,compared with other recent algorithms.The results show that the convergence speed and accuracy of MSMPA are significantly better than that of the comparison algorithms. 展开更多
关键词 Marine predators algorithm multi-stage strategy structural design optimization
下载PDF
Pluggable multitask diffractive neural networks based on cascaded metasurfaces 被引量:1
10
作者 Cong He Dan Zhao +8 位作者 Fei Fan Hongqiang Zhou Xin Li Yao Li Junjie Li Fei Dong Yin-Xiao Miao Yongtian Wang Lingling Huang 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第2期23-31,共9页
Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been c... Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems. 展开更多
关键词 optical neural networks diffractive deep neural networks cascaded metasurfaces
下载PDF
Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks 被引量:1
11
作者 Lu Wei Zhong Ma Chaojie Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期981-1000,共20页
The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedd... The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices.In order to reduce the complexity and overhead of deploying neural networks on Integeronly hardware,most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network.However,although symmetric quantization has the advantage of easier implementation,it is sub-optimal for cases where the range could be skewed and not symmetric.This often comes at the cost of lower accuracy.This paper proposed an activation redistribution-based hybrid asymmetric quantizationmethod for neural networks.The proposedmethod takes data distribution into consideration and can resolve the contradiction between the quantization accuracy and the ease of implementation,balance the trade-off between clipping range and quantization resolution,and thus improve the accuracy of the quantized neural network.The experimental results indicate that the accuracy of the proposed method is 2.02%and 5.52%higher than the traditional symmetric quantization method for classification and detection tasks,respectively.The proposed method paves the way for computationally intensive neural network models to be deployed on devices with limited computing resources.Codes will be available on https://github.com/ycjcy/Hybrid-Asymmetric-Quantization. 展开更多
关键词 QUANTIZATION neural network hybrid asymmetric ACCURACY
下载PDF
Insights into microbiota community dynamics and flavor development mechanism during golden pomfret(Trachinotus ovatus)fermentation based on single-molecule real-time sequencing and molecular networking analysis 被引量:1
12
作者 Yueqi Wang Qian Chen +5 位作者 Huan Xiang Dongxiao Sun-Waterhouse Shengjun Chen Yongqiang Zhao Laihao Li Yanyan Wu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期101-114,共14页
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ... Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products. 展开更多
关键词 Fermented golden pomfret Microbiota community Volatile compound Co-occurrence network Metabolic pathway
下载PDF
Modeling for heterogeneous multi-stage information propagation networks and maximizing information
13
作者 梅人杰 丁李 +1 位作者 安栩明 胡萍 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第2期454-463,共10页
In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforc... In this paper, we propose a heterogeneous multi-stage model to study the effect of social reinforcement on information propagation. Both heterogeneity of network components and the heterogeneity of individual reinforcement thresholds are considered. An information outbreak condition is derived, according to which the outbreak scale and individual density of each state under specific propagation parameters can be deduced. Monte Carlo experiments are conducted in Facebook networks to demonstrate the outbreak condition, and we find that social reinforcement effects generally inhibit the propagation of information though it contributes to the emergence of certain hot spots simultaneously. Additionally, by applying Pontryagin's Maximum Principle, we derive the optimal control strategy in the case of limited control resources to maximize the information propagation. Then the forward–backward sweep method is utilized to verify its performance with numerical simulation. 展开更多
关键词 HETEROGENEOUS network social REINFORCEMENT multi-stage optimal resource ALLOCATION
下载PDF
A Multi-Stage Secure IoT Authentication Protocol
14
作者 Khalid Alhusayni Raniyah Wazirali +2 位作者 Mousa AlAkhras Marwah Almasri Samah Alhazmi 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期459-481,共23页
The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information... The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic. 展开更多
关键词 Internet of Things(IoT) security AUTHENTICATION BAN logic sensor networks
下载PDF
A Novel Multi-Stage Bispectral Deep Learning Method for Protein Family Classification
15
作者 Amjed Al Fahoum Ala’a Zyout +1 位作者 Hiam Alquran Isam Abu-Qasmieh 《Computers, Materials & Continua》 SCIE EI 2023年第7期1173-1193,共21页
Complex proteins are needed for many biological activities.Folding amino acid chains reveals their properties and functions.They support healthy tissue structure,physiology,and homeostasis.Precision medicine and treat... Complex proteins are needed for many biological activities.Folding amino acid chains reveals their properties and functions.They support healthy tissue structure,physiology,and homeostasis.Precision medicine and treatments require quantitative protein identification and function.Despite technical advances and protein sequence data exploration,bioinformatics’“basic structure”problem—the automatic deduction of a protein’s properties from its amino acid sequence—remains unsolved.Protein function inference from amino acid sequences is the main biological data challenge.This study analyzes whether raw sequencing can characterize biological facts.A massive corpus of protein sequences and the Globin-like superfamily’s related protein families generate a solid vector representation.A coding technique for each sequence in each family was devised using two representations to identify each amino acid precisely.A bispectral analysis converts encoded protein numerical sequences into images for better protein sequence and family discrimination.Training and validation employed 70%of the dataset,while 30%was used for testing.This paper examined the performance of multistage deep learning models for differentiating between sixteen protein families after encoding and representing each encoded sequence by a higher spectral representation image(Bispectrum).Cascading minimized false positive and negative cases in all phases.The initial stage focused on two classes(six groups and ten groups).The subsequent stages focused on the few classes almost accurately separated in the first stage and decreased the overlapping cases between families that appeared in single-stage deep learning classification.The single-stage technique had 64.2%+/-22.8%accuracy,63.3%+/-17.1%precision,and a 63.2%+/19.4%F1-score.The two-stage technique yielded 92.2%+/-4.9%accuracy,92.7%+/-7.0%precision,and a 92.3%+/-5.0%F1-score.This work provides balanced,reliable,and precise forecasts for all families in all measures.It ensured that the new model was resilient to family variances and provided high-scoring results. 展开更多
关键词 Globin-like superfamily numerical encoding bispectral analysis classification model deep convolutional neural network
下载PDF
Influencer identification of dynamical networks based on an information entropy dimension reduction method
16
作者 段东立 纪思源 袁紫薇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期375-384,共10页
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,... Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers. 展开更多
关键词 dynamical networks network influencer low-dimensional dynamics network disintegration
下载PDF
A multilayer network diffusion-based model for reviewer recommendation
17
作者 黄羿炜 徐舒琪 +1 位作者 蔡世民 吕琳媛 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期700-717,共18页
With the rapid growth of manuscript submissions,finding eligible reviewers for every submission has become a heavy task.Recommender systems are powerful tools developed in computer science and information science to d... With the rapid growth of manuscript submissions,finding eligible reviewers for every submission has become a heavy task.Recommender systems are powerful tools developed in computer science and information science to deal with this problem.However,most existing approaches resort to text mining techniques to match manuscripts with potential reviewers,which require high-quality textual information to perform well.In this paper,we propose a reviewer recommendation algorithm based on a network diffusion process on a scholar-paper multilayer network,with no requirement for textual information.The network incorporates the relationship of scholar-paper pairs,the collaboration among scholars,and the bibliographic coupling among papers.Experimental results show that our proposed algorithm outperforms other state-of-the-art recommendation methods that use graph random walk and matrix factorization and methods that use machine learning and natural language processing,with improvements of over 7.62%in recall,5.66%in hit rate,and 47.53%in ranking score.Our work sheds light on the effectiveness of multilayer network diffusion-based methods in the reviewer recommendation problem,which will help to facilitate the peer-review process and promote information retrieval research in other practical scenes. 展开更多
关键词 reviewer recommendation multilayer network network diffusion model recommender systems complex networks
下载PDF
Source localization in signed networks with effective distance
18
作者 马志伟 孙蕾 +2 位作者 丁智国 黄宜真 胡兆龙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期577-585,共9页
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ... While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage. 展开更多
关键词 complex networks signed networks source localization effective distance
下载PDF
Impact of different interaction behavior on epidemic spreading in time-dependent social networks
19
作者 黄帅 陈杰 +2 位作者 李梦玉 徐元昊 胡茂彬 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期190-195,共6页
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi... We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy. 展开更多
关键词 epidemic transmission complex network time-dependent networks social interaction
下载PDF
Reliability Assessment of a New General Matching Composed Network
20
作者 Zhengyuan Liang Junbin Liang Guoxuan Zhong 《China Communications》 SCIE CSCD 2024年第2期245-257,共13页
The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an inc... The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an increasingly important research issue. However, at present, the reliability assessment of many interconnected networks is not yet accurate,which inevitably weakens their fault tolerance and diagnostic capabilities. To improve network reliability,researchers have proposed various methods and strategies for precise assessment. This paper introduces a novel family of interconnection networks called general matching composed networks(gMCNs), which is based on the common characteristics of network topology structure. After analyzing the topological properties of gMCNs, we establish a relationship between super connectivity and conditional diagnosability of gMCNs. Furthermore, we assess the reliability of g MCNs, and determine the conditional diagnosability of many interconnection networks. 展开更多
关键词 conditional diagnosability interconnection networks network reliability super connectivity
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部