CircRNA-disease association(CDA) can provide a new direction for the treatment of diseases. However,traditional biological experiment is time-consuming and expensive, this urges us to propose the reliable computationa...
详细信息
CircRNA-disease association(CDA) can provide a new direction for the treatment of diseases. However,traditional biological experiment is time-consuming and expensive, this urges us to propose the reliable computational model to predict the associations between circRNAs and diseases. And there is existing more and more evidence indicates that the combination of multi-biomolecular information can improve the prediction accuracy. We propose a novel computational model for CDA prediction named MBCDA, we collect the multi-biomolecular information including circRNA, disease, miRNA and lncRNA based on 6 databases, and construct three heterogeneous network among them, then the multi-heads graph attention networks are applied to these three networks to extract the features of circRNAs and diseases from different views, the obtained features are put into variational graph auto-encoder(VGAE) network to learn the latent distributions of the nodes, a fully connected neural network is adopted to further process the output of VGAE and uses sigmoid function to obtain the predicted probabilities of circRNA-disease *** a result, MBCDA achieved the values of AUC and AUPR under 5-fold cross-validation of 0.893 and 0.887. MBCDA was applied to the analysis of the top-25 predicted associations between circRNAs and diseases, these experimental results show that our proposed MBCDA is a powerful computational model for CDA prediction.
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights of a pre-selected set of attention points, our approach learns to locate the best attention points to maximize the performance of a specific task, e.g., point cloud classification. Importantly, we advocate the use of single attention point to facilitate semantic understanding in point feature learning. Specifically,we formulate a new and simple convolution, which combines convolutional features from an input point and its corresponding learned attention point(LAP). Our attention mechanism can be easily incorporated into state-of-the-art point cloud classification and segmentation networks. Extensive experiments on common benchmarks, such as Model Net40, Shape Net Part, and S3DIS, all demonstrate that our LAP-enabled networks consistently outperform the respective original networks, as well as other competitive alternatives, which employ multiple attention points, either pre-selected or learned under our LAP framework.
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b...
详细信息
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection between cyberspace and physical processes results in the exposure of industrial production information to unprecedented security risks. It is imperative to develop suitable strategies to ensure cyber security while meeting basic performance *** the perspective of control engineering, this review presents the most up-to-date results for privacy-preserving filtering,control, and optimization in industrial cyber-physical systems. Fashionable privacy-preserving strategies and mainstream evaluation metrics are first presented in a systematic manner for performance evaluation and engineering *** discussion discloses the impact of typical filtering algorithms on filtering performance, specifically for privacy-preserving Kalman filtering. Then, the latest development of industrial control is systematically investigated from consensus control of multi-agent systems, platoon control of autonomous vehicles as well as hierarchical control of power systems. The focus thereafter is on the latest privacy-preserving optimization algorithms in the framework of consensus and their applications in distributed economic dispatch issues and energy management of networked power systems. In the end, several topics for potential future research are highlighted.
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, faci...
详细信息
In recent years, mental health issues have profoundly impacted individuals’ well-being, necessitating prompt identification and intervention. Existing approaches grapple with the complex nature of mental health, facing challenges like task interference, limited adaptability, and difficulty in capturing nuanced linguistic expressions indicative of various conditions. In response to these challenges, our research presents three novel models employing multi-task learning (MTL) to understand mental health behaviors comprehensively. These models encompass soft-parameter sharing-based long short-term memory with attention mechanism (SPS-LSTM-AM), SPS-based bidirectional gated neural networks with self-head attention mechanism (SPS-BiGRU-SAM), and SPS-based bidirectional neural network with multi-head attention mechanism (SPS-BNN-MHAM). Our models address diverse tasks, including detecting disorders such as bipolar disorder, insomnia, obsessive-compulsive disorder, and panic in psychiatric texts, alongside classifying suicide or non-suicide-related texts on social media as auxiliary tasks. Emotion detection in suicide notes, covering emotions of abuse, blame, and sorrow, serves as the main task. We observe significant performance enhancement in the primary task by incorporating auxiliary tasks. Advanced encoder-building techniques, including auto-regressive-based permutation and enhanced permutation language modeling, are recommended for effectively capturing mental health contexts’ subtleties, semantic nuances, and syntactic structures. We present the shared feature extractor called shared auto-regressive for language modeling (S-ARLM) to capture high-level representations that are useful across tasks. Additionally, we recommend soft-parameter sharing (SPS) subtypes-fully sharing, partial sharing, and independent layer-to minimize tight coupling and enhance adaptability. Our models exhibit outstanding performance across various datasets, achieving accuracies of 96.9%, 97.
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
Text Summarization is a process to abridge a long-size document into condensed form by comprising all the prime information and central theme. Researchers proposed numerous approaches for automatic text summarization,...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
In the age of technology, many people have fallen victim to fake images. Photo editing has become easier as the process of making photos becomes more efficient. With the image processing tools at their disposal, peopl...
详细信息
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle **...
详细信息
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle ***,these advancements also generate a surge in data processing requirements,necessitating the offloading of vehicular tasks to edge servers due to the limited computational capacity of *** recent advancements,the robustness and scalability of the existing approaches with respect to the number of vehicles and edge servers and their resources,as well as privacy,remain a *** this paper,a lightweight offloading strategy that leverages ubiquitous connectivity through the Space Air Ground Integrated Vehicular Network architecture while ensuring privacy preservation is *** Internet of Vehicles(IoV)environment is first modeled as a graph,with vehicles and base stations as nodes,and their communication links as ***,vehicular applications are offloaded to suitable servers based on latency using an attention-based heterogeneous graph neural network(HetGNN)***,a differential privacy stochastic gradient descent trainingmechanism is employed for privacypreserving of vehicles and offloading ***,the simulation results demonstrated that the proposedHetGNN method shows good performance with 0.321 s of inference time,which is 42.68%,63.93%,30.22%,and 76.04% less than baseline methods such as Deep Deterministic Policy Gradient,Deep Q Learning,Deep Neural Network,and Genetic Algorithm,respectively.
Demand forecasting has emerged as a crucial element in supply chain management. It is essential to identify anomalous data and continuously improve the forecasting model with new data. However, existing literature fai...
详细信息
暂无评论