Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Deep Learning-Based Health Assessment Method for Benzene-to-Ethylene Ratio Control Systems under Incomplete Data

    Huichao Cao1,*, Honghe Du1, Dongnian Jiang1, Wei Li1, Lei Du1, Jianfeng Yang2

    Structural Durability & Health Monitoring, Vol.19, No.5, pp. 1305-1325, 2025, DOI:10.32604/sdhm.2025.066002 - 05 September 2025

    Abstract In the production processes of modern industry, accurate assessment of the system’s health state and traceability non-optimal factors are key to ensuring “safe, stable, long-term, full load and optimal” operation of the production process. The benzene-to-ethylene ratio control system is a complex system based on an MPC-PID double-layer architecture. Taking into consideration the interaction between levels, coupling between loops and conditions of incomplete operation data, this paper proposes a health assessment method for the dual-layer control system by comprehensively utilizing deep learning technology. Firstly, according to the results of the pre-assessment of the system layers… More >

  • Open Access

    ARTICLE

    Adversarial Active Learning for Named Entity Recognition in Cybersecurity

    Tao Li1, Yongjin Hu1,*, Ankang Ju1, Zhuoran Hu2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 407-420, 2021, DOI:10.32604/cmc.2020.012023 - 30 October 2020

    Abstract Owing to the continuous barrage of cyber threats, there is a massive amount of cyber threat intelligence. However, a great deal of cyber threat intelligence come from textual sources. For analysis of cyber threat intelligence, many security analysts rely on cumbersome and time-consuming manual efforts. Cybersecurity knowledge graph plays a significant role in automatics analysis of cyber threat intelligence. As the foundation for constructing cybersecurity knowledge graph, named entity recognition (NER) is required for identifying critical threat-related elements from textual cyber threat intelligence. Recently, deep neural network-based models have attained very good results in NER.… More >

Displaying 1-10 on page 1 of 2. Per Page