Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 189
Filtrar
1.
Natl Sci Rev ; 11(6): nwae070, 2024 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-38707199

RESUMO

A highlight of the chaotic spiking backpropagation (CSBP) method, which is a powerful tool for directly training spiking neural networks and helps to understand the learning mechanisms of human brain.

2.
Chaos ; 34(4)2024 Apr 01.
Artigo em Inglês | MEDLINE | ID: mdl-38639346

RESUMO

A complex networked system typically has a time-varying nature in interactions among its components, which is intrinsically complicated and therefore technically challenging for analysis and control. This paper investigates an epidemic process on a time-varying network with a time delay. First, an averaging theorem is established to approximate the delayed time-varying system using autonomous differential equations for the analysis of system evolution. On this basis, the critical time delay is determined, across which the endemic equilibrium becomes unstable and a phase transition to oscillation in time via Hopf bifurcation will appear. Then, numerical examples are examined, including a periodically time-varying network, a blinking network, and a quasi-periodically time-varying network, which are simulated to verify the theoretical results. Further, it is demonstrated that the existence of time delay can extend the network frequency range to generate Turing patterns, showing a facilitating effect on phase transitions.

3.
Adv Sci (Weinh) ; 11(16): e2306915, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-38357830

RESUMO

Recent studies suggest that circular RNA (circRNA)-mediated post-translational modification of RNA-binding proteins (RBP) plays a pivotal role in metastasis of hepatocellular carcinoma (HCC). However, the specific mechanism and potential clinical therapeutic significance remain vague. This study attempts to profile the regulatory networks of circRNA and RBP using a multi-omics approach. Has_circ_0006646 (circ0006646) is an unreported circRNA in HCC and is associated with a poor prognosis. Silencing of circ0006646 significantly hinders metastasis in vivo. Mechanistically, circ0006646 prevents the interaction between nucleolin (NCL) and the E3 ligase tripartite motif-containing 21 to reduce the proteasome-mediated degradation of NCL via K48-linked polyubiquitylation. Furthermore, the change of NCL expression is proven to affect the phosphorylation levels of multiple proteins and inhibit p53 translation. Moreover, patient-derived tumor xenograft and lentivirus injection, which is conducted to simulate clinical treatment confirmed the potential therapeutic value. Overall, this study describes the integrated multi-omics landscape of circRNA-mediated NCL ubiquitination degradation in HCC metastasis and provides a novel therapeutic target.


Assuntos
Carcinoma Hepatocelular , Neoplasias Hepáticas , RNA Circular , Ubiquitinação , Carcinoma Hepatocelular/genética , Carcinoma Hepatocelular/metabolismo , Carcinoma Hepatocelular/patologia , Neoplasias Hepáticas/genética , Neoplasias Hepáticas/metabolismo , Neoplasias Hepáticas/patologia , Humanos , RNA Circular/genética , RNA Circular/metabolismo , Ubiquitinação/genética , Camundongos , Animais , Proteínas de Ligação a RNA/genética , Proteínas de Ligação a RNA/metabolismo , Linhagem Celular Tumoral , Nucleolina , Metástase Neoplásica/genética , Proteínas com Motivo Tripartido/genética , Proteínas com Motivo Tripartido/metabolismo , Modelos Animais de Doenças , Multiômica
4.
Chaos ; 34(2)2024 Feb 01.
Artigo em Inglês | MEDLINE | ID: mdl-38421854

RESUMO

In this article, a family of diffeomorphisms with growing horseshoes contained in global attracting regions is presented, where the dimension of the unstable direction can be any fixed integer and a growing horseshoe means that the number of the folds of the horseshoe is increasing as a parameter is varied. Moreover, it is demonstrated that the horseshoe-like attractors are observable for certain parameters.

5.
IEEE Trans Cybern ; PP2024 Jan 30.
Artigo em Inglês | MEDLINE | ID: mdl-38289844

RESUMO

Network games primarily explore the intricacies of individual interactions and adaptive strategies within a network. Building upon this framework, the present study delves into the modeling, analysis, and control of heterogeneously networked evolutionary games with intergroup conflicts heterogeneously networked evolutionary games with intergroup conflict (HNEG-IC), where attacking players possess area-monitoring capabilities with limited attacking power. To begin with, a mathematical model is introduced to capture intragroup strategy dynamics and intergroup conflicts of HNEGs-IC via the algebraic state space representationalgebraic state space representation (ASSR). A necessary and sufficient condition for achieving global cooperation of HNEGs-IC is established. Then, a criterion for verifying the κ -cooperation below a certain mortality is presented. Considering the HNEGs-IC with strategy feedback control, it is proven that the feedback control, subject to global cooperation, is robust to conflicts when the intersection of the strategy threshold set and the reachable set of the preset initial strategy profiles is empty. Finally, for verification and demonstration, the obtained results are applied to a simplified virtual game model of the NATO and the Warsaw Pact.

6.
IEEE Trans Cybern ; 54(4): 2271-2283, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-37159318

RESUMO

The convergence rate and applicability to directed graphs with interaction topologies are two important features for practical applications of distributed optimization algorithms. In this article, a new kind of fast distributed discrete-time algorithms is developed for solving convex optimization problems with closed convex set constraints over directed interaction networks. Under the gradient tracking framework, two distributed algorithms are, respectively, designed over balanced and unbalanced graphs, where momentum terms and two time-scales are involved. Furthermore, it is demonstrated that the designed distributed algorithms attain linear speedup convergence rates provided that the momentum coefficients and the step size are appropriately selected. Finally, numerical simulations verify the effectiveness and the global accelerated effect of the designed algorithms.

7.
IEEE Trans Cybern ; 54(2): 667-678, 2024 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-38127616

RESUMO

This article addresses the cooperative time-varying formation fuzzy tracking control problem for a cluster of heterogeneous multiple marine surface vehicles subject to unknown nonlinearity and actuator failures. The proposed cooperative control scheme consists of two parts: 1) a distributed time-varying formation observer and 2) a decentralized adaptive fuzzy tracking controller. The distributed observer is designed to obtain a predefined time-varying formation pattern under a directed communication topology. Subsequently, based on the states of the distributed observer, a decentralized fuzzy tracking control law is developed using fuzzy-logic systems and the adaptive approach. Lyapunov functions are constructed to guarantee that the controlled marine vehicles attain the desired time-varying formation with asymptotical stability of tracking errors. Finally, simulation results are presented to validate the efficacy of the proposed control methodology.

8.
Chaos ; 33(8)2023 Aug 01.
Artigo em Inglês | MEDLINE | ID: mdl-38060786

RESUMO

Li-Yorke chaos of linear differential equations in a finite-dimensional space with a weak topology is introduced. Based on this topology on the Euclidean space, a flow generated from a linear differential equation is proved to be Li-Yorke chaotic under certain conditions, which is in sharp contract to the well-known fact that linear differential equations cannot be chaotic in a finite-dimensional space with a strong topology.

9.
MedComm (2020) ; 4(6): e444, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-38098611

RESUMO

Liver transplantation (LT) stands as the gold standard for treating end-stage liver disease and hepatocellular carcinoma, yet postoperative complications continue to impact survival rates. The liver's unique immune system, governed by a microenvironment of diverse immune cells, is disrupted during processes like ischemia-reperfusion injury posttransplantation, leading to immune imbalance, inflammation, and subsequent complications. In the posttransplantation period, immune cells within the liver collaboratively foster a tolerant environment, crucial for immune tolerance and liver regeneration. While clinical trials exploring cell therapy for LT complications exist, a comprehensive summary is lacking. This review provides an insight into the intricacies of the liver's immune microenvironment, with a specific focus on macrophages and T cells as primary immune players. Delving into the immunological dynamics at different stages of LT, we explore the disruptions after LT and subsequent immune responses. Focusing on immune cell targeting for treating liver transplant complications, we provide a comprehensive summary of ongoing clinical trials in this domain, especially cell therapies. Furthermore, we offer innovative treatment strategies that leverage the opportunities and prospects identified in the therapeutic landscape. This review seeks to advance our understanding of LT immunology and steer the development of precise therapies for postoperative complications.

10.
IEEE J Biomed Health Inform ; 27(12): 6100-6111, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-37713230

RESUMO

The COVID-19 pandemic brought not only global devastation but also an unprecedented infodemic of false or misleading information that spread rapidly through online social networks. Network analysis plays a crucial role in the science of fact-checking by modeling and learning the risk of infodemics through statistical processes and computation on mega-sized graphs. This article proposes MEGA, Machine Learning-Enhanced Graph Analytics, a framework that combines feature engineering and graph neural networks to enhance the efficiency of learning performance involving massive graphs. Infodemic risk analysis is a unique application of the MEGA framework, which involves detecting spambots by counting triangle motifs and identifying influential spreaders by computing the distance centrality. The MEGA framework is evaluated using the COVID-19 pandemic Twitter dataset, demonstrating superior computational efficiency and classification accuracy.


Assuntos
COVID-19 , Infodemia , Humanos , Pandemias , COVID-19/epidemiologia , Aprendizado de Máquina , Gestão de Riscos
11.
Chaos ; 33(9)2023 Sep 01.
Artigo em Inglês | MEDLINE | ID: mdl-37729102

RESUMO

The concept of network resilience has gained increasing attention in the last few decades owing to its great potential in strengthening and maintaining complex systems. From network-based approaches, researchers have explored resilience of real ecological systems comprising diverse types of interactions, such as mutualism, antagonist, and predation, or mixtures of them. In this paper, we propose a dimension-reduction method for analyzing the resilience of hybrid herbivore-plant-pollinator networks. We qualitatively evaluate the contribution of species toward maintaining resilience of networked systems, as well as the distinct roles played by different categories of species. Our findings demonstrate that the strong contributors to network resilience within each category are more vulnerable to extinction. Notably, among the three types of species in consideration, plants exhibit a higher likelihood of extinction, compared to pollinators and herbivores.

12.
Research (Wash D C) ; 6: 0230, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37719051

RESUMO

Topological data analysis can extract effective information from higher-dimensional data. Its mathematical basis is persistent homology. The persistent homology can calculate topological features at different spatiotemporal scales of the dataset, that is, establishing the integrated taxonomic relation among points, lines, and simplices. Here, the simplicial network composed of all-order simplices in a simplicial complex is essential. Because the sequence of nested simplicial subnetworks can be regarded as a discrete Morse function from the simplicial network to real values, a method based on the concept of critical simplices can be developed by searching all-order spanning trees. Employing this new method, not only the Morse function values with the theoretical minimum number of critical simplices can be obtained, but also the Betti numbers and composition of all-order cavities in the simplicial network can be calculated quickly. Finally, this method is used to analyze some examples and compared with other methods, showing its effectiveness and feasibility.

13.
Sci Rep ; 13(1): 13918, 2023 Aug 25.
Artigo em Inglês | MEDLINE | ID: mdl-37626069

RESUMO

In this paper, we propose a new type of nonlinear strict distance and similarity measures for intuitionistic fuzzy sets (IFSs). Our proposed methods not only have good properties, but also improve the drawbacks proposed by Mahanta and Panda (Int J Intell Syst 36(2):615-627, 2021) in which, for example, their distance value of [Formula: see text] is always equal to the maximum value 1 for any intuitionistic fuzzy number [Formula: see text]. To resolve these problems in Mahanta and Panda (Int J Intell Syst 36(2):615-627, 2021), we establish a nonlinear parametric distance measure for IFSs and prove that it satisfies the axiomatic definition of strict intuitionistic fuzzy distances and preserves all advantages of distance measures. In particular, our proposed distance measure can effectively distinguish different IFSs with high hesitancy. Meanwhile, we obtain that the dual similarity measure and the induced entropy of our proposed distance measure satisfy the axiomatic definitions of strict intuitionistic fuzzy similarity measure and intuitionistic fuzzy entropy. Finally, we apply our proposed distance and similarity measures to pattern classification, decision making on the choice of a proper antivirus face mask for COVID-19, and medical diagnosis problems, to illustrate the effectiveness of the new methods.

14.
Chaos ; 33(7)2023 Jul 01.
Artigo em Inglês | MEDLINE | ID: mdl-37463096

RESUMO

Traditional network analysis focuses on the representation of complex systems with only pairwise interactions between nodes. However, the higher-order structure, which is beyond pairwise interactions, has a great influence on both network dynamics and function. Ranking cliques could help understand more emergent dynamical phenomena in large-scale complex networks with higher-order structures, regarding important issues, such as behavioral synchronization, dynamical evolution, and epidemic spreading. In this paper, motivated by multi-node interactions in a topological simplex, several higher-order centralities are proposed, namely, higher-order cycle (HOC) ratio, higher-order degree, higher-order H-index, and higher-order PageRank (HOP), to quantify and rank the importance of cliques. Experiments on both synthetic and real-world networks support that, compared with other traditional network metrics, the proposed higher-order centralities effectively reduce the dimension of a large-scale network and are more accurate in finding a set of vital nodes. Moreover, since the critical cliques ranked by the HOP and the HOC are scattered over a complex network, the HOP and the HOC outperform other metrics in ranking cliques that are vital in maintaining the network connectivity, thereby facilitating network dynamical synchronization and virus spread control in applications.

15.
Artigo em Inglês | MEDLINE | ID: mdl-37310824

RESUMO

Deep learning technology has found a promising application in lightweight model design, for which pruning is an effective means of achieving a large reduction in both model parameters and float points operations (FLOPs). The existing neural network pruning methods mostly start from the consideration of the importance of model parameters and design parameter evaluation metrics to perform parameter pruning iteratively. These methods were not studied from the perspective of network model topology, so they might be effective but not efficient, and they require completely different pruning for different datasets. In this article, we study the graph structure of the neural network and propose a regular graph pruning (RGP) method to perform a one-shot neural network pruning. Specifically, we first generate a regular graph and set its node-degree values to meet the preset pruning ratio. Then, we reduce the average shortest path-length (ASPL) of the graph by swapping edges to obtain the optimal edge distribution. Finally, we map the obtained graph to a neural network structure to realize pruning. Our experiments demonstrate that the ASPL of the graph is negatively correlated with the classification accuracy of the neural network and that RGP has a strong precision retention capability with high parameter reduction (more than 90%) and FLOPs reduction (more than 90%) (the code for quick use and reproduction is available at https://github.com/Holidays1999/Neural-Network-Pruning-through-its-RegularGraph-Structure).

16.
Artigo em Inglês | MEDLINE | ID: mdl-37220060

RESUMO

Network robustness refers to the ability of a network to continue its functioning against malicious attacks, which is critical for various natural and industrial networks. Network robustness can be quantitatively measured by a sequence of values that record the remaining functionality after a sequential node-or edge-removal attacks. Robustness evaluations are traditionally determined by attack simulations, which are computationally very time-consuming and sometimes practically infeasible. The convolutional neural network (CNN)-based prediction provides a cost-efficient approach to fast evaluating the network robustness. In this article, the prediction performances of the learning feature representation-based CNN (LFR-CNN) and PATCHY-SAN methods are compared through extensively empirical experiments. Specifically, three distributions of network size in the training data are investigated, including the uniform, Gaussian, and extra distributions. The relationship between the CNN input size and the dimension of the evaluated network is studied. Extensive experimental results reveal that compared to the training data of uniform distribution, the Gaussian and extra distributions can significantly improve both the prediction performance and the generalizability, for both LFR-CNN and PATCHY-SAN, and for various functionality robustness. The extension ability of LFR-CNN is significantly better than PATCHY-SAN, verified by extensive comparisons on predicting the robustness of unseen networks. In general, LFR-CNN outperforms PATCHY-SAN, and thus LFR-CNN is recommended over PATCHY-SAN. However, since both LFR-CNN and PATCHY-SAN have advantages for different scenarios, the optimal settings of the input size of CNN are recommended under different configurations.

17.
Inf Sci (N Y) ; 628: 469-487, 2023 May.
Artigo em Inglês | MEDLINE | ID: mdl-36777698

RESUMO

The COVID-19 pandemic was caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), which is a single-stranded positive-stranded RNA virus with a high multi-directional mutation rate. Many new variants even have an immune-evading property, which means that some individuals with antibodies against one variant can be reinfected by other variants. As a result, the realistic is still suffering from new waves of COVID-19 by its new variants. How to control the transmission or even eradicate the COVID-19 pandemic remains a critical issue for the whole world. This work presents an epidemiological framework for mimicking the multi-directional mutation process of SARS-CoV-2 and the epidemic spread of COVID-19 under realistic scenarios considering multiple variants. The proposed framework is used to evaluate single and combined public health interventions, which include non-pharmaceutical interventions, pharmaceutical interventions, and vaccine interventions under the existence of multi-directional mutations of SARS-CoV-2. The results suggest that several combined intervention strategies give optimal results and are feasible, requiring only moderate levels of individual interventions. Furthermore, the results indicate that even if the mutation rate of SARS-CoV-2 decreased 100 times, the pandemic would still not be eradicated without appropriate public health interventions.

18.
IEEE Trans Cybern ; 53(2): 1324-1334, 2023 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-34860660

RESUMO

Applying the chaos theory for secure digital communications is promising and it is well acknowledged that in such applications the underlying chaotic systems should be carefully chosen. However, the requirements imposed on the chaotic systems are usually heuristic, without theoretic guarantee for the resultant communication scheme. Among all the primitives for secure communications, it is well accepted that (pseudo) random numbers are most essential. Taking the well-studied 2-D coupled map lattice (2D CML) as an example, this article performs a theoretical study toward pseudorandom number generation with the 2D CML. In so doing, an analytical expression of the Lyapunov exponent (LE) spectrum of the 2D CML is first derived. Using the LEs, one can configure system parameters to ensure the 2D CML only exhibits complex dynamic behavior, and then collect pseudorandom numbers from the system orbits. Moreover, based on the observation that least significant bit distributes more evenly in the (pseudo) random distribution, an extraction algorithm E is developed with the property that when applied to the orbits of the 2D CML, it can squeeze uniform bits. In implementation, if fixed-point arithmetic is used in binary format with a precision of z bits after the radix point, E can ensure that the deviation of the squeezed bits is bounded by 2-z . Further simulation results demonstrate that the new method not only guides the 2D CML model to exhibit complex dynamic behavior but also generates uniformly distributed independent bits with good efficiency. In particular, the squeezed pseudorandom bits can pass both NIST 800-22 and TestU01 test suites in various settings. This study thereby provides a theoretical basis for effectively applying the 2D CML to secure communications.

19.
IEEE Trans Cybern ; 53(9): 5585-5595, 2023 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-35358055

RESUMO

Removing noisy links from an observed network is a task commonly required for preprocessing real-world network data. However, containing both noisy and clean links, the observed network cannot be treated as a trustworthy information source for supervised learning. Therefore, it is necessary but also technically challenging to detect noisy links in the context of data contamination. To address this issue, in the present article, a two-phased computational model is proposed, called link-information augmented twin autoencoders, which is able to deal with: 1) link information augmentation; 2) link-level contrastive denoising; 3) link information correction. Extensive experiments on six real-world networks verify that the proposed model outperforms other comparable methods in removing noisy links from the observed network so as to recover the real network from the corrupted one very accurately. Extended analyses also provide interpretable evidence to support the superiority of the proposed model for the task of network denoising.

20.
IEEE Trans Neural Netw Learn Syst ; 34(10): 7824-7837, 2023 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-35143405

RESUMO

Memristor is an ideal electronic device used as an artificial nerve synapse due to its unique memory function. This article presents a design of a new Hopfield neural network (HNN) that can generate multiscroll attractors by utilizing a new memristor as a synapse in the HNN. Differing from the others, this memristor is constructed with hyperbolic tangent functions. Taking the memristor as a self-feedback synapse of a neuron in the HNN, the memristive HNN can yield multidouble-scroll attractors, and its parameters can be used to effectively control the number of double scrolls contained in an attractor. Interestingly, the generation of multidouble-scroll attractors is independent of the memductance function but depends only on the internal state equation. Thus, the memductance function can be adjusted to yield various complex dynamical behaviors. Moreover, amplitude control effects and quantitatively controllable multistability are revealed by numerical analysis. The accurate reproduction of some dynamical behaviors by a designed circuit verifies the correctness of the numerical analysis. Finally, based on the proposed memristive HNN, a novel image encryption scheme in the 3-D setting is designed and evaluated, demonstrating its good encryption performances.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...