Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi...Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.展开更多
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ...Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products.展开更多
On-site and real-time non-destructive measurement of elastic constants for materials of a component in a in-service structure is a challenge due to structural complexities,such as ambiguous boundary,variable thickness...On-site and real-time non-destructive measurement of elastic constants for materials of a component in a in-service structure is a challenge due to structural complexities,such as ambiguous boundary,variable thickness,nonuniform material properties.This work develops for the first time a method that uses ultrasound echo groups and artificial neural network(ANN)for reliable on-site real-time identification of material parameters.The use of echo groups allows the use of lower frequencies,and hence more accommodative to structural complexity.To train the ANNs,a numerical model is established that is capable of computing the waveform of ultrasonic echo groups for any given set of material properties of a given structure.The waveform of an ultrasonic echo groups at an interest location on the surface the structure with material parameters varying in a predefined range are then computed using the numerical model.This results in a set of dataset for training the ANN model.Once the ANN is trained,the material parameters can be identified simultaneously using the actual measured echo waveform as input to the ANN.Intensive tests have been conducted both numerically and experimentally to evaluate the effectiveness and accuracy of the currently proposed method.The results show that the maximum identification error of numerical example is less than 2%,and the maximum identification error of experimental test is less than 7%.Compared with currently prevailing methods and equipment,the proposefy the density and thickness,in addition to the elastic constants.Moreover,the reliability and accuracy of inverse prediction is significantly improved.Thus,it has broad applications and enables real-time field measurements,which has not been fulfilled by any other available methods or equipment.展开更多
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,...Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers.展开更多
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi...We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.展开更多
Purpose:This study aims to explore how network intermediaries influence collaborative innovation performance within inter-organizational technological collaboration networks.Design/methodology/approach:This study empl...Purpose:This study aims to explore how network intermediaries influence collaborative innovation performance within inter-organizational technological collaboration networks.Design/methodology/approach:This study employs a mixed-method approach,combining quantitative social network analysis with regression techniques to investigate the role of network intermediaries in collaborative innovation performance.Using a patent dataset of Chinese industrial enterprises,the research constructs the collaboration networks and analyzes their structural positions,particularly focusing on their role as intermediaries,characterized by betweenness centrality.Negative binomial regression analysis is employed to assess how these network characteristics shape innovation outcomes.Findings:The study reveals that firms in intermediary positions enhance collaborative innovation performance,but this effect is nuanced.A key finding is that network clustering negatively moderates the intermediary-innovation relationship.Highly clustered networks,while fostering local collaboration,may limit the innovation potential of intermediaries.On the other hand,relationship strength,measured by collaboration intensity and trust among firms,positively moderates the intermediary-innovation link.Research limitations:This study has several limitations that present opportunities for further research.The reliance on quantitative social network analysis may overlook the complexity of intermediaries’roles,and future studies could benefit from incorporating qualitative methods to better understand cultural and institutional factors.Additionally,cross-country comparisons are needed to assess the consistency of these dynamics in different contexts.Practical implications:The study offers practical insights for firms and policymakers.Organizations should strategically position themselves as network intermediaries to access diverse information and resources,thereby improving innovation performance.Building strong trust helps using network intermediary advantages.For firms in highly clustered networks,it is important to seek external partners to avoid limiting their exposure to new ideas and technologies.This research emphasizes the need to balance network diversity with relationship strength for sustained innovation.Originality/value:This research contributes to the literature by offering new insights into the role of network intermediaries,presenting a comprehensive framework for understanding the interaction between network dynamics and firm innovation.展开更多
The dual-path model of industrial evolution and spatial progression has been widely acknowledged and incorporated into the strategic planning to promote the development of urban industries and regional collaborations....The dual-path model of industrial evolution and spatial progression has been widely acknowledged and incorporated into the strategic planning to promote the development of urban industries and regional collaborations.However,current research on inter-enter-prise city networks mainly focuses on the single sector of flows on all enterprise branches,such as product value chains and production factors,but neglects that of particular industry department.Built upon the new economic geography and city networks theory,this paper develops a methodological framework that focuses on the analysis of city network evolution characteristics of smart industry.Particu-larly,a conceptual model of smart industry enterprise-industry-city is proposed and then applied to a case study of smart industry in the Yangtze River Delta Region,China.Using enterprise supplier-customer data,a city network of smart industry is constructed and sub-sequently analyzed with the proposed model.Findings indicate that the smart industry network in Yangtze River Delta Region exhibits a hierarchical structure and the expansion of the network presents a small-world network characteristic.The study not only makes a meth-odological contribution for revealing the industrial and spatial evolution path of the current smart industry,but also provides empirical support for the formulation of new economic development policies focused on smart industries,demonstrating the role of city clusters as carriers of regional synergistic development.展开更多
The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas a...The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas and stars of our own Milkyway Galaxy. This research builds on work from a previous paper that sought to impute this missing galactic information using Inpainting, polar transforms and Linear Regression ANNs. In that paper, the author only attempted to impute the data in the Northern hemisphere using the ANN model, which subsequently confirmed the existence of the Great Attractor and the homogeneity of the Universe. In this paper, the author has imputed the Southern Hemisphere and discovered a region that is mostly devoid of stars. Since this area appears to be the counterpart to the Great Attractor, the author refers to it as the Great Repeller and postulates that it is an area of physical repulsion, inline with the work of GerdPommerenke and others. Finally, the paper investigates large scale structures in the imputed galaxies.展开更多
The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks...The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time.展开更多
This letter proposes a sliced-gated-convolutional neural network with belief propagation(SGCNN-BP) architecture for decoding long codes under correlated noise. The basic idea of SGCNNBP is using Neural Networks(NN) to...This letter proposes a sliced-gated-convolutional neural network with belief propagation(SGCNN-BP) architecture for decoding long codes under correlated noise. The basic idea of SGCNNBP is using Neural Networks(NN) to transform the correlated noise into white noise, setting up the optimal condition for a standard BP decoder that takes the output from the NN. A gate-controlled neuron is used to regulate information flow and an optional operation—slicing is adopted to reduce parameters and lower training complexity. Simulation results show that SGCNN-BP has much better performance(with the largest gap being 5dB improvement) than a single BP decoder and achieves a nearly 1dB improvement compared to Fully Convolutional Networks(FCN).展开更多
Background: Celastrol is an active ingredient extracted from Traditional Chinese Medicine (TCM), which can restrain the progression of lung cancer, whereas its underlying mechanism is unclear. In our study, the underl...Background: Celastrol is an active ingredient extracted from Traditional Chinese Medicine (TCM), which can restrain the progression of lung cancer, whereas its underlying mechanism is unclear. In our study, the underlying mechanism of celastrol in the treatment of lung adenocarcinoma (LUAD) with metastasis was investigated by network pharmacology and molecular docking. Method: Potential targets of celastrol were collected from TCMSP, Batman-TCM and GeneCard database, and its potential targets were predicted using the STP platform and the TargetNet server. Metastasis marker genes (MGs) were obtained from the HCMDB. The genes correlated with LUAD were gathered from the GeneCard and OMIM database. And the common targets among celastrol potential targets, MGs and LUAD were analyzed. The protein-protein interaction (PPI) networks were obtained from the STRING database. SangerBox and the Xiantao bioinformatics tool were applied to visualize GO and KEGG analysis. Molecular docking tested the binding affinity between celastrol and core genes. Result: A total of 107 targets of celastrol against metastasis LUAD were obtained. The core targets were obtained from the PPI network, namely AKT1, JUN, MYC, STAT3, IL6, TNF, NFKB1, BCL2, IL1B, and HIF1A. GO and KEGG enrichment analysis indicated celastrol for the treatment of metastasis LUAD most refers to cellular response to chemical stress, DNA-binding transcription factor binding, transcription regulator complex and pathways in cancer. And some of these targets are associated with differential expressions and survival rates in LUAD. Moreover, Molecular docking shows celastrol can bind with BCL2 well by hydrogen bond and hydrophobic interaction. Conclusion: This finding roundly expounded the core genes and potential mechanisms of celastrol for the treatment of metastasis LUAD, offering the theoretical basis and antitumor mechanism of TCM in the treatment of lung cancer.展开更多
We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It cha...We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.展开更多
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.展开更多
Deterministic inversion based on deep learning has been widely utilized in model parameters estimation.Constrained by logging data,seismic data,wavelet and modeling operator,deterministic inversion based on deep learn...Deterministic inversion based on deep learning has been widely utilized in model parameters estimation.Constrained by logging data,seismic data,wavelet and modeling operator,deterministic inversion based on deep learning can establish nonlinear relationships between seismic data and model parameters.However,seismic data lacks low-frequency and contains noise,which increases the non-uniqueness of the solutions.The conventional inversion method based on deep learning can only establish the deterministic relationship between seismic data and parameters,and cannot quantify the uncertainty of inversion.In order to quickly quantify the uncertainty,a physics-guided deep mixture density network(PG-DMDN)is established by combining the mixture density network(MDN)with the deep neural network(DNN).Compared with Bayesian neural network(BNN)and network dropout,PG-DMDN has lower computing cost and shorter training time.A low-frequency model is introduced in the training process of the network to help the network learn the nonlinear relationship between narrowband seismic data and low-frequency impedance.In addition,the block constraints are added to the PG-DMDN framework to improve the horizontal continuity of the inversion results.To illustrate the benefits of proposed method,the PG-DMDN is compared with existing semi-supervised inversion method.Four synthetic data examples of Marmousi II model are utilized to quantify the influence of forward modeling part,low-frequency model,noise and the pseudo-wells number on inversion results,and prove the feasibility and stability of the proposed method.In addition,the robustness and generality of the proposed method are verified by the field seismic data.展开更多
Coexistence of fast and slow traveling waves without synaptic transmission has been found in hhhippocampal tissues,which is closely related to both normal brain activity and abnormal neural activity such as epileptic ...Coexistence of fast and slow traveling waves without synaptic transmission has been found in hhhippocampal tissues,which is closely related to both normal brain activity and abnormal neural activity such as epileptic discharge. However, the propagation mechanism behind this coexistence phenomenon remains unclear. In this paper, a three-dimensional electric field coupled hippocampal neural network is established to investigate generation of coexisting spontaneous fast and slow traveling waves. This model captures two types of dendritic traveling waves propagating in both transverse and longitude directions: the N-methyl-D-aspartate(NMDA)-dependent wave with a speed of about 0.1 m/s and the Ca-dependent wave with a speed of about 0.009 m/s. These traveling waves are synaptic-independent and could be conducted only by the electric fields generated by neighboring neurons, which are basically consistent with the in vitro data measured experiments. It is also found that the slow Ca wave could trigger generation of fast NMDA waves in the propagation path of slow waves whereas fast NMDA waves cannot affect the propagation of slow Ca waves. These results suggest that dendritic Ca waves could acted as the source of the coexistence fast and slow waves. Furthermore, we also confirm the impact of cellular spacing heterogeneity on the onset of coexisting fast and slow waves. The local region with decreasing distances among neighbor neurons is more liable to promote the onset of spontaneous slow waves which, as sources, excite propagation of fast waves. These modeling studies provide possible biophysical mechanisms underlying the neural dynamics of spontaneous traveling waves in brain tissues.展开更多
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi...The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes.展开更多
Despite the high efficiency of remote sensing methods for rapid and large-scale detection of subsidence phenomena,this technique has limitations such as atmospheric impact and temporal and spatial decorrelation that a...Despite the high efficiency of remote sensing methods for rapid and large-scale detection of subsidence phenomena,this technique has limitations such as atmospheric impact and temporal and spatial decorrelation that affect the accuracy of the results.This paper proposes a method based on an artificial neural network to improve the results of monitoring land subsidence due to groundwater overexploitation by radar interferometry in the Aliabad plain(Central Iran).In this regard,vertical ground deformations were monitored over 18 months using the Sentinel-1A SAR images.To model the land subsidence by a multilayer perceptron(MLP)artificial neural network,four parameters,including groundwater level,alluvial thickness,elastic modulus,and transmissivity have been applied.The model's generalizability was assessed using data derived for 144 days.According to the results,the neural network estimates the land subsidence at each ground point with an accuracy of 6.8 mm.A comparison between the predicted and actual values indicated a significant agreement.The MLP model can be used to improve the results of subsidence detection in the study area or other areas with similar characteristics.展开更多
The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(L...The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).展开更多
BACKGROUND Gastric cancer(GC)is one of the most aggressive malignancies with limited therapeutic options and a poor prognosis.Resveratrol,a non-flavonoid poly-phenolic compound found in a variety of Chinese medicinal ...BACKGROUND Gastric cancer(GC)is one of the most aggressive malignancies with limited therapeutic options and a poor prognosis.Resveratrol,a non-flavonoid poly-phenolic compound found in a variety of Chinese medicinal materials,has shown excellent anti-GC effect.However,its exact mechanisms of action in GC have not been clarified.AIM To identify the effects of resveratrol on GC progression and explore the related molecular mechanisms.METHODS Action targets of resveratrol and GC-related targets were screened from public databases.The overlapping targets between the two were confirmed using a Venn diagram,and a“Resveratrol-Target-GC”network was constructed using Cyto-scape software version 3.9.1.The protein-protein interaction(PPI)network was constructed using STRING database and core targets were identified by PPI network analysis.The Database for Annotation,Visualization and Integrated A total of 378 resveratrol action targets and 2154 GC disease targets were obtained from public databases,and 181 intersection targets between the two were screened by Venn diagram.The top 20 core targets were identified by PPI network analysis of the overlapping targets.GO function analysis mainly involved protein binding,identical protein binding,cytoplasm,nucleus,negative regulation of apoptotic process and response to xenobiotic stimulus.KEGG enrichment analysis suggested that the involved signaling pathways mainly included PI3K-AKT signaling pathway,MAPK signaling pathway,IL-17 signaling pathway,TNF signaling pathway,ErbB signaling pathway,etc.FBJ murine osteosarcoma viral oncogene homolog(FOS)and matrix metallopeptidase 9(MMP9)were selected by differential expression analysis,and they were closely associated with immune infiltration.Molecular docking results showed that resveratrol docked well with these two targets.Resveratrol treatment arrested the cell cycle at the S phase,induced apoptosis,and weakened viability,migration and invasion in a dose-dependent manner.Furthermore,resveratrol could exhibit anti-GC effect by regulating FOS and MMP9 expression.CONCLUSION The anti-GC effects of resveratrol are related to the inhibition of cell proliferation,migration,invasion and induction of cell cycle arrest and apoptosis by targeting FOS and MMP9.展开更多
Electrocardiogram(ECG)signal is one of the noninvasive physiological measurement techniques commonly usedin cardiac diagnosis.However,in real scenarios,the ECGsignal is susceptible to various noise erosion,which affec...Electrocardiogram(ECG)signal is one of the noninvasive physiological measurement techniques commonly usedin cardiac diagnosis.However,in real scenarios,the ECGsignal is susceptible to various noise erosion,which affectsthe subsequent pathological analysis.Therefore,the effective removal of the noise from ECG signals has becomea top priority in cardiac diagnostic research.Aiming at the problem of incomplete signal shape retention andlow signal-to-noise ratio(SNR)after denoising,a novel ECG denoising network,named attention-based residualdense shrinkage network(ARDSN),is proposed in this paper.Firstly,the shallow ECG characteristics are extractedby a shallow feature extraction network(SFEN).Then,the residual dense shrinkage attention block(RDSAB)isused for adaptive noise suppression.Finally,feature fusion representation(FFR)is performed on the hierarchicalfeatures extracted by a series of RDSABs to reconstruct the de-noised ECG signal.Experiments on the MIT-BIHarrhythmia database and MIT-BIH noise stress test database indicate that the proposed scheme can effectively resistthe interference of different sources of noise on the ECG signal.展开更多
基金supported by the National Natural Science Foundation of China under Grant 61602162the Hubei Provincial Science and Technology Plan Project under Grant 2023BCB041.
文摘Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification.
基金supported by the National Natural Science Foundation of China(32001733)the Earmarked fund for CARS(CARS-47)+3 种基金Guangxi Natural Science Foundation Program(2021GXNSFAA196023)Guangdong Basic and Applied Basic Research Foundation(2021A1515010833)Young Talent Support Project of Guangzhou Association for Science and Technology(QT20220101142)the Special Scientific Research Funds for Central Non-profit Institutes,Chinese Academy of Fishery Sciences(2020TD69)。
文摘Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products.
基金Supported by National Natural Science Foundation of China(Grant No.51805141)Funds for Creative Research Groups of Hebei Province of China(Grant No.E2020202142)+2 种基金Tianjin Municipal Science and Technology Plan Project of China(Grant No.19ZXZNGX00100)Key R&D Program of Hebei Province of China(Grant No.19227208D)National Key Research and development Program of China(Grant No.2020YFB2009400).
文摘On-site and real-time non-destructive measurement of elastic constants for materials of a component in a in-service structure is a challenge due to structural complexities,such as ambiguous boundary,variable thickness,nonuniform material properties.This work develops for the first time a method that uses ultrasound echo groups and artificial neural network(ANN)for reliable on-site real-time identification of material parameters.The use of echo groups allows the use of lower frequencies,and hence more accommodative to structural complexity.To train the ANNs,a numerical model is established that is capable of computing the waveform of ultrasonic echo groups for any given set of material properties of a given structure.The waveform of an ultrasonic echo groups at an interest location on the surface the structure with material parameters varying in a predefined range are then computed using the numerical model.This results in a set of dataset for training the ANN model.Once the ANN is trained,the material parameters can be identified simultaneously using the actual measured echo waveform as input to the ANN.Intensive tests have been conducted both numerically and experimentally to evaluate the effectiveness and accuracy of the currently proposed method.The results show that the maximum identification error of numerical example is less than 2%,and the maximum identification error of experimental test is less than 7%.Compared with currently prevailing methods and equipment,the proposefy the density and thickness,in addition to the elastic constants.Moreover,the reliability and accuracy of inverse prediction is significantly improved.Thus,it has broad applications and enables real-time field measurements,which has not been fulfilled by any other available methods or equipment.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.72071153 and 72231008)Laboratory of Science and Technology on Integrated Logistics Support Foundation (Grant No.6142003190102)the Natural Science Foundation of Shannxi Province (Grant No.2020JM486)。
文摘Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers.
基金This work was supported by the National Natural Science Foundation of China(Grant No.12072340)the China Postdoctoral Science Foundation(Grant No.2022M720727)the Jiangsu Funding Program for Excellent Postdoctoral Talent(Grant No.2022ZB130).
文摘We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy.
基金supported by the National Social Science Fund of China(No.22FGLB035)Fujian Provincial Federation of Social Sciences(No.FJ2023B109).
文摘Purpose:This study aims to explore how network intermediaries influence collaborative innovation performance within inter-organizational technological collaboration networks.Design/methodology/approach:This study employs a mixed-method approach,combining quantitative social network analysis with regression techniques to investigate the role of network intermediaries in collaborative innovation performance.Using a patent dataset of Chinese industrial enterprises,the research constructs the collaboration networks and analyzes their structural positions,particularly focusing on their role as intermediaries,characterized by betweenness centrality.Negative binomial regression analysis is employed to assess how these network characteristics shape innovation outcomes.Findings:The study reveals that firms in intermediary positions enhance collaborative innovation performance,but this effect is nuanced.A key finding is that network clustering negatively moderates the intermediary-innovation relationship.Highly clustered networks,while fostering local collaboration,may limit the innovation potential of intermediaries.On the other hand,relationship strength,measured by collaboration intensity and trust among firms,positively moderates the intermediary-innovation link.Research limitations:This study has several limitations that present opportunities for further research.The reliance on quantitative social network analysis may overlook the complexity of intermediaries’roles,and future studies could benefit from incorporating qualitative methods to better understand cultural and institutional factors.Additionally,cross-country comparisons are needed to assess the consistency of these dynamics in different contexts.Practical implications:The study offers practical insights for firms and policymakers.Organizations should strategically position themselves as network intermediaries to access diverse information and resources,thereby improving innovation performance.Building strong trust helps using network intermediary advantages.For firms in highly clustered networks,it is important to seek external partners to avoid limiting their exposure to new ideas and technologies.This research emphasizes the need to balance network diversity with relationship strength for sustained innovation.Originality/value:This research contributes to the literature by offering new insights into the role of network intermediaries,presenting a comprehensive framework for understanding the interaction between network dynamics and firm innovation.
基金Under the auspices of National Natural Science Foundation of China(No.42330510,41871160)。
文摘The dual-path model of industrial evolution and spatial progression has been widely acknowledged and incorporated into the strategic planning to promote the development of urban industries and regional collaborations.However,current research on inter-enter-prise city networks mainly focuses on the single sector of flows on all enterprise branches,such as product value chains and production factors,but neglects that of particular industry department.Built upon the new economic geography and city networks theory,this paper develops a methodological framework that focuses on the analysis of city network evolution characteristics of smart industry.Particu-larly,a conceptual model of smart industry enterprise-industry-city is proposed and then applied to a case study of smart industry in the Yangtze River Delta Region,China.Using enterprise supplier-customer data,a city network of smart industry is constructed and sub-sequently analyzed with the proposed model.Findings indicate that the smart industry network in Yangtze River Delta Region exhibits a hierarchical structure and the expansion of the network presents a small-world network characteristic.The study not only makes a meth-odological contribution for revealing the industrial and spatial evolution path of the current smart industry,but also provides empirical support for the formulation of new economic development policies focused on smart industries,demonstrating the role of city clusters as carriers of regional synergistic development.
文摘The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas and stars of our own Milkyway Galaxy. This research builds on work from a previous paper that sought to impute this missing galactic information using Inpainting, polar transforms and Linear Regression ANNs. In that paper, the author only attempted to impute the data in the Northern hemisphere using the ANN model, which subsequently confirmed the existence of the Great Attractor and the homogeneity of the Universe. In this paper, the author has imputed the Southern Hemisphere and discovered a region that is mostly devoid of stars. Since this area appears to be the counterpart to the Great Attractor, the author refers to it as the Great Repeller and postulates that it is an area of physical repulsion, inline with the work of GerdPommerenke and others. Finally, the paper investigates large scale structures in the imputed galaxies.
文摘The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time.
基金supported by Beijing Natural Science Foundation (L202003)。
文摘This letter proposes a sliced-gated-convolutional neural network with belief propagation(SGCNN-BP) architecture for decoding long codes under correlated noise. The basic idea of SGCNNBP is using Neural Networks(NN) to transform the correlated noise into white noise, setting up the optimal condition for a standard BP decoder that takes the output from the NN. A gate-controlled neuron is used to regulate information flow and an optional operation—slicing is adopted to reduce parameters and lower training complexity. Simulation results show that SGCNN-BP has much better performance(with the largest gap being 5dB improvement) than a single BP decoder and achieves a nearly 1dB improvement compared to Fully Convolutional Networks(FCN).
文摘Background: Celastrol is an active ingredient extracted from Traditional Chinese Medicine (TCM), which can restrain the progression of lung cancer, whereas its underlying mechanism is unclear. In our study, the underlying mechanism of celastrol in the treatment of lung adenocarcinoma (LUAD) with metastasis was investigated by network pharmacology and molecular docking. Method: Potential targets of celastrol were collected from TCMSP, Batman-TCM and GeneCard database, and its potential targets were predicted using the STP platform and the TargetNet server. Metastasis marker genes (MGs) were obtained from the HCMDB. The genes correlated with LUAD were gathered from the GeneCard and OMIM database. And the common targets among celastrol potential targets, MGs and LUAD were analyzed. The protein-protein interaction (PPI) networks were obtained from the STRING database. SangerBox and the Xiantao bioinformatics tool were applied to visualize GO and KEGG analysis. Molecular docking tested the binding affinity between celastrol and core genes. Result: A total of 107 targets of celastrol against metastasis LUAD were obtained. The core targets were obtained from the PPI network, namely AKT1, JUN, MYC, STAT3, IL6, TNF, NFKB1, BCL2, IL1B, and HIF1A. GO and KEGG enrichment analysis indicated celastrol for the treatment of metastasis LUAD most refers to cellular response to chemical stress, DNA-binding transcription factor binding, transcription regulator complex and pathways in cancer. And some of these targets are associated with differential expressions and survival rates in LUAD. Moreover, Molecular docking shows celastrol can bind with BCL2 well by hydrogen bond and hydrophobic interaction. Conclusion: This finding roundly expounded the core genes and potential mechanisms of celastrol for the treatment of metastasis LUAD, offering the theoretical basis and antitumor mechanism of TCM in the treatment of lung cancer.
基金Project supported by the Ministry of Education of China in the later stage of philosophy and social science research(Grant No.19JHG091)the National Natural Science Foundation of China(Grant No.72061003)+1 种基金the Major Program of National Social Science Fund of China(Grant No.20&ZD155)the Guizhou Provincial Science and Technology Projects(Grant No.[2020]4Y172)。
文摘We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62103375,62006106,61877055,and 62171413)the Philosophy and Social Science Planning Project of Zhejinag Province,China(Grant No.22NDJC009Z)+1 种基金the Education Ministry Humanities and Social Science Foundation of China(Grant No.19YJCZH056)the Natural Science Foundation of Zhejiang Province,China(Grant Nos.LY23F030003,LY22F030006,and LQ21F020005).
文摘The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
基金the sponsorship of Shandong Province Foundation for Laoshan National Laboratory of Science and Technology Foundation(LSKJ202203400)National Natural Science Foundation of China(42174139,42030103)Science Foundation from Innovation and Technology Support Program for Young Scientists in Colleges of Shandong Province and Ministry of Science and Technology of China(2019RA2136)。
文摘Deterministic inversion based on deep learning has been widely utilized in model parameters estimation.Constrained by logging data,seismic data,wavelet and modeling operator,deterministic inversion based on deep learning can establish nonlinear relationships between seismic data and model parameters.However,seismic data lacks low-frequency and contains noise,which increases the non-uniqueness of the solutions.The conventional inversion method based on deep learning can only establish the deterministic relationship between seismic data and parameters,and cannot quantify the uncertainty of inversion.In order to quickly quantify the uncertainty,a physics-guided deep mixture density network(PG-DMDN)is established by combining the mixture density network(MDN)with the deep neural network(DNN).Compared with Bayesian neural network(BNN)and network dropout,PG-DMDN has lower computing cost and shorter training time.A low-frequency model is introduced in the training process of the network to help the network learn the nonlinear relationship between narrowband seismic data and low-frequency impedance.In addition,the block constraints are added to the PG-DMDN framework to improve the horizontal continuity of the inversion results.To illustrate the benefits of proposed method,the PG-DMDN is compared with existing semi-supervised inversion method.Four synthetic data examples of Marmousi II model are utilized to quantify the influence of forward modeling part,low-frequency model,noise and the pseudo-wells number on inversion results,and prove the feasibility and stability of the proposed method.In addition,the robustness and generality of the proposed method are verified by the field seismic data.
基金supported in part by the National Natural Science Foundation of China (Grant Nos. 62171312 and 61771330)the Tianjin Municipal Education Commission Scientific Research Project (Grant No. 2020KJ114)。
文摘Coexistence of fast and slow traveling waves without synaptic transmission has been found in hhhippocampal tissues,which is closely related to both normal brain activity and abnormal neural activity such as epileptic discharge. However, the propagation mechanism behind this coexistence phenomenon remains unclear. In this paper, a three-dimensional electric field coupled hippocampal neural network is established to investigate generation of coexisting spontaneous fast and slow traveling waves. This model captures two types of dendritic traveling waves propagating in both transverse and longitude directions: the N-methyl-D-aspartate(NMDA)-dependent wave with a speed of about 0.1 m/s and the Ca-dependent wave with a speed of about 0.009 m/s. These traveling waves are synaptic-independent and could be conducted only by the electric fields generated by neighboring neurons, which are basically consistent with the in vitro data measured experiments. It is also found that the slow Ca wave could trigger generation of fast NMDA waves in the propagation path of slow waves whereas fast NMDA waves cannot affect the propagation of slow Ca waves. These results suggest that dendritic Ca waves could acted as the source of the coexistence fast and slow waves. Furthermore, we also confirm the impact of cellular spacing heterogeneity on the onset of coexisting fast and slow waves. The local region with decreasing distances among neighbor neurons is more liable to promote the onset of spontaneous slow waves which, as sources, excite propagation of fast waves. These modeling studies provide possible biophysical mechanisms underlying the neural dynamics of spontaneous traveling waves in brain tissues.
基金supported by the Natural Science Foundation of China under Grant Nos.62362008,61973163,61972345,U1911401.
文摘The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes.
文摘Despite the high efficiency of remote sensing methods for rapid and large-scale detection of subsidence phenomena,this technique has limitations such as atmospheric impact and temporal and spatial decorrelation that affect the accuracy of the results.This paper proposes a method based on an artificial neural network to improve the results of monitoring land subsidence due to groundwater overexploitation by radar interferometry in the Aliabad plain(Central Iran).In this regard,vertical ground deformations were monitored over 18 months using the Sentinel-1A SAR images.To model the land subsidence by a multilayer perceptron(MLP)artificial neural network,four parameters,including groundwater level,alluvial thickness,elastic modulus,and transmissivity have been applied.The model's generalizability was assessed using data derived for 144 days.According to the results,the neural network estimates the land subsidence at each ground point with an accuracy of 6.8 mm.A comparison between the predicted and actual values indicated a significant agreement.The MLP model can be used to improve the results of subsidence detection in the study area or other areas with similar characteristics.
文摘The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4).
基金Natural Science Foundation of Hebei Province,No.H2018307071Traditional Chinese Medicine Research Plan Project in Hebei Province,No.2022122Hebei Provincial Science and Technology Program,No.17397763D.
文摘BACKGROUND Gastric cancer(GC)is one of the most aggressive malignancies with limited therapeutic options and a poor prognosis.Resveratrol,a non-flavonoid poly-phenolic compound found in a variety of Chinese medicinal materials,has shown excellent anti-GC effect.However,its exact mechanisms of action in GC have not been clarified.AIM To identify the effects of resveratrol on GC progression and explore the related molecular mechanisms.METHODS Action targets of resveratrol and GC-related targets were screened from public databases.The overlapping targets between the two were confirmed using a Venn diagram,and a“Resveratrol-Target-GC”network was constructed using Cyto-scape software version 3.9.1.The protein-protein interaction(PPI)network was constructed using STRING database and core targets were identified by PPI network analysis.The Database for Annotation,Visualization and Integrated A total of 378 resveratrol action targets and 2154 GC disease targets were obtained from public databases,and 181 intersection targets between the two were screened by Venn diagram.The top 20 core targets were identified by PPI network analysis of the overlapping targets.GO function analysis mainly involved protein binding,identical protein binding,cytoplasm,nucleus,negative regulation of apoptotic process and response to xenobiotic stimulus.KEGG enrichment analysis suggested that the involved signaling pathways mainly included PI3K-AKT signaling pathway,MAPK signaling pathway,IL-17 signaling pathway,TNF signaling pathway,ErbB signaling pathway,etc.FBJ murine osteosarcoma viral oncogene homolog(FOS)and matrix metallopeptidase 9(MMP9)were selected by differential expression analysis,and they were closely associated with immune infiltration.Molecular docking results showed that resveratrol docked well with these two targets.Resveratrol treatment arrested the cell cycle at the S phase,induced apoptosis,and weakened viability,migration and invasion in a dose-dependent manner.Furthermore,resveratrol could exhibit anti-GC effect by regulating FOS and MMP9 expression.CONCLUSION The anti-GC effects of resveratrol are related to the inhibition of cell proliferation,migration,invasion and induction of cell cycle arrest and apoptosis by targeting FOS and MMP9.
基金the National Natural Science Foundation of China under Grant 62172059 and 62072055Hunan Provincial Natural Science Foundations of China under Grant 2022JJ50318 and 2022JJ30621Scientific Research Fund of Hunan Provincial Education Department of China under Grant 22A0200 and 20K098。
文摘Electrocardiogram(ECG)signal is one of the noninvasive physiological measurement techniques commonly usedin cardiac diagnosis.However,in real scenarios,the ECGsignal is susceptible to various noise erosion,which affectsthe subsequent pathological analysis.Therefore,the effective removal of the noise from ECG signals has becomea top priority in cardiac diagnostic research.Aiming at the problem of incomplete signal shape retention andlow signal-to-noise ratio(SNR)after denoising,a novel ECG denoising network,named attention-based residualdense shrinkage network(ARDSN),is proposed in this paper.Firstly,the shallow ECG characteristics are extractedby a shallow feature extraction network(SFEN).Then,the residual dense shrinkage attention block(RDSAB)isused for adaptive noise suppression.Finally,feature fusion representation(FFR)is performed on the hierarchicalfeatures extracted by a series of RDSABs to reconstruct the de-noised ECG signal.Experiments on the MIT-BIHarrhythmia database and MIT-BIH noise stress test database indicate that the proposed scheme can effectively resistthe interference of different sources of noise on the ECG signal.