首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Empirical analysis of Android storage management using Network Block Device (NBD) protocol: A comprehensive performance and efficiency study 基于网络块设备(NBD)协议的Android存储管理的实证分析:综合性能和效率研究
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 DOI: 10.1016/j.bcra.2025.100310
Tanvir Rahman , Tanjid Ahmed , Md. Sakibur Rahman , Amreen Hossain , Jannatun Noor
The Network Block Device (NBD) protocol enhances the Android ecosystem's storage management and power efficiency, particularly on ARM devices. The study addresses storage limitations on ARM devices and explores how NBD can provide a solution. By leveraging NBD, Android devices can connect to remote storage resources and expand storage capacity without physical upgrades. This enables Android devices to be used as controllers for IoT networks and smart home appliances. The study includes statistical comparisons of NBD with alternative protocols like secure File Transfer Protocol (sFTP), Internet Small Computer System Interface (iSCSI), Network File System (NFS), Server Message Block (SMB), and Hypertext Transfer Protocol (HTTP). Through read-and-write tests, NBD exhibits superior performance in bandwidth speed and operation duration, with speeds more than twice as fast as other protocols. Furthermore, the evaluation compares NBD's cloud storage capabilities with popular services such as Google Drive, Dropbox, OneDrive, and Google Cloud Platform (GCP). NBD outperforms these services regarding read and write speeds, completing operations much faster. The study also examines NBD's power consumption, demonstrating its energy efficiency compared to other protocols and cloud storage services. NBD's lower power consumption makes it ideal for energy-sensitive Android applications. In conclusion, the integration of NBD into the Android ecosystem enhances efficiency, storage flexibility, and adaptability. It empowers ARM-based Android devices with increased capabilities and versatility.
网络块设备(NBD)协议增强了Android生态系统的存储管理和电源效率,特别是在ARM设备上。该研究解决了ARM设备的存储限制,并探讨了NBD如何提供解决方案。通过NBD, Android设备可以连接到远程存储资源并扩展存储容量,而无需进行物理升级。这使得安卓设备可以用作物联网网络和智能家电的控制器。该研究包括NBD与其他协议的统计比较,如安全文件传输协议(sFTP)、互联网小型计算机系统接口(iSCSI)、网络文件系统(NFS)、服务器消息块(SMB)和超文本传输协议(HTTP)。通过读写测试,NBD在带宽速度和操作持续时间方面表现出优越的性能,速度是其他协议的两倍以上。此外,评估还将NBD的云存储能力与谷歌Drive、Dropbox、OneDrive和谷歌cloud Platform (GCP)等流行服务进行了比较。NBD在读写速度方面优于这些服务,完成操作的速度要快得多。该研究还检查了NBD的功耗,与其他协议和云存储服务相比,展示了其能源效率。NBD的低功耗使其成为能源敏感型安卓应用的理想选择。综上所述,将NBD集成到Android生态系统中可以提高效率、存储灵活性和适应性。它赋予基于arm的Android设备更多的功能和多功能性。
{"title":"Empirical analysis of Android storage management using Network Block Device (NBD) protocol: A comprehensive performance and efficiency study","authors":"Tanvir Rahman ,&nbsp;Tanjid Ahmed ,&nbsp;Md. Sakibur Rahman ,&nbsp;Amreen Hossain ,&nbsp;Jannatun Noor","doi":"10.1016/j.bcra.2025.100310","DOIUrl":"10.1016/j.bcra.2025.100310","url":null,"abstract":"<div><div>The Network Block Device (NBD) protocol enhances the Android ecosystem's storage management and power efficiency, particularly on ARM devices. The study addresses storage limitations on ARM devices and explores how NBD can provide a solution. By leveraging NBD, Android devices can connect to remote storage resources and expand storage capacity without physical upgrades. This enables Android devices to be used as controllers for IoT networks and smart home appliances. The study includes statistical comparisons of NBD with alternative protocols like secure File Transfer Protocol (sFTP), Internet Small Computer System Interface (iSCSI), Network File System (NFS), Server Message Block (SMB), and Hypertext Transfer Protocol (HTTP). Through read-and-write tests, NBD exhibits superior performance in bandwidth speed and operation duration, with speeds more than twice as fast as other protocols. Furthermore, the evaluation compares NBD's cloud storage capabilities with popular services such as Google Drive, Dropbox, OneDrive, and Google Cloud Platform (GCP). NBD outperforms these services regarding read and write speeds, completing operations much faster. The study also examines NBD's power consumption, demonstrating its energy efficiency compared to other protocols and cloud storage services. NBD's lower power consumption makes it ideal for energy-sensitive Android applications. In conclusion, the integration of NBD into the Android ecosystem enhances efficiency, storage flexibility, and adaptability. It empowers ARM-based Android devices with increased capabilities and versatility.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100310"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guarding a convex target set in a particular case of the game of two cars 在两车博弈的特定情况下守卫一个凸目标集
Pub Date : 2026-01-29 DOI: 10.1007/s43684-026-00125-4
Jingwen Xu, Qiyong He, Min Meng, Xiuxian Li

This paper presents a geometric solution framework for a target defense problem, formulated as a variant of the classical Game of Two Cars. The setting considers a Dubins defender that is faster and more maneuverable and aims to intercept a Dubins attacker attempting to reach a convex target set. To address the computational complexity of solving the associated Hamilton-Jacobi-Isaacs (HJI) equations, a geometric approach based on the concept of the Attacker Dominance Region (ADR) is developed. The ADR is constructed piecewise from the boundaries of the players’ reachable sets. The complete solution consists of two components: a Game of Kind, which determines the outcome based on the spatial relationship between the ADR and the target set, and a Game of Degree, which derives optimal strategies that achieve equilibrium. Simulation results demonstrate the effectiveness of the proposed method under realistic motion constraints and indicate its potential applicability to practical target defense scenarios.

本文提出了一个目标防御问题的几何解框架,将其表述为经典的两车博弈的变体。该设置考虑了一个更快、更灵活的杜宾防御者,旨在拦截试图到达凸目标集的杜宾攻击者。为了解决求解相关Hamilton-Jacobi-Isaacs (HJI)方程的计算复杂性,提出了一种基于攻击者优势域(ADR)概念的几何方法。ADR是根据玩家可到达集合的边界分段构建的。完整解由两部分组成:一类是根据ADR与目标集的空间关系决定结果的“类”游戏,另一类是导出实现均衡的最优策略的“度”游戏。仿真结果证明了该方法在真实运动约束下的有效性,并表明了该方法在实际目标防御场景中的潜在适用性。
{"title":"Guarding a convex target set in a particular case of the game of two cars","authors":"Jingwen Xu,&nbsp;Qiyong He,&nbsp;Min Meng,&nbsp;Xiuxian Li","doi":"10.1007/s43684-026-00125-4","DOIUrl":"10.1007/s43684-026-00125-4","url":null,"abstract":"<div><p>This paper presents a geometric solution framework for a target defense problem, formulated as a variant of the classical Game of Two Cars. The setting considers a Dubins defender that is faster and more maneuverable and aims to intercept a Dubins attacker attempting to reach a convex target set. To address the computational complexity of solving the associated Hamilton-Jacobi-Isaacs (HJI) equations, a geometric approach based on the concept of the Attacker Dominance Region (ADR) is developed. The ADR is constructed piecewise from the boundaries of the players’ reachable sets. The complete solution consists of two components: a Game of Kind, which determines the outcome based on the spatial relationship between the ADR and the target set, and a Game of Degree, which derives optimal strategies that achieve equilibrium. Simulation results demonstrate the effectiveness of the proposed method under realistic motion constraints and indicate its potential applicability to practical target defense scenarios.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-026-00125-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association rule mining for aircraft assembly process information based on fine-tuned LLM 基于微调LLM的飞机装配过程信息关联规则挖掘
Pub Date : 2026-01-06 DOI: 10.1007/s43684-025-00111-2
Jiaji Shen, Weidong Zhao, Xianhui Liu, Ning Jia, Yingyao Zhang

The aircraft final assembly is a complex system, encompassing various aspects and multidimensional production factors. These numerous factors are interconnected, significantly impacting the efficiency of the final assembly process. To investigate the interrelationships among various production factors, this study introduces a specialized fine-tuning large language model for aircraft final assembly, termed Aircraft Final Assembly ChatGLM (AFA-ChatGLM). This model is designed to automatically extract essential information regarding key production factors from process documentation. Furthermore, the FP-Growth algorithm is employed to uncover association rules between these production factors and the various stages of the final assembly. Experimental results indicate that our method demonstrates outstanding performance in the aircraft final assembly domain. Specifically, for the assembly process documents of the C919 large passenger aircraft, our proposed model achieved a Precision of 82.7%, Recall of 89.1%, and F1 score of 85.4%, representing a substantial improvement over traditional word segmentation methods. leveraging the superior performance of the model, we utilized association rule mining techniques to construct 44,851 high-confidence association rules for the final assembly line of the C919, laying a foundation for subsequent optimization of the production line.

飞机总装是一个复杂的系统,涉及多个方面和多维生产要素。这些因素相互关联,显著影响最终装配过程的效率。为了研究各种生产要素之间的相互关系,本研究引入了一个专门用于飞机总装的微调大语言模型,称为飞机总装ChatGLM (AFA-ChatGLM)。该模型旨在从工艺文件中自动提取有关关键生产因素的基本信息。此外,采用FP-Growth算法揭示了这些生产要素与总装各阶段之间的关联规律。实验结果表明,该方法在飞机总装领域具有良好的性能。具体而言,对于C919大型客机的装配过程文档,我们提出的模型的准确率达到82.7%,召回率为89.1%,F1得分为85.4%,比传统的分词方法有了很大的提高。利用该模型的优越性能,利用关联规则挖掘技术构建了C919总装配线的44,851条高置信度关联规则,为后续的生产线优化奠定了基础。
{"title":"Association rule mining for aircraft assembly process information based on fine-tuned LLM","authors":"Jiaji Shen,&nbsp;Weidong Zhao,&nbsp;Xianhui Liu,&nbsp;Ning Jia,&nbsp;Yingyao Zhang","doi":"10.1007/s43684-025-00111-2","DOIUrl":"10.1007/s43684-025-00111-2","url":null,"abstract":"<div><p>The aircraft final assembly is a complex system, encompassing various aspects and multidimensional production factors. These numerous factors are interconnected, significantly impacting the efficiency of the final assembly process. To investigate the interrelationships among various production factors, this study introduces a specialized fine-tuning large language model for aircraft final assembly, termed Aircraft Final Assembly ChatGLM (AFA-ChatGLM). This model is designed to automatically extract essential information regarding key production factors from process documentation. Furthermore, the FP-Growth algorithm is employed to uncover association rules between these production factors and the various stages of the final assembly. Experimental results indicate that our method demonstrates outstanding performance in the aircraft final assembly domain. Specifically, for the assembly process documents of the C919 large passenger aircraft, our proposed model achieved a Precision of 82.7%, Recall of 89.1%, and F1 score of 85.4%, representing a substantial improvement over traditional word segmentation methods. leveraging the superior performance of the model, we utilized association rule mining techniques to construct 44,851 high-confidence association rules for the final assembly line of the C919, laying a foundation for subsequent optimization of the production line.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2026-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00111-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145930158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal trajectory generation method for robots for rapid handling of diversified products 快速搬运多种产品的机器人最优轨迹生成方法
Pub Date : 2026-01-04 DOI: 10.1007/s43684-025-00122-z
Zhongbo Hao

With the rapid development of logistics and manufacturing industries, traditional handling robots can no longer meet practical needs. In response to this, for the rapid handling of diversified products, research first combines deep learning technology to improve the Double Actors Regularized Critics (DARC) algorithm and design a robot path planning method; Then, a Reachability Analysis-based Time Optimal Trajectory Planning (RA-TOP) algorithm is designed to generate the time optimal trajectory from the interpolated robot path, thereby efficiently achieving the task of rapid handling of diversified products by robots. The findings demonstrate that the enhanced DARC algorithm offers notable benefits in terms of path planning, resulting in shorter paths, reduced curvature, enhanced smoothness, a minimum path length of less than 20 meters, and fewer convergence times, surpassing the performance of alternative algorithms. The time trajectory generation algorithm has a shorter motion time, taking about 1.75 seconds under the same displacement, which is better than the comparison algorithm and can effectively avoid robot motion shaking. Compared with the comparative method, the obstacle avoidance trajectory of the research method is closer to the expected value, with an average deviation of about 0.5 m from the expected trajectory. The application results of the example show that under the research method, the success rate of the handling robot task is 94% or above. The above results indicate that robots can stably and dynamically avoid obstacles, generate optimal trajectories, meet the real-time path planning and efficient handling needs of enterprises, and improve production efficiency under the research method.

随着物流和制造业的快速发展,传统的搬运机器人已经不能满足实际需求。针对这一点,为了快速处理多样化的产品,研究首先结合深度学习技术改进双角色正则化批评(DARC)算法,设计机器人路径规划方法;然后,设计了一种基于可达性分析的时间最优轨迹规划(RA-TOP)算法,从插值后的机器人路径生成时间最优轨迹,从而有效地实现机器人快速搬运多样化产品的任务。研究结果表明,增强的DARC算法在路径规划方面具有显著的优势,路径更短,曲率更小,平滑度更高,最小路径长度小于20米,收敛时间更短,优于替代算法。时间轨迹生成算法的运动时间较短,在相同位移下约为1.75秒,优于对比算法,可以有效避免机器人运动抖动。与比较法相比,本研究方法的避障轨迹更接近期望值,与期望值的平均偏差约为0.5 m。实例应用结果表明,在研究方法下,搬运机器人任务的成功率在94%以上。上述结果表明,在研究方法下,机器人能够稳定、动态地避障,生成最优轨迹,满足企业实时路径规划和高效搬运需求,提高生产效率。
{"title":"Optimal trajectory generation method for robots for rapid handling of diversified products","authors":"Zhongbo Hao","doi":"10.1007/s43684-025-00122-z","DOIUrl":"10.1007/s43684-025-00122-z","url":null,"abstract":"<div><p>With the rapid development of logistics and manufacturing industries, traditional handling robots can no longer meet practical needs. In response to this, for the rapid handling of diversified products, research first combines deep learning technology to improve the Double Actors Regularized Critics (DARC) algorithm and design a robot path planning method; Then, a Reachability Analysis-based Time Optimal Trajectory Planning (RA-TOP) algorithm is designed to generate the time optimal trajectory from the interpolated robot path, thereby efficiently achieving the task of rapid handling of diversified products by robots. The findings demonstrate that the enhanced DARC algorithm offers notable benefits in terms of path planning, resulting in shorter paths, reduced curvature, enhanced smoothness, a minimum path length of less than 20 meters, and fewer convergence times, surpassing the performance of alternative algorithms. The time trajectory generation algorithm has a shorter motion time, taking about 1.75 seconds under the same displacement, which is better than the comparison algorithm and can effectively avoid robot motion shaking. Compared with the comparative method, the obstacle avoidance trajectory of the research method is closer to the expected value, with an average deviation of about 0.5 m from the expected trajectory. The application results of the example show that under the research method, the success rate of the handling robot task is 94% or above. The above results indicate that robots can stably and dynamically avoid obstacles, generate optimal trajectories, meet the real-time path planning and efficient handling needs of enterprises, and improve production efficiency under the research method.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2026-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00122-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145891259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical students’ mobile phones: hotspots for antimicrobial-resistant Gram-negative bacteria 医学生手机:耐药革兰氏阴性菌的热点
Q1 Social Sciences Pub Date : 2025-12-24 DOI: 10.1016/j.jobb.2025.12.002
Ahmed E. Taha , Heba M. Saad Eldien , Mohamed Abouelkheir , Abdulbaqi S. Alduraywish , Ali A. Alanazi , Abdulaziz H. Alruwaili , Mmdoh M. Alrais , Abdulkareem A. Alyousef , Abdullah A. Alrais , Meshal A. Alanazi , Sultan N. Alhudaib , Bandar M. Alazmi , Abdulaziz L. Alruwaili , Gamal Abdelrahman Bakhaat

Introduction

The mobile phones (MPs) of medical personnel can be easily and rapidly contaminated by bacteria from patients or medical devices and by medical school or hospital environments. This is the first study set in Aljouf Province, Saudi Arabia, to assess the prevalence of bacterial contamination of medical students’ MPs, the antimicrobial susceptibility of the isolates and their independent risk factors.

Methodology

Swabs of 250 MPs of medical students were processed using standard microbiological procedures. Data were collected to identify independent contamination risk factors. The automated MicroScan WalkAway Microbiology System was used for bacterial isolate identification and antimicrobial sensitivity/resistance testing.

Results

The prevalence of MPs’ bacterial contamination was 56.00 % (n = 140/250). Multivariate logistic regression and stratified analyses revealed significant associations between MP bacterial contamination and a 10-minute duration since the last hand wash (odds ratio [OR] = 1.788; p = 0.037*) and the presence of breaks in the screen or screen protector of MPs (OR = 1.840; p = 0.038*). The most common bacterial contaminants were Escherichia coli, Klebsiella pneumoniae and Staphylococcus epidermidis, at frequencies of 31.79 %, 28.57 % and 19.29 %, respectively. The high frequency of Gram-negative bacterial contaminants in our geographical area was striking. Although Staphylococcus epidermidis isolates were completely sensitive, Gram-negative isolates were found to have varying degrees of reduced susceptibility to some antimicrobials.

Conclusion

Our findings support previous reports about the potential role of medical students’ MPs in the transmission of bacteria between community, medical education and healthcare (HC) settings. There is an urgent need to implement policies and regulations for MP use and decontamination, especially in medical education and HC settings. To minimise bacterial contamination risk, medical students should frequently wash their hands when in HC, medical education and community settings and ensure that their MP screens and screen protectors remain intact.
医务人员的移动电话(MPs)很容易被患者或医疗设备以及医学院或医院环境的细菌污染。这是在沙特阿拉伯Aljouf省开展的第一项研究,旨在评估医学生MPs中细菌污染的流行程度、分离物的抗菌敏感性及其独立危险因素。方法采用标准微生物程序对医学生250例MPs拭子进行处理。收集数据以确定独立的污染风险因素。采用自动MicroScan WalkAway微生物系统进行细菌分离鉴定和抗菌药物敏感性/耐药性试验。结果MPs细菌污染率为56.00% (n = 140/250)。多因素logistic回归和分层分析显示,MPs细菌污染与上次洗手后10分钟的持续时间(比值比[OR] = 1.788; p = 0.037*)和MPs的屏幕或屏幕保护膜破裂(OR = 1.840; p = 0.038*)之间存在显著关联。最常见的细菌污染物为大肠杆菌、肺炎克雷伯菌和表皮葡萄球菌,频率分别为31.79%、28.57%和19.29%。革兰氏阴性细菌污染物在我们的地理区域的高频率是惊人的。虽然表皮葡萄球菌分离株完全敏感,但革兰氏阴性分离株对某些抗菌素的敏感性有不同程度的降低。结论我们的研究结果支持了先前关于医学生MPs在社区、医学教育和卫生保健(HC)环境之间细菌传播中的潜在作用的报道。目前迫切需要实施多氯联苯使用和净化的政策和法规,特别是在医学教育和卫生保健机构。为了最大限度地降低细菌污染的风险,医学生在HC、医学教育和社区环境中应经常洗手,并确保他们的MP屏幕和屏幕保护膜完好无损。
{"title":"Medical students’ mobile phones: hotspots for antimicrobial-resistant Gram-negative bacteria","authors":"Ahmed E. Taha ,&nbsp;Heba M. Saad Eldien ,&nbsp;Mohamed Abouelkheir ,&nbsp;Abdulbaqi S. Alduraywish ,&nbsp;Ali A. Alanazi ,&nbsp;Abdulaziz H. Alruwaili ,&nbsp;Mmdoh M. Alrais ,&nbsp;Abdulkareem A. Alyousef ,&nbsp;Abdullah A. Alrais ,&nbsp;Meshal A. Alanazi ,&nbsp;Sultan N. Alhudaib ,&nbsp;Bandar M. Alazmi ,&nbsp;Abdulaziz L. Alruwaili ,&nbsp;Gamal Abdelrahman Bakhaat","doi":"10.1016/j.jobb.2025.12.002","DOIUrl":"10.1016/j.jobb.2025.12.002","url":null,"abstract":"<div><h3>Introduction</h3><div>The mobile phones (MPs) of medical personnel can be easily and rapidly contaminated by bacteria from patients or medical devices and by medical school or hospital environments. This is the first study set in Aljouf Province, Saudi Arabia, to assess the prevalence of bacterial contamination of medical students’ MPs, the antimicrobial susceptibility of the isolates and their independent risk factors.</div></div><div><h3>Methodology</h3><div>Swabs of 250 MPs of medical students were processed using standard microbiological procedures. Data were collected to identify independent contamination risk factors. The automated MicroScan WalkAway Microbiology System was used for bacterial isolate identification and antimicrobial sensitivity/resistance testing.</div></div><div><h3>Results</h3><div>The prevalence of MPs’ bacterial contamination was 56.00 % (<em>n</em> = 140/250). Multivariate logistic regression and stratified analyses revealed significant associations between MP bacterial contamination and a 10-minute duration since the last hand wash (odds ratio [OR] = 1.788; <em>p</em> = 0.037*) and the presence of breaks in the screen or screen protector of MPs (OR = 1.840; <em>p</em> = 0.038*). The most common bacterial contaminants were <em>Escherichia coli</em>, <em>Klebsiella pneumoniae</em> and <em>Staphylococcus epidermidis</em>, at frequencies of 31.79 %, 28.57 % and 19.29 %, respectively. The high frequency of Gram-negative bacterial contaminants in our geographical area was striking. Although <em>Staphylococcus epidermidis</em> isolates were completely sensitive, Gram-negative isolates were found to have varying degrees of reduced susceptibility to some antimicrobials.</div></div><div><h3>Conclusion</h3><div>Our findings support previous reports about the potential role of medical students’ MPs in the transmission of bacteria between community, medical education and healthcare (HC) settings. There is an urgent need to implement policies and regulations for MP use and decontamination, especially in medical education and HC settings. To minimise bacterial contamination risk, medical students should frequently wash their hands when in HC, medical education and community settings and ensure that their MP screens and screen protectors remain intact.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"8 1","pages":"Pages 5-16"},"PeriodicalIF":0.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145940166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting tuberculosis prevalence in Afghanistan until 2032: a mathematical modelling analysis 预测阿富汗到2032年的结核病流行:一个数学模型分析
Q1 Social Sciences Pub Date : 2025-12-24 DOI: 10.1016/j.jobb.2025.12.003
Abdul Raqib Muslimyar , Mohammad Farooq Hakimi , Dost Mohammad Faizi , Muhammad Haroon Stanikzai , Naqibullah Wardak

Background

Accurate disease forecasting can inform public health policies. Nonetheless, many countries, including Afghanistan, have yet to learn from this exercise.

Objectives

This study aimed to forecast tuberculosis (TB) prevalence in Afghanistan until 2032 and to estimate the reproduction number R0 using a mathematical model.

Methods

We utilised the susceptible–infected (SI) nonlinear epidemic model to forecast the prevalence of TB in Afghanistan. The model parameters were estimated from the data collected by the Afghan Ministry of Public Health between 2013 and 2022. The goodness-of-fit of the SI model was also assessed.

Results

The SI model predicted that the prevalence of TB in Afghanistan would increase to 0.214058 by 2032. In addition, we parameterised the model using the TB notification data collected between 2013 and 2022 and estimated the basic reproduction number at approximately 3.39.

Conclusion

The study indicates that the SI model predicts a nonlinear increase in TB prevalence in Afghanistan in the years ahead. Therefore, this model can help inform health policymakers in optimising resource allocation and guiding future public health strategies for TB care in the country.
准确的疾病预测可以为公共卫生政策提供信息。然而,包括阿富汗在内的许多国家尚未从这次演习中吸取教训。本研究旨在预测阿富汗到2032年的结核病(TB)患病率,并使用数学模型估计繁殖数R0。方法采用易感感染(SI)非线性流行模型对阿富汗结核病流行进行预测。模型参数是根据阿富汗公共卫生部在2013年至2022年期间收集的数据估计的。还对SI模型的拟合优度进行了评估。结果SI模型预测到2032年阿富汗结核病患病率将上升至0.214058。此外,我们使用2013年至2022年期间收集的结核病报告数据对模型进行了参数化,并估计基本复制数约为3.39。该研究表明,SI模型预测了未来几年阿富汗结核病患病率的非线性增长。因此,该模型可以帮助卫生政策制定者优化资源分配并指导该国未来的结核病治疗公共卫生战略。
{"title":"Forecasting tuberculosis prevalence in Afghanistan until 2032: a mathematical modelling analysis","authors":"Abdul Raqib Muslimyar ,&nbsp;Mohammad Farooq Hakimi ,&nbsp;Dost Mohammad Faizi ,&nbsp;Muhammad Haroon Stanikzai ,&nbsp;Naqibullah Wardak","doi":"10.1016/j.jobb.2025.12.003","DOIUrl":"10.1016/j.jobb.2025.12.003","url":null,"abstract":"<div><h3>Background</h3><div>Accurate disease forecasting can inform public health policies. Nonetheless, many countries, including Afghanistan, have yet to learn from this exercise.</div></div><div><h3>Objectives</h3><div>This study aimed to forecast tuberculosis (TB) prevalence in Afghanistan until 2032 and to estimate the reproduction number <span><math><msub><mi>R</mi><mn>0</mn></msub></math></span> using a mathematical model.</div></div><div><h3>Methods</h3><div>We utilised the susceptible–infected (SI) nonlinear epidemic model to forecast the prevalence of TB in Afghanistan. The model parameters were estimated from the data collected by the Afghan Ministry of Public Health between 2013 and 2022. The goodness-of-fit of the SI model was also assessed.</div></div><div><h3>Results</h3><div>The SI model predicted that the prevalence of TB in Afghanistan would increase to 0.214058 by 2032. In addition, we parameterised the model using the TB notification data collected between 2013 and 2022 and estimated the basic reproduction number at approximately 3.39.</div></div><div><h3>Conclusion</h3><div>The study indicates that the SI model predicts a nonlinear increase in TB prevalence in Afghanistan in the years ahead. Therefore, this model can help inform health policymakers in optimising resource allocation and guiding future public health strategies for TB care in the country.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"8 1","pages":"Pages 1-4"},"PeriodicalIF":0.0,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145891212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chance-constrained optimal power flow for improving line flow and voltage security of power transmission networks 基于机会约束的最优潮流,提高输电网的线路流和电压安全性
Pub Date : 2025-12-23 DOI: 10.1007/s43684-025-00124-x
Yaodan Cui, Yue Song, Kairui Feng, Haonan Xu, Qinyu Wei, Kaiyu Li

With the growing penetration of renewable energy, the impact of renewable uncertainties on power system secure operation is of increasing concern. Based on a recently developed linear power flow model, we formulate a chance-constrained optimal power flow (CC-OPF) in transmission networks that provides a concise way to regulate the security regarding both power and voltage behaviors under renewable uncertainties, the latter of which fails to be captured by the conventional DC power flow model. The formulated CC-OPF finds an optimal operating point for the forecasted scenario and the corresponding generation participation scheme for balancing power fluctuations such that the expectation of generation cost is minimized and the probabilities of line overloading and voltage violations are sufficiently low. The problem under the Gaussian distribution of renewable fluctuations is reformulated into a deterministic problem in the form of second-order cone programming, which can be solved efficiently. The proposed approach is also extended to the non-Gaussian uncertainty case by making use of the linear additivity of probability terms in the Gaussian mixture model. The obtained results are verified via numerical experiments on several IEEE test systems.

随着可再生能源的日益普及,可再生能源的不确定性对电力系统安全运行的影响日益受到关注。基于最近发展的线性潮流模型,我们提出了输电网络中机会约束的最优潮流(CC-OPF),该模型提供了一种简明的方法来调节可再生不确定性下的功率和电压行为的安全性,后者无法被传统的直流潮流模型所捕获。所建立的CC-OPF为预测情景和相应的发电参与方案找到一个最优工作点,以平衡电力波动,使发电成本预期最小,并使线路过载和电压违规的概率足够低。将可再生波动高斯分布下的问题以二阶锥规划的形式重新表述为确定性问题,可以有效地求解。利用高斯混合模型中概率项的线性可加性,将该方法推广到非高斯不确定性情况。在多个IEEE测试系统上进行了数值实验,验证了所得结果。
{"title":"Chance-constrained optimal power flow for improving line flow and voltage security of power transmission networks","authors":"Yaodan Cui,&nbsp;Yue Song,&nbsp;Kairui Feng,&nbsp;Haonan Xu,&nbsp;Qinyu Wei,&nbsp;Kaiyu Li","doi":"10.1007/s43684-025-00124-x","DOIUrl":"10.1007/s43684-025-00124-x","url":null,"abstract":"<div><p>With the growing penetration of renewable energy, the impact of renewable uncertainties on power system secure operation is of increasing concern. Based on a recently developed linear power flow model, we formulate a chance-constrained optimal power flow (CC-OPF) in transmission networks that provides a concise way to regulate the security regarding both power and voltage behaviors under renewable uncertainties, the latter of which fails to be captured by the conventional DC power flow model. The formulated CC-OPF finds an optimal operating point for the forecasted scenario and the corresponding generation participation scheme for balancing power fluctuations such that the expectation of generation cost is minimized and the probabilities of line overloading and voltage violations are sufficiently low. The problem under the Gaussian distribution of renewable fluctuations is reformulated into a deterministic problem in the form of second-order cone programming, which can be solved efficiently. The proposed approach is also extended to the non-Gaussian uncertainty case by making use of the linear additivity of probability terms in the Gaussian mixture model. The obtained results are verified via numerical experiments on several IEEE test systems.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00124-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145831325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-ViT: hardware-friendly post-training quantization for efficient vision transformer inference H-ViT:硬件友好的训练后量化,用于有效的视觉变压器推理
Pub Date : 2025-12-23 DOI: 10.1007/s43684-025-00121-0
Jing Liu, Jiaqi Lai, Xiaodong Deng, Caigui Jiang, Nanning Zheng

Vision Transformers (ViTs) have achieved state-of-the-art performance on various computer vision tasks. However these models are memory-consuming and computation-intensive, making their deployment and efficient inference on edge devices challenging. Model quantization is a promising approach to reduce model complexity. Prior works have explored tailored quantization algorithms for ViTs but unfortunately retained floating-point (FP) scaling factors, which not only yield non-negligible re-quantization overhead, but also hinder the quantized models to perform efficient integer-only inference. In this paper, we propose H-ViT, a dedicated post-training quantization scheme (e.g., symmetric uniform quantization and layer-wise quantization for both weights and part of activations) to effectively quantize ViTs with fewer Power-of-Two (PoT) scaling factors, thus minimizing the re-quantization overhead and memory consumption. In addition, observing serious inter-channel variation in LayerNorm inputs and outputs, we propose Power-of-Two quantization (PTQ), a systematic method to reducing the performance degradation without hyper-parameters. Extensive experiments are conducted on multiple vision tasks with different model variants, proving that H-ViT offers comparable(or even slightly higher) INT8 quantization performance with PoT scaling factors when compared to the counterpart with floating-point scaling factors. For instance, we reach 78.43 top-1 accuracy with DeiT-S on ImageNet, 51.6 box AP and 44.8 mask AP with Cascade Mask R-CNN (Swin-B) on COCO.

视觉变压器(ViTs)在各种计算机视觉任务中取得了最先进的性能。然而,这些模型是内存消耗和计算密集型的,使得它们在边缘设备上的部署和有效推理具有挑战性。模型量化是一种很有前途的降低模型复杂性的方法。先前的工作已经探索了针对vit的定制量化算法,但不幸的是保留了浮点(FP)缩放因子,这不仅会产生不可忽略的重新量化开销,而且还会阻碍量化模型执行有效的纯整数推理。在本文中,我们提出了H-ViT,一种专用的训练后量化方案(例如,对权重和部分激活进行对称均匀量化和分层量化),以更少的2次方(PoT)缩放因子有效地量化vit,从而最大限度地减少了再量化开销和内存消耗。此外,观察到LayerNorm输入和输出在信道间的严重变化,我们提出了2次幂量化(PTQ),这是一种系统的方法,可以在没有超参数的情况下减少性能下降。在不同模型变量的多个视觉任务上进行了大量实验,证明与使用浮点比例因子相比,使用PoT比例因子的H-ViT具有相当(甚至略高)的INT8量化性能。例如,我们在ImageNet上使用DeiT-S达到78.43的top-1精度,在COCO上使用Cascade mask R-CNN (swun - b)达到51.6的box AP和44.8的mask AP。
{"title":"H-ViT: hardware-friendly post-training quantization for efficient vision transformer inference","authors":"Jing Liu,&nbsp;Jiaqi Lai,&nbsp;Xiaodong Deng,&nbsp;Caigui Jiang,&nbsp;Nanning Zheng","doi":"10.1007/s43684-025-00121-0","DOIUrl":"10.1007/s43684-025-00121-0","url":null,"abstract":"<div><p>Vision Transformers (ViTs) have achieved state-of-the-art performance on various computer vision tasks. However these models are memory-consuming and computation-intensive, making their deployment and efficient inference on edge devices challenging. Model quantization is a promising approach to reduce model complexity. Prior works have explored tailored quantization algorithms for ViTs but unfortunately retained floating-point (FP) scaling factors, which not only yield non-negligible re-quantization overhead, but also hinder the quantized models to perform efficient integer-only inference. In this paper, we propose H-ViT, a dedicated post-training quantization scheme (e.g., symmetric uniform quantization and layer-wise quantization for both weights and part of activations) to effectively quantize ViTs with fewer Power-of-Two (PoT) scaling factors, thus minimizing the re-quantization overhead and memory consumption. In addition, observing serious inter-channel variation in LayerNorm inputs and outputs, we propose Power-of-Two quantization (PTQ), a systematic method to reducing the performance degradation without hyper-parameters. Extensive experiments are conducted on multiple vision tasks with different model variants, proving that H-ViT offers comparable(or even slightly higher) INT8 quantization performance with PoT scaling factors when compared to the counterpart with floating-point scaling factors. For instance, we reach 78.43 top-1 accuracy with DeiT-S on ImageNet, 51.6 box AP and 44.8 mask AP with Cascade Mask R-CNN (Swin-B) on COCO.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00121-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145831322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ESCAPE: an efficient and safe distributed UAV swarm exploration framework with collision avoidance perception ESCAPE:一种高效安全的具有避碰感知的分布式无人机群探测框架
Pub Date : 2025-12-22 DOI: 10.1007/s43684-025-00123-y
Yaoyang Bao, Siyuan Du, Qingwei Jiang, Yixuan Li, Bochao Zhao, Gang Wang, Qingwen Liu, Mingliang Xiong

Significant progress has been made in distributed unmanned aerial vehicle (UAV) swarm exploration. In complex scenarios, existing methods typically rely on shared trajectory information for collision avoidance, but communication timeliness issues may result in outdated trajectories being referenced when making collision avoidance decisions, preventing timely responses to the motion changes of other UAVs, thus elevating the collision risk. To address this issue, this paper proposes a new distributed UAV swarm exploration framework. First, we introduce an improved global exploration strategy that combines the exploration task requirements with the surrounding obstacle distribution to plan an efficient and safe coverage path. Secondly, we design a collision risk prediction method based on relative distance and relative velocity, which effectively assists UAVs in making timely collision avoidance decisions. Lastly, we propose a multi-objective local trajectory optimization function that considers the positions of UAVs and static obstacles, thereby planning safe flight trajectories. Extensive simulations and real-world experiments demonstrate that this framework enables safe and efficient exploration in complex environments.

分布式无人机(UAV)群探测技术取得了重大进展。在复杂场景下,现有方法通常依赖于共享轨迹信息进行避碰,但通信时效性问题可能导致在进行避碰决策时引用过时轨迹,无法及时响应其他无人机的运动变化,从而增加了碰撞风险。针对这一问题,本文提出了一种新的分布式无人机群探测框架。首先,提出了一种改进的全局勘探策略,将勘探任务需求与周围障碍物分布相结合,规划出高效安全的覆盖路径;其次,设计了一种基于相对距离和相对速度的碰撞风险预测方法,有效帮助无人机及时做出避碰决策。最后,我们提出了一个考虑无人机位置和静态障碍物的多目标局部轨迹优化函数,从而规划出安全的飞行轨迹。大量的模拟和真实世界的实验表明,该框架能够在复杂环境中安全有效地进行探索。
{"title":"ESCAPE: an efficient and safe distributed UAV swarm exploration framework with collision avoidance perception","authors":"Yaoyang Bao,&nbsp;Siyuan Du,&nbsp;Qingwei Jiang,&nbsp;Yixuan Li,&nbsp;Bochao Zhao,&nbsp;Gang Wang,&nbsp;Qingwen Liu,&nbsp;Mingliang Xiong","doi":"10.1007/s43684-025-00123-y","DOIUrl":"10.1007/s43684-025-00123-y","url":null,"abstract":"<div><p>Significant progress has been made in distributed unmanned aerial vehicle (UAV) swarm exploration. In complex scenarios, existing methods typically rely on shared trajectory information for collision avoidance, but communication timeliness issues may result in outdated trajectories being referenced when making collision avoidance decisions, preventing timely responses to the motion changes of other UAVs, thus elevating the collision risk. To address this issue, this paper proposes a new distributed UAV swarm exploration framework. First, we introduce an improved global exploration strategy that combines the exploration task requirements with the surrounding obstacle distribution to plan an efficient and safe coverage path. Secondly, we design a collision risk prediction method based on relative distance and relative velocity, which effectively assists UAVs in making timely collision avoidance decisions. Lastly, we propose a multi-objective local trajectory optimization function that considers the positions of UAVs and static obstacles, thereby planning safe flight trajectories. Extensive simulations and real-world experiments demonstrate that this framework enables safe and efficient exploration in complex environments.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00123-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145831294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing object detection through global collaborative learning 通过全局协同学习增强目标检测
Pub Date : 2025-12-10 DOI: 10.1007/s43684-025-00114-z
Weidong Zhao, Jian Chen, Xianhui Liu, Jiahuan Liu

Object detection serves as a challenging yet crucial task in computer vision. Despite significant advancements, modern detectors remain struggling with task alignment between localization and classification. In this paper, Global Collaborative Learning (GCL) is introduced to address these challenges from often-overlooked perspectives. First, the essence of GCL is reflected in the label assignment of the detector. Adjusting the loss function to transform samples with strong localization yet weak classification into high-quality samples in both tasks, provides more effective training signals, enabling the model to capture key consistent features. Second, the spirit of GCL is embodied in the head design. By enabling global feature interaction within the decoupled head, the approach ensures that final predictions are made more comprehensively and robustly, thereby preventing the two independent branches from converging into suboptimal solutions for their respective tasks. Extensive experiments on the challenging MS COCO and CrowdHuman datasets demonstrate that the proposed GCL method substantially enhances performance and generalization capabilities.

在计算机视觉中,目标检测是一项具有挑战性但又至关重要的任务。尽管取得了重大进展,但现代检测器仍然在定位和分类之间的任务对齐方面苦苦挣扎。本文介绍了全球协作学习(GCL)从经常被忽视的角度来解决这些挑战。首先,GCL的本质体现在检测器的标签分配上。通过调整损失函数,将强定位弱分类的样本在两个任务中都转化为高质量的样本,提供更有效的训练信号,使模型能够捕捉到关键的一致性特征。其次,协鑫的精神体现在头部设计上。通过在解耦头部内实现全局特征交互,该方法确保最终预测更加全面和稳健,从而防止两个独立分支收敛为各自任务的次优解。在具有挑战性的MS COCO和CrowdHuman数据集上进行的大量实验表明,所提出的GCL方法大大提高了性能和泛化能力。
{"title":"Enhancing object detection through global collaborative learning","authors":"Weidong Zhao,&nbsp;Jian Chen,&nbsp;Xianhui Liu,&nbsp;Jiahuan Liu","doi":"10.1007/s43684-025-00114-z","DOIUrl":"10.1007/s43684-025-00114-z","url":null,"abstract":"<div><p>Object detection serves as a challenging yet crucial task in computer vision. Despite significant advancements, modern detectors remain struggling with task alignment between localization and classification. In this paper, Global Collaborative Learning (GCL) is introduced to address these challenges from often-overlooked perspectives. First, the essence of GCL is reflected in the label assignment of the detector. Adjusting the loss function to transform samples with strong localization yet weak classification into high-quality samples in both tasks, provides more effective training signals, enabling the model to capture key consistent features. Second, the spirit of GCL is embodied in the head design. By enabling global feature interaction within the decoupled head, the approach ensures that final predictions are made more comprehensively and robustly, thereby preventing the two independent branches from converging into suboptimal solutions for their respective tasks. Extensive experiments on the challenging MS COCO and CrowdHuman datasets demonstrate that the proposed GCL method substantially enhances performance and generalization capabilities.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00114-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1