Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (221)

Search Parameters:
Keywords = entity–relationship extraction

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 6007 KB  
Article
Geometry and Topology Preservable Line Structure Construction for Indoor Point Cloud Based on the Encoding and Extracting Framework
by Haiyang Lyu, Hongxiao Xu, Donglai Jiao and Hanru Zhang
Remote Sens. 2025, 17(17), 3033; https://doi.org/10.3390/rs17173033 - 1 Sep 2025
Abstract
The line structure is an efficient form of representation and modeling for LiDAR point clouds, while the Line Structure Construction (LSC) method aims to extract complete and coherent line structures from complex 3D point clouds, thereby providing a foundation for geometric modeling, scene [...] Read more.
The line structure is an efficient form of representation and modeling for LiDAR point clouds, while the Line Structure Construction (LSC) method aims to extract complete and coherent line structures from complex 3D point clouds, thereby providing a foundation for geometric modeling, scene understanding, and downstream applications. However, traditional LSC methods often fall short in preserving both the geometric integrity and topological connectivity of line structures derived from such datasets. To address this issue, we propose the Geometry and Topology Preservable Line Structure Construction (GTP-LSC) method, based on the Encoding and Extracting Framework (EEF). First, in the encoding phase, point cloud features related to line structures are mapped into a high-dimensional feature space. A 3D U-Net is then employed to compute Subsets with Structure feature of Line (SSL) from the dense, unstructured, and noisy indoor LiDAR point cloud data. Next, in the extraction phase, the SSL is transformed into a 3D field enriched with line features. Initially extracted line structures are then constructed based on Morse theory, effectively preserving the topological relationships. In the final step, these line structures are optimized using RANdom SAmple Consensus (RANSAC) and Constructive Solid Geometry (CSG) to ensure geometric completeness. This step also facilitates the generation of complex entities, enabling an accurate and comprehensive representation of both geometric and topological aspects of the line structures. Experiments were conducted using the Indoor Laser Scanning Dataset, focusing on the parking garage (D1), the corridor (D2), and the multi-room structure (D3). The results demonstrated that the proposed GTP-LSC method outperformed existing approaches in terms of both geometric integrity and topological connectivity. To evaluate the performance of different LSC methods, the IoU Buffer Ratio (IBR) was used to measure the overlap between the actual and constructed line structures. The proposed method achieved IBR scores of 92.5% (D1), 94.2% (D2), and 90.8% (D3) for these scenes. Additionally, Precision, Recall, and F-Score were calculated to further assess the LSC results. The F-Score of the proposed method was 0.89 (D1), 0.92 (D2), and 0.89 (D3), demonstrating superior performance in both visual analysis and quantitative results compared to other methods. Full article
(This article belongs to the Special Issue Point Cloud Data Analysis and Applications)
Show Figures

Figure 1

29 pages, 10074 KB  
Article
Framework for LLM-Enabled Construction Robot Task Planning: Knowledge Base Preparation and Robot–LLM Dialogue for Interior Wall Painting
by Kyungki Kim, Prashnna Ghimire and Pei-Chi Huang
Robotics 2025, 14(9), 117; https://doi.org/10.3390/robotics14090117 - 27 Aug 2025
Viewed by 374
Abstract
Task planning for a construction robot requires systematically integrating diverse elements, such as building components, construction processes, user input, and robot software. Conventional robot programming complicates this by requiring precise entity naming, relationship definitions, unstructured language interpretation, and accurate action selection. Existing research [...] Read more.
Task planning for a construction robot requires systematically integrating diverse elements, such as building components, construction processes, user input, and robot software. Conventional robot programming complicates this by requiring precise entity naming, relationship definitions, unstructured language interpretation, and accurate action selection. Existing research has focused on isolated components, such as natural language processing, hardcoded data linkages, or BIM data extraction. We introduce a novel framework using an LLM as the cognitive core for autonomous construction robots, encompassing both data preparation and task planning phases. Leveraging OpenAI’s ChatGPT-4, we demonstrate how LLMs can process structured BIM data and unstructured human inputs to generate robot instructions. A prototype tested in a simulated environment with a mobile painting robot adaptively executed tasks through real-time dialogues with ChatGPT-4, reducing reliance on hardcoded logic. Results suggest that LLMs can serve as the cognitive core for construction robots, with potential for extension to more complex operations. Full article
(This article belongs to the Section AI in Robotics)
Show Figures

Figure 1

13 pages, 2180 KB  
Article
Research on Knowledge Graph Construction and Application for Online Emergency Load Transfer in Power Systems
by Nan Lou, Shiqi Liu, Rong Yan, Ruiqi Si, Wanya Yu, Ke Wang, Zhantao Fan, Zhengbo Shan, Hongxuan Zhang, Xinyue Yu, Dawei Wang and Jun Zhang
Electronics 2025, 14(17), 3370; https://doi.org/10.3390/electronics14173370 - 25 Aug 2025
Viewed by 278
Abstract
Efficient emergency load transfer is crucial for ensuring the power system’s safe operation and reliable power supply. However, traditional load transfer methods that rely on human experience have limitations, such as slow response times and low efficiency, which make it difficult to address [...] Read more.
Efficient emergency load transfer is crucial for ensuring the power system’s safe operation and reliable power supply. However, traditional load transfer methods that rely on human experience have limitations, such as slow response times and low efficiency, which make it difficult to address complex and diverse fault scenarios effectively. Therefore, this paper proposes an emergency load transfer method based on knowledge graphs to achieve intelligent management and efficient retrieval of emergency knowledge. Firstly, a named entity recognition model based on ERNIE-BiGRU-CRF is constructed to automatically extract key entities and relationships from the load transfer plan texts, obtaining information such as fault names, fault causes, and operation steps. Secondly, a power system emergency load transfer knowledge graph is constructed based on the extracted structured knowledge, which is efficiently stored using a graph database and enables the visualization and interactive query of knowledge. Finally, real power system fault cases prove that the proposed method can effectively improve the retrieval efficiency of fault knowledge and provide intelligent support for online emergency load transfer decisions. Full article
Show Figures

Figure 1

18 pages, 1061 KB  
Article
Using Causality-Driven Graph Representation Learning for APT Attacks Path Identification
by Xiang Cheng, Miaomiao Kuang and Hongyu Yang
Symmetry 2025, 17(9), 1373; https://doi.org/10.3390/sym17091373 - 22 Aug 2025
Viewed by 366
Abstract
In the cybersecurity attack and defense space, the “attacker” and the “defender” form a dynamic and symmetrical adversarial pair. Their strategy iterations and capability evolutions have long been in a symmetrical game of mutual restraint. We will introduce modern Intrusion Detection Systems (IDSs) [...] Read more.
In the cybersecurity attack and defense space, the “attacker” and the “defender” form a dynamic and symmetrical adversarial pair. Their strategy iterations and capability evolutions have long been in a symmetrical game of mutual restraint. We will introduce modern Intrusion Detection Systems (IDSs) from the defender’s side to counter the techniques designed by the attacker (APT attack). One major challenge faced by IDS is to identify complex attack paths from a vast provenance graph. By constructing an attack behavior tracking graph, the interactions between system entities can be recorded, but the malicious activities of attackers are often hidden among a large number of normal system operations. Although traditional methods can identify attack behaviors, they only focus on the surface association relationships between entities and ignore the deep causal relationships, which limits the accuracy and interpretability of detection. Existing graph anomaly detection methods usually assign the same weight to all interactions, while we propose a Causal Autoencoder for Graph Explanation (CAGE) based on reinforcement learning. This method extracts feature representations from the traceability graph through a graph attention network(GAT), uses Q-learning to dynamically evaluate the causal importance of edges, and highlights key causal paths through a weight layering strategy. In the DARPA TC project, the experimental results conducted on the selected three datasets indicate that the precision of this method in the anomaly detection task remains above 97% on average, demonstrating excellent accuracy. Moreover, the recall values all exceed 99.5%, which fully proves its extremely low rate of missed detections. Full article
(This article belongs to the Special Issue Advanced Studies of Symmetry/Asymmetry in Cybersecurity)
Show Figures

Figure 1

17 pages, 2751 KB  
Article
Joint Extraction of Cyber Threat Intelligence Entity Relationships Based on a Parallel Ensemble Prediction Model
by Huan Wang, Shenao Zhang, Zhe Wang, Jing Sun and Qingzheng Liu
Sensors 2025, 25(16), 5193; https://doi.org/10.3390/s25165193 - 21 Aug 2025
Viewed by 501
Abstract
The construction of knowledge graphs in cyber threat intelligence (CTI) critically relies on automated entity–relation extraction. However, sequence tagging-based methods for joint entity–relation extraction are affected by the order-dependency problem. As a result, overlapping relations are handled ineffectively. To address this limitation, a [...] Read more.
The construction of knowledge graphs in cyber threat intelligence (CTI) critically relies on automated entity–relation extraction. However, sequence tagging-based methods for joint entity–relation extraction are affected by the order-dependency problem. As a result, overlapping relations are handled ineffectively. To address this limitation, a parallel, ensemble-prediction–based model is proposed for joint entity–relation extraction in CTI. The joint extraction task is reformulated as an ensemble prediction problem. A joint network that combines Bidirectional Encoder Representations from Transformers (BERT) with a Bidirectional Gated Recurrent Unit (BiGRU) is constructed to capture deep contextual features in sentences. An ensemble prediction module and a triad representation of entity–relation facts are designed for joint extraction. A non-autoregressive decoder is employed to generate relation triad sets in parallel, thereby avoiding unnecessary sequential constraints during decoding. In the threat intelligence domain, labeled data are scarce and manual annotation is costly. To mitigate these constraints, the SecCti dataset is constructed by leveraging ChatGPT’s small-sample learning capability for labeling and augmentation. This approach reduces annotation costs effectively. Experimental results show a 4.6% absolute F1 improvement over the baseline on joint entity–relation extraction for threat intelligence concerning Advanced Persistent Threats (APTs) and cybercrime activities. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

19 pages, 3172 KB  
Article
RASD: Relation Aware Spectral Decoupling Attention Network for Knowledge Graph Reasoning
by Zheng Wang, Taiyu Li and Zengzhao Chen
Appl. Sci. 2025, 15(16), 9049; https://doi.org/10.3390/app15169049 - 16 Aug 2025
Viewed by 474
Abstract
Knowledge Graph Reasoning (KGR) aims to deduce missing or novel knowledge by learning structured information and semantic relationships within Knowledge Graphs (KGs). Despite significant advances achieved by deep neural networks in recent years, existing models typically extract non-linear representations from explicit features in [...] Read more.
Knowledge Graph Reasoning (KGR) aims to deduce missing or novel knowledge by learning structured information and semantic relationships within Knowledge Graphs (KGs). Despite significant advances achieved by deep neural networks in recent years, existing models typically extract non-linear representations from explicit features in a relatively simplistic manner and fail to fully exploit semantic heterogeneity of relation types and entity co-occurrence frequencies. Consequently, these models struggle to capture critical predictive cues embedded in various entities and relations. To address these limitations, this paper proposes a relation aware spectral decoupling attention network for KGR (RASD). First, a spectral decoupling attention network module projects joint embeddings of entities and relations into the frequency domain, extracting features across different frequency bands and adaptively allocating attention at the global level to model frequency specific information. Next, a relation-aware learning module employs relation aware filters and an augmentation mechanism to preserve distinct relational properties and suppress redundant features, thereby enhancing representation of heterogeneous relations. Experimental results demonstrate that RASD achieves significant and consistent improvements over multiple leading baseline models on link prediction tasks across five public benchmark datasets. Full article
Show Figures

Figure 1

22 pages, 2132 KB  
Article
Ontology Matching Method Based on Deep Learning and Syntax
by Jiawei Lu and Changfeng Yan
Big Data Cogn. Comput. 2025, 9(8), 208; https://doi.org/10.3390/bdcc9080208 - 14 Aug 2025
Viewed by 337
Abstract
Ontology technology addresses data heterogeneity challenges in Internet of Everything (IoE) systems enabled by Cyber Twin and 6G, yet the subjective nature of ontology engineering often leads to differing definitions of the same concept across ontologies, resulting in ontology heterogeneity. To solve this [...] Read more.
Ontology technology addresses data heterogeneity challenges in Internet of Everything (IoE) systems enabled by Cyber Twin and 6G, yet the subjective nature of ontology engineering often leads to differing definitions of the same concept across ontologies, resulting in ontology heterogeneity. To solve this problem, this study introduces a hybrid ontology matching method that integrates a Recurrent Neural Network (RNN) with syntax-based analysis. The method first extracts representative entities by leveraging in-degree and out-degree information from ontological tree structures, which reduces training noise and improves model generalization. Next, a matching framework combining RNN and N-gram is designed: the RNN captures medium-distance dependencies and complex sequential patterns, supporting the dynamic optimization of embedding parameters and semantic feature extraction; the N-gram module further captures local information and relationships between adjacent characters, improving the coverage of matched entities. The experiments were conducted on the OAEI benchmark dataset, where the proposed method was compared with representative baseline methods from OAEI as well as a Transformer-based method. The results demonstrate that the proposed method achieved an 18.18% improvement in F-measure over the best-performing baseline. This improvement was statistically significant, as validated by the Friedman and Holm tests. Moreover, the proposed method achieves the shortest runtime among all the compared methods. Compared to other RNN-based hybrid frameworks that adopt classical structure-based and semantics-based similarity measures, the proposed method further improved the F-measure by 18.46%. Furthermore, a comparison of time and space complexity with the standalone RNN model and its variants demonstrated that the proposed method achieved high performance while maintaining favorable computational efficiency. These findings confirm the effectiveness and efficiency of the method in addressing ontology heterogeneity in complex IoE environments. Full article
Show Figures

Figure 1

21 pages, 1344 KB  
Article
Research on Intelligent Extraction Method of Influencing Factors of Loess Landslide Geological Disasters Based on Soft-Lexicon and GloVe
by Lutong Huang, Yueqin Zhu, Yingfei Li, Tianxiao Yan, Yu Xiao, Dongqi Wei, Ziyao Xing and Jian Li
Appl. Sci. 2025, 15(16), 8879; https://doi.org/10.3390/app15168879 - 12 Aug 2025
Viewed by 225
Abstract
Loess landslide disasters are influenced by a multitude of factors, including slope conditions, triggering mechanisms, and spatial attributes. Extracting these factors from unstructured geological texts is challenging due to nested entities, semantic ambiguity, and rare domain-specific terms. This study proposes a joint extraction [...] Read more.
Loess landslide disasters are influenced by a multitude of factors, including slope conditions, triggering mechanisms, and spatial attributes. Extracting these factors from unstructured geological texts is challenging due to nested entities, semantic ambiguity, and rare domain-specific terms. This study proposes a joint extraction framework guided by a domain ontology that categorizes six types of loess landslide influencing factors, including spatial relationships. The ontology facilitates conceptual classification and semi-automatic nested entity annotation, enabling the construction of a high-quality corpus with eight tag types. The model integrates a Soft-Lexicon mechanism that enhances character-level GloVe embeddings with explicit lexical features, including domain terms, part-of-speech tags, and word boundary indicators derived from a domain-specific lexicon. The resulting hybrid character-level representations are then fed into a BiLSTM-CRF architecture to jointly extract entities, attributes, and multi-level spatial and causal relationships. Extracted results are structured using a content-knowledge model to build a spatially enriched knowledge graph, supporting semantic queries and intelligent reasoning. Experimental results demonstrate improved performance over baseline methods, showcasing the framework’s effectiveness in geohazard information extraction and disaster risk analysis. Full article
(This article belongs to the Special Issue Applications of Big Data and Artificial Intelligence in Geoscience)
Show Figures

Figure 1

23 pages, 3155 KB  
Article
Construction of a Machining Process Knowledge Graph and Its Application in Process Route Recommendation
by Liang Li, Jiaxing Liang, Chunlei Li, Zhe Liu, Yingying Wei and Zeyu Ji
Electronics 2025, 14(15), 3156; https://doi.org/10.3390/electronics14153156 - 7 Aug 2025
Viewed by 379
Abstract
This paper proposes a knowledge graph (KG) construction method for a part machining process in response to the low degree of structuring of historical process data association relationships within the enterprise in the field of part machining, which makes it difficult to reuse [...] Read more.
This paper proposes a knowledge graph (KG) construction method for a part machining process in response to the low degree of structuring of historical process data association relationships within the enterprise in the field of part machining, which makes it difficult to reuse effectively. The part types are mainly shafts, gears, boxes and other common parts. First, the schema layer of the process knowledge graph was constructed using a top-down approach. Second, deep learning techniques were employed for entity extraction, while knowledge fusion and ontology relationship establishment methods were combined to build the data layer of the process knowledge graph (PKG) from the bottom up. Third, the mapping between the schema layer and data layer was implemented in the Neo4j graph database. Based on the constructed process KG, process route recommendation and rapid retrieval of process information were thus accomplished. Finally, a shaft part was used as the target part to verify the effectiveness of the proposed method. In over 300 trials, the similarity-based recommendation model achieved a hit rate of 91.7% (the target part’s route appeared in the recommended list in 91.7% of cases). These results indicate that the proposed machining PKG construction is feasible and can assist in process planning, potentially improving the efficiency of retrieving and reusing machining knowledge. Full article
(This article belongs to the Special Issue Human Robot Interaction: Techniques, Applications, and Future Trends)
Show Figures

Figure 1

17 pages, 1455 KB  
Article
Enhanced Graph Autoencoder for Graph Anomaly Detection Using Subgraph Information
by Chi Zhang and Jin-Woo Jung
Appl. Sci. 2025, 15(15), 8691; https://doi.org/10.3390/app15158691 - 6 Aug 2025
Viewed by 495
Abstract
Graph anomaly detection aims at identifying rare, unusual entities in attributed networks with respect to their patterns or structures that deviate significantly from the majority within a graph. Over the years, extensive efforts in this field have been dedicated to the powerful capability [...] Read more.
Graph anomaly detection aims at identifying rare, unusual entities in attributed networks with respect to their patterns or structures that deviate significantly from the majority within a graph. Over the years, extensive efforts in this field have been dedicated to the powerful capability of attributed networks to model real-world systems. Given the scarcity of labeled anomalies, current research primarily emphasizes model design via unsupervised learning. Graph autoencoders have been widely utilized for such purposes, leveraging the outstanding capabilities of Graph Neural Networks to model graph structured data. However, most existing graph autoencoder-based anomaly detectors do not exploit the nodes’ local subgraph information, limiting their ability to comprehensively understand the network for better representation learning. Moreover, these methods place greater emphasis on the attribute reconstruction process while neglecting the structure reconstruction aspect. This paper proposes an enhanced graph autoencoder framework for graph anomaly detection tasks that incorporates a subgraph extraction and aggregation preprocessing stage to utilize the nodes’ local topological information for enhanced embedding generation and to induce an additional node–subgraph view through model learning. A graph structure learning-based decoder is introduced as the structure decoder for better relationship learning. Finally, during the anomaly scoring stage, a node neighborhood selection technique is applied to enhance the detection performance. The effectiveness of the proposed framework is demonstrated through comprehensive experiments conducted on six commonly used real-world datasets. Full article
(This article belongs to the Special Issue Intelligent Computing for Sustainable Smart Cities)
Show Figures

Figure 1

22 pages, 3052 KB  
Article
A Novel Dual-Strategy Approach for Constructing Knowledge Graphs in the Home Appliance Fault Domain
by Daokun Zhang, Jian Zhang, Yanhe Jia and Mengjie Liao
Algorithms 2025, 18(8), 485; https://doi.org/10.3390/a18080485 - 5 Aug 2025
Viewed by 414
Abstract
Knowledge graph technology holds significant importance for efficient fault diagnosis in household appliances. However, the scarcity of public fault diagnosis data and the lack of automated knowledge extraction pose major challenges to knowledge graph construction. To address issues such as ambiguous entity boundaries, [...] Read more.
Knowledge graph technology holds significant importance for efficient fault diagnosis in household appliances. However, the scarcity of public fault diagnosis data and the lack of automated knowledge extraction pose major challenges to knowledge graph construction. To address issues such as ambiguous entity boundaries, severe entity nesting, and poor entity extraction performance in fault diagnosis texts, this paper proposes a dual-strategy progressive knowledge extraction framework. First, to tackle the high complexity of fault diagnosis texts, an entity recognition model named RoBERTa-zh-BiLSTM-MUL-CRF is designed, improving the accuracy of nested entity extraction. Second, leveraging the semantic understanding capability of large language models, a progressive prompting strategy is adopted for ontology alignment and relation extraction, achieving automated knowledge extraction. Experimental results show that the proposed named entity recognition model outperforms traditional models, with improvements of 3.87%, 5.82%, and 2.05% in F1-score, recall, and precision, respectively. Additionally, the large language model demonstrates better performance in ontology alignment compared to traditional machine learning models. The constructed knowledge graph for household appliance fault diagnosis integrates structured fault diagnosis information. It effectively processes unstructured fault texts and supports visual queries and entity tracing. This framework can assist maintenance personnel in making rapid judgments, thereby improving fault diagnosis efficiency. Full article
(This article belongs to the Section Combinatorial Optimization, Graph, and Network Algorithms)
Show Figures

Figure 1

16 pages, 2212 KB  
Article
Entity Recognition Method for Fire Safety Standards Based on FT-FLAT
by Zhihao Yu, Chao Liu, Shunxiu Yang, Jiwei Tian, Qunming Hu and Weidong Kang
Fire 2025, 8(8), 306; https://doi.org/10.3390/fire8080306 - 4 Aug 2025
Viewed by 550
Abstract
The continuous advancement of fire protection technologies has necessitated the development of comprehensive safety standards, leading to an increasingly diversified and specialized regulatory landscape. This has made it difficult for fire protection professionals to quickly and accurately locate the required fire safety standard [...] Read more.
The continuous advancement of fire protection technologies has necessitated the development of comprehensive safety standards, leading to an increasingly diversified and specialized regulatory landscape. This has made it difficult for fire protection professionals to quickly and accurately locate the required fire safety standard information. In addition, the lack of effective integration and knowledge organization concerning fire safety standard entities has led to the severe fragmentation of fire safety standard information and the absence of a comprehensive “one map”. To address this challenge, we introduce FT-FLAT, an innovative CNN–Transformer fusion architecture designed specifically for fire safety standard entity extraction. Unlike traditional methods that rely on rules or single-modality deep learning, our approach integrates TextCNN for local feature extraction and combines it with the Flat-Lattice Transformer for global dependency modeling. The key innovations include the following. (1) Relative Position Embedding (RPE) dynamically encodes the positional relationships between spans in fire safety texts, addressing the limitations of absolute positional encoding in hierarchical structures. (2) The Multi-Branch Prediction Head (MBPH) aggregates the outputs of TextCNN and the Transformer using Einstein summation, enhancing the feature learning capabilities and improving the robustness for domain-specific terminology. (3) Experiments conducted on the newly annotated Fire Safety Standard Entity Recognition Dataset (FSSERD) demonstrate state-of-the-art performance (94.24% accuracy, 83.20% precision). This work provides a scalable solution for constructing fire safety knowledge graphs and supports intelligent information retrieval in emergency situations. Full article
(This article belongs to the Special Issue Advances in Fire Science and Fire Protection Engineering)
Show Figures

Figure 1

33 pages, 1549 KB  
Article
Smart Money, Greener Future: AI-Enhanced English Financial Text Processing for ESG Investment Decisions
by Junying Fan, Daojuan Wang and Yuhua Zheng
Sustainability 2025, 17(15), 6971; https://doi.org/10.3390/su17156971 - 31 Jul 2025
Viewed by 346
Abstract
Emerging markets face growing pressures to integrate sustainable English business practices while maintaining economic growth, particularly in addressing environmental challenges and achieving carbon neutrality goals. English Financial information extraction becomes crucial for supporting green finance initiatives, Environmental, Social, and Governance (ESG) compliance, and [...] Read more.
Emerging markets face growing pressures to integrate sustainable English business practices while maintaining economic growth, particularly in addressing environmental challenges and achieving carbon neutrality goals. English Financial information extraction becomes crucial for supporting green finance initiatives, Environmental, Social, and Governance (ESG) compliance, and sustainable investment decisions in these markets. This paper presents FinATG, an AI-driven autoregressive framework for extracting sustainability-related English financial information from English texts, specifically designed to support emerging markets in their transition toward sustainable development. The framework addresses the complex challenges of processing ESG reports, green bond disclosures, carbon footprint assessments, and sustainable investment documentation prevalent in emerging economies. FinATG introduces a domain-adaptive span representation method fine-tuned on sustainability-focused English financial corpora, implements constrained decoding mechanisms based on green finance regulations, and integrates FinBERT with autoregressive generation for end-to-end extraction of environmental and governance information. While achieving competitive performance on standard benchmarks, FinATG’s primary contribution lies in its architecture, which prioritizes correctness and compliance for the high-stakes financial domain. Experimental validation demonstrates FinATG’s effectiveness with entity F1 scores of 88.5 and REL F1 scores of 80.2 on standard English datasets, while achieving superior performance (85.7–86.0 entity F1, 73.1–74.0 REL+ F1) on sustainability-focused financial datasets. The framework particularly excels in extracting carbon emission data, green investment relationships, and ESG compliance indicators, achieving average AUC and RGR scores of 0.93 and 0.89 respectively. By automating the extraction of sustainability metrics from complex English financial documents, FinATG supports emerging markets in meeting international ESG standards, facilitating green finance flows, and enhancing transparency in sustainable business practices, ultimately contributing to their sustainable development goals and climate action commitments. Full article
Show Figures

Figure 1

17 pages, 1192 KB  
Article
A Power Monitor System Cybersecurity Alarm-Tracing Method Based on Knowledge Graph and GCNN
by Tianhao Ma, Juan Yu, Binquan Wang, Maosheng Gao, Zhifang Yang, Yajie Li and Mao Fan
Appl. Sci. 2025, 15(15), 8188; https://doi.org/10.3390/app15158188 - 23 Jul 2025
Viewed by 242
Abstract
Ensuring cybersecurity in power monitoring systems is of paramount importance to maintain the operational safety and stability of modern power grids. With the rapid expansion of grid infrastructure and increasing sophistication of cyber threats, existing manual alarm-tracing methods face significant challenges in handling [...] Read more.
Ensuring cybersecurity in power monitoring systems is of paramount importance to maintain the operational safety and stability of modern power grids. With the rapid expansion of grid infrastructure and increasing sophistication of cyber threats, existing manual alarm-tracing methods face significant challenges in handling the massive volume of security alerts, leading to delayed responses and potential system vulnerabilities. Current approaches often lack the capability to effectively model complex relationships among alerts and are hindered by imbalanced data distributions, which degrade tracing accuracy. To this end, this paper proposes a power monitor system cybersecurity alarm-tracing method based on the knowledge graph (KG) and graph convolutional neural networks (GCNN). Specifically, a cybersecurity KG is constituted based on the historical alert, accurately representing the entities and relationships in massive alerts. Then, a GCNN with attention mechanisms is applied to sufficiently extract the topological features along alarms in KG so that it can precisely and effectively trace the massive alarms. Most importantly, to mitigate the influence of imbalanced alarms for tracing, a specialized data process and model ensemble strategy by adaptively weighted imbalance sample is proposed. Finally, based on 70,000 alarm information from a regional power grid, by applying the method proposed in this paper, an alarm traceability accuracy rate of 96.59% was achieved. Moreover, compared with the traditional manual method, the traceability efficiency was improved by more than 80%. Full article
(This article belongs to the Special Issue Design, Optimization and Control Strategy of Smart Grids)
Show Figures

Figure 1

18 pages, 1332 KB  
Article
SC-LKM: A Semantic Chunking and Large Language Model-Based Cybersecurity Knowledge Graph Construction Method
by Pu Wang, Yangsen Zhang, Zicheng Zhou and Yuqi Wang
Electronics 2025, 14(14), 2878; https://doi.org/10.3390/electronics14142878 - 18 Jul 2025
Viewed by 648
Abstract
In cybersecurity, constructing an accurate knowledge graph is vital for discovering key entities and relationships in security incidents buried in vast unstructured threat reports. Traditional knowledge-graph construction pipelines based on handcrafted rules or conventional machine learning models falter when the data scale and [...] Read more.
In cybersecurity, constructing an accurate knowledge graph is vital for discovering key entities and relationships in security incidents buried in vast unstructured threat reports. Traditional knowledge-graph construction pipelines based on handcrafted rules or conventional machine learning models falter when the data scale and linguistic variety grow. GraphRAG, a retrieval-augmented generation (RAG) framework that splits documents into fixed-length chunks and then retrieves the most relevant ones for generation, offers a scalable alternative yet still suffers from fragmentation and semantic gaps that erode graph integrity. To resolve these issues, this paper proposes SC-LKM, a cybersecurity knowledge-graph construction method that couples the GraphRAG backbone with hierarchical semantic chunking. SC-LKM applies semantic chunking to build a cybersecurity knowledge graph that avoids the fragmentation and inconsistency seen in prior work. The semantic chunking method first respects the native document hierarchy and then refines boundaries with topic similarity and named-entity continuity, maintaining logical coherence while limiting information loss during the fine-grained processing of unstructured text. SC-LKM further integrates the semantic comprehension capacity of Qwen2.5-14B-Instruct, markedly boosting extraction accuracy and reasoning quality. Experimental results show that SC-LKM surpasses baseline systems in entity-recognition coverage, topology density, and semantic consistency. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Back to TopTop