Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
Log parsing, the process of transforming raw logs into structured data, is a key step in the complex computer system's intelligent operation and maintenance and therefore has received extensive attention. Among al...
详细信息
With continuous expansion of satellite applications,the requirements for satellite communication services,such as communication delay,transmission bandwidth,transmission power consumption,and communication coverage,ar...
详细信息
With continuous expansion of satellite applications,the requirements for satellite communication services,such as communication delay,transmission bandwidth,transmission power consumption,and communication coverage,are becoming *** paper first presents an overview of the current development status of Low Earth Orbit(LEO)satellite constellations,and then conducts a demand analysis for multi-satellite data transmission based on LEO satellite *** problem is described,and the challenges and difficulties of the problem are analyzed *** this basis,a multi-satellite data-transmission mathematical model is then *** classical heuristic allocating strategies on the features of the proposed model,with the reinforcement learning algorithm Deep Q-Network(DQN),a two-stage optimization framework based on heuristic and DQN is ***,by taking into account the spatial and temporal distribution characteristics of satellite and facility resources,a multi-satellite scheduling instance dataset is *** results validate the rationality and correctness of the DQN algorithm in solving the collaborative scheduling problem of multi-satellite data transmission.
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs...
详细信息
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs),although their geometries and light configurations may be *** allfrequency BRDFs in real time remains challenging due to the complex light *** approaches,including precomputed radiance transfer,light probes,and the most recent path-tracing-based approaches(ReSTIR PT),cannot satisfy both quality and performance requirements ***,we propose a practical hybrid global illumination approach that combines ray tracing and cached GI by caching the incoming radiance with *** approach can produce results close to those of ofline renderers at the cost of only approximately 17 ms at runtime and is robust over all-frequency *** approach is designed for applications involving static lighting and geometries,such as virtual exhibitions.
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha...
详细信息
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud ***,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing *** proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution ***,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating *** study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam *** outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection *** excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage *** efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and *** simulated data indicates that the new MCWOA outpaces other methods across all *** study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO).
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential *** attacks turn into a major menace to federated learning on account of their concealed property and potent destructive *** altering the local model during routine machine learning training,attackers can easily contaminate the global *** detection and aggregation solutions mitigate certain threats,but they are still insufficient to completely eliminate the influence generated by ***,federated unlearning that can remove unreliable models while maintaining the accuracy of the global model has become a *** some existing federated unlearning approaches are rather difficult to be applied in large neural network models because of their high computational ***,we propose SlideFU,an efficient anti-poisoning attack federated unlearning *** primary concept of SlideFU is to employ sliding window to construct the training process,where all operations are confined within the *** design a malicious detection scheme based on principal component analysis(PCA),which calculates the trust factors between compressed models in a low-cost way to eliminate unreliable *** confirming that the global model is under attack,the system activates the federated unlearning process,calibrates the gradients based on the updated direction of the calibration *** on two public datasets demonstrate that our scheme can recover a robust model with extremely high efficiency.
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)ana...
详细信息
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)analysis data with Variation Autoencoder(VAE)and Generative AdversarialNetwork(GAN)the network framework model(SAE-GAN),is proposed for environmental data *** model combines two popular generative models,GAN and VAE,to generate features conditional on categorical data embedding after SWOT *** model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample *** data is used to retain more semantic information to generate *** model was applied to species in Southern California,USA,citing SWOT analysis data to train the *** show that the model is capable of integrating data from more comprehensive analyses than traditional methods and generating high-quality reconstructed data from them,effectively solving the problem of insufficient data collection in development *** model is further validated by the Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)classification assessment commonly used in the environmental data *** study provides a reliable and rich source of training data for species introduction site selection systems and makes a significant contribution to ecological and sustainable development.
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is...
详细信息
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is *** convolutional neural networks,renowned for their independence in feature extraction,have established their value in numerous detection and classification ***,it requires large training datasets and several parameters that need careful *** proposed Modified Dense Convolutional Network(MDCN)provides a successful classification scheme for plant diseases affecting mango *** model employs the strength of pre-trained networks and modifies them for the particular context of mango leaf diseases by incorporating transfer learning *** data loader also builds mini-batches for training the models to reduce training ***,optimization approaches help increase the overall model’s efficiency and lower computing *** employed on the MangoLeafBD Dataset consists of a total of 4,000 *** the experimental results,the proposed system is compared with existing techniques and it is clear that the proposed algorithm surpasses the existing algorithms by achieving high performance and overall throughput.
暂无评论