Nowadays,the number of vehicles in China has increased significantly.The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need.However,the...Nowadays,the number of vehicles in China has increased significantly.The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need.However,the existing early warning devices such as geomagnetic,ultrasonic and infrared detection have some shortcomings like difficult installation and maintenance.In addition,geomagnetic detection will damage the road surface,while ultrasonic and infrared detection will be greatly affected by the environment.Considering the shortcomings of the existing solutions,this paper puts forward a solution of early warning for vehicle turning meeting based on image acquisition and microcontrollers.This solution combines image acquisition and processing technology,which uses image sensor to perceive traffic condition and image data analysis algorithm to process perceived image,and then utilize LED display screen to issue an early warning.展开更多
The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying trafc management applications.However,cloud computing has disadvantages such as high delay,low privacy and high...The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying trafc management applications.However,cloud computing has disadvantages such as high delay,low privacy and high communication cost,which can not meet the needs of realtime interactive information of Internet of vehicles.Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges.Therefore,in order to ensure the user information security and improve the real-time of vehicle information interaction,this paper proposes an anonymous authentication scheme based on edge computing.In this scheme,the concept of edge computing is introduced into the Internet of vehicles,which makes full use of the redundant computing power and storage capacity of idle edge equipment.The edge vehicle nodes are determined by simple algorithm of dening distance and resources,and the improved RSA encryption algorithm is used to encrypt the user information.The improved RSA algorithm encrypts the user information by reencrypting the encryption parameters.Compared with the traditional RSA algorithm,it can resist more attacks,so it is used to ensure the security of user information.It can not only protect the privacy of vehicles,but also avoid anonymous abuse.Simulation results show that the proposed scheme has lower computational complexity and communication overhead than the traditional anonymous scheme.展开更多
Single image super resolution(SISR)is an important research content in the field of computer vision and image processing.With the rapid development of deep neural networks,different image super-resolution models have ...Single image super resolution(SISR)is an important research content in the field of computer vision and image processing.With the rapid development of deep neural networks,different image super-resolution models have emerged.Compared to some traditional SISR methods,deep learning-based methods can complete the super-resolution tasks through a single image.In addition,compared with the SISR methods using traditional convolutional neural networks,SISR based on generative adversarial networks(GAN)has achieved the most advanced visual performance.In this review,we first explore the challenges faced by SISR and introduce some common datasets and evaluation metrics.Then,we review the improved network structures and loss functions of GAN-based perceptual SISR.Subsequently,the advantages and disadvantages of different networks are analyzed by multiple comparative experiments.Finally,we summarize the paper and look forward to the future development trends of GAN-based perceptual SISR.展开更多
An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes,and help people live wel...An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes,and help people live well in mosquito-infested areas.In this study,we propose an intelligent mosquito net that can produce and transmit data through the Internet of Medical Things.In our method,decision-making is controlled by a deep learning model,and the proposed method uses infrared sensors and an array of pressure sensors to collect data.Moreover the ZigBee protocol is used to transmit the pressure map which is formed by pressure sensors with the deep learning perception model,determining automatically the intention of the user to open or close the mosquito net.We used optical flow to extract pressure map features,and they were fed to a 3-dimensional convolutional neural network(3D-CNN)classification model subsequently.We achieved the expected results using a nested cross-validation method to evaluate our model.Deep learning has better adaptability than the traditional methods and also has better anti-interference by the different bodies of users.This research has the potential to be used in intelligent medical protection and large-scale sensor array perception of the environment.展开更多
Surface plasmon polariton (SPP) nanolaser, which can achieve an all-optical circuit, is a major research topic in the field of micro light source. In this study, we examine a novel SPP graphene nanolaser in an optoe...Surface plasmon polariton (SPP) nanolaser, which can achieve an all-optical circuit, is a major research topic in the field of micro light source. In this study, we examine a novel SPP graphene nanolaser in an optoelectronic integration field. The proposed nanolaser consists of metallic silver, two-dimensional (2D) graphene and high refractive index semiconductor of indium gallium arsenide phosphorus. Compared with other metals, Ag can reduce the threshold and propagation loss. The SPP field, excited by coupling Ag and InGaAsE can be enhanced by the 2D material of graphene. In the proposed nanolaser, the maximum value of propagation loss is approximately 0.055 dB/~tm, and the normalized mode area is con- stantly less than 0.05, and the best threshold can achieve 3380 cm l simultaneously. Meanwhile, the proposed nanolaser can be fabricated by conventional materials and work in optical communication (1550 nm), which can be easily achieved with current nanotechnology. It is also an important method that will be used to overcome the challenges of high speed, miniaturization, and integration in optoelectronic integrated technology.展开更多
Translation software has become an important tool for communication between different languages.People’s requirements for translation are higher and higher,mainly reflected in people’s desire for barrier free cultur...Translation software has become an important tool for communication between different languages.People’s requirements for translation are higher and higher,mainly reflected in people’s desire for barrier free cultural exchange.With a large corpus,the performance of statistical machine translation based on words and phrases is limited due to the small size of modeling units.Previous statistical methods rely primarily on the size of corpus and number of its statistical results to avoid ambiguity in translation,ignoring context.To support the ongoing improvement of translation methods built upon deep learning,we propose a translation algorithm based on the Hidden Markov Model to improve the use of context in the process of translation.During translation,our Hidden Markov Model prediction chain selects a number of phrases with the highest result probability to form a sentence.The collection of all of the generated sentences forms a topic sequence.Using probabilities and article sequences determined from the training set,our method again applies the Hidden Markov Model to form the final translation to improve the context relevance in the process of translation.This algorithm improves the accuracy of translation,avoids the combination of invalid words,and enhances the readability and meaning of the resulting translation.展开更多
Due to the lack of consideration of movement behavior information other than time and location perception in current location prediction methods,the movement characteristics of trajectory data cannot be well expressed...Due to the lack of consideration of movement behavior information other than time and location perception in current location prediction methods,the movement characteristics of trajectory data cannot be well expressed,which in turn affects the accuracy of the prediction results.First,a new trajectory data expression method by associating the movement behavior information is given.The pre-association method is used to model the movement behavior information according to the individual movement behavior features and the group movement behavior features extracted from the trajectory sequence and the region.The movement behavior features based on pre-association may not always be the best for the prediction model.Therefore,through association analysis and importance analysis,the final association feature is selected from the pre-association features.The trajectory data is input into the LSTM networks after associated features and genetic algorithm(GA)is used to optimize the combination of the length of time window and the number of hidden layer nodes.The experimental results show that compared with the original trajectory data,the trajectory data associated with the movement behavior information helps to improve the accuracy of location prediction.展开更多
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of s...A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service.We quantified the sensitive level of information according to the user’s personalized sensitive information protection needs.Based on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was constructed.Through the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive information.Furthermore,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered comprehensively.Further on,the leakage of the user’s sensitive information was measured.Finally,the feasibility of the model was described by experiments.展开更多
Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,da...Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,data transmission process in VANET is vulnerable to leakage and attack.Authentication of vehicle identitywhile protecting vehicle privacy information is an advantageous way to improve the security of VANET.We propose a scheme based on fair blind signature and secret sharing algorithm.In this paper,we prove that the scheme is feasible through security analysis.展开更多
The miniaturization and endurance of wearable devices have been the research direction for a long time.With the development of nanotechnology and the emergence of microelectronics products,people have explored many ne...The miniaturization and endurance of wearable devices have been the research direction for a long time.With the development of nanotechnology and the emergence of microelectronics products,people have explored many new strategies that may be applied to wearable devices.In this overview,we will summarize the recent research of wearable devices in these two directions,and summarize some available related technologies.展开更多
基金This project is supported by the Cooperative Education Fund of China Ministry of Education(201702113002,201801193119)Hunan Natural Science Foundation(2018JJ2138)+2 种基金Excellent Youth Project of Hunan Education Department(17B096)the H3C Fund of Hunan Internet of Things Federation(20180006)Degree and Graduate Education Reform Project of Hunan Province(JG2018B096).
文摘Nowadays,the number of vehicles in China has increased significantly.The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need.However,the existing early warning devices such as geomagnetic,ultrasonic and infrared detection have some shortcomings like difficult installation and maintenance.In addition,geomagnetic detection will damage the road surface,while ultrasonic and infrared detection will be greatly affected by the environment.Considering the shortcomings of the existing solutions,this paper puts forward a solution of early warning for vehicle turning meeting based on image acquisition and microcontrollers.This solution combines image acquisition and processing technology,which uses image sensor to perceive traffic condition and image data analysis algorithm to process perceived image,and then utilize LED display screen to issue an early warning.
基金The nancial support provided from the Cooperative Education Fund of China Ministry of Education(201702113002,201801193119)Hunan Natural Science Foundation(2018JJ2138)Degree and Graduate Education Reform Project of Hunan Province(JG2018B096)are greatly appreciated by the authors.
文摘The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying trafc management applications.However,cloud computing has disadvantages such as high delay,low privacy and high communication cost,which can not meet the needs of realtime interactive information of Internet of vehicles.Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges.Therefore,in order to ensure the user information security and improve the real-time of vehicle information interaction,this paper proposes an anonymous authentication scheme based on edge computing.In this scheme,the concept of edge computing is introduced into the Internet of vehicles,which makes full use of the redundant computing power and storage capacity of idle edge equipment.The edge vehicle nodes are determined by simple algorithm of dening distance and resources,and the improved RSA encryption algorithm is used to encrypt the user information.The improved RSA algorithm encrypts the user information by reencrypting the encryption parameters.Compared with the traditional RSA algorithm,it can resist more attacks,so it is used to ensure the security of user information.It can not only protect the privacy of vehicles,but also avoid anonymous abuse.Simulation results show that the proposed scheme has lower computational complexity and communication overhead than the traditional anonymous scheme.
基金The authors are highly thankful to the Development Research Center of Guangxi Relatively Sparse-populated Minorities(ID:GXRKJSZ201901)to the Natural Science Foundation of Guangxi Province(No.2018GXNSFAA281164)This research was financially supported by the project of outstanding thousand young teachers’training in higher education institutions of Guangxi,Guangxi Colleges and Universities Key Laboratory Breeding Base of System Control and Information Processing.
文摘Single image super resolution(SISR)is an important research content in the field of computer vision and image processing.With the rapid development of deep neural networks,different image super-resolution models have emerged.Compared to some traditional SISR methods,deep learning-based methods can complete the super-resolution tasks through a single image.In addition,compared with the SISR methods using traditional convolutional neural networks,SISR based on generative adversarial networks(GAN)has achieved the most advanced visual performance.In this review,we first explore the challenges faced by SISR and introduce some common datasets and evaluation metrics.Then,we review the improved network structures and loss functions of GAN-based perceptual SISR.Subsequently,the advantages and disadvantages of different networks are analyzed by multiple comparative experiments.Finally,we summarize the paper and look forward to the future development trends of GAN-based perceptual SISR.
基金The financial support provided by the Cooperative Education Fund of China Ministry of Education(201702113002,201801193119)the Scientific Research Fund of Hunan Provincial Education Department(20A191)the National Natural Science Foundation of China under Grant(61702180)are greatly appreciated by the authors.
文摘An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes,and help people live well in mosquito-infested areas.In this study,we propose an intelligent mosquito net that can produce and transmit data through the Internet of Medical Things.In our method,decision-making is controlled by a deep learning model,and the proposed method uses infrared sensors and an array of pressure sensors to collect data.Moreover the ZigBee protocol is used to transmit the pressure map which is formed by pressure sensors with the deep learning perception model,determining automatically the intention of the user to open or close the mosquito net.We used optical flow to extract pressure map features,and they were fed to a 3-dimensional convolutional neural network(3D-CNN)classification model subsequently.We achieved the expected results using a nested cross-validation method to evaluate our model.Deep learning has better adaptability than the traditional methods and also has better anti-interference by the different bodies of users.This research has the potential to be used in intelligent medical protection and large-scale sensor array perception of the environment.
基金Project supported by the Guangxi Natural Science Foundation,China(Grant No.2017GXNSFAA198261)the National Natural Science Foundation of China(Grant No.61762018)+3 种基金the Guangxi Youth Talent Program,China(Grant No.F-KA16016)the Guangxi Normal University Key Program,China(Grant No.2015ZD03)the Innovation Project of Guangxi Graduate Education,China(Grant Nos.XYCSZ2018082,XJGY201807,and XJGY201811)the Guangxi Key Laboratory of Automatic Detecting Technology and Instruments,China(Grant No.YQ16206)
文摘Surface plasmon polariton (SPP) nanolaser, which can achieve an all-optical circuit, is a major research topic in the field of micro light source. In this study, we examine a novel SPP graphene nanolaser in an optoelectronic integration field. The proposed nanolaser consists of metallic silver, two-dimensional (2D) graphene and high refractive index semiconductor of indium gallium arsenide phosphorus. Compared with other metals, Ag can reduce the threshold and propagation loss. The SPP field, excited by coupling Ag and InGaAsE can be enhanced by the 2D material of graphene. In the proposed nanolaser, the maximum value of propagation loss is approximately 0.055 dB/~tm, and the normalized mode area is con- stantly less than 0.05, and the best threshold can achieve 3380 cm l simultaneously. Meanwhile, the proposed nanolaser can be fabricated by conventional materials and work in optical communication (1550 nm), which can be easily achieved with current nanotechnology. It is also an important method that will be used to overcome the challenges of high speed, miniaturization, and integration in optoelectronic integrated technology.
基金support provided from the Cooperative Education Fund of China Ministry of Education(201702113002 and 201801193119)Hunan Natural Science Foundation(2018JJ2138)Degree and Graduate Education Reform Project of Hunan Province(JG2018B096)are greatly appreciated by the authors.
文摘Translation software has become an important tool for communication between different languages.People’s requirements for translation are higher and higher,mainly reflected in people’s desire for barrier free cultural exchange.With a large corpus,the performance of statistical machine translation based on words and phrases is limited due to the small size of modeling units.Previous statistical methods rely primarily on the size of corpus and number of its statistical results to avoid ambiguity in translation,ignoring context.To support the ongoing improvement of translation methods built upon deep learning,we propose a translation algorithm based on the Hidden Markov Model to improve the use of context in the process of translation.During translation,our Hidden Markov Model prediction chain selects a number of phrases with the highest result probability to form a sentence.The collection of all of the generated sentences forms a topic sequence.Using probabilities and article sequences determined from the training set,our method again applies the Hidden Markov Model to form the final translation to improve the context relevance in the process of translation.This algorithm improves the accuracy of translation,avoids the combination of invalid words,and enhances the readability and meaning of the resulting translation.
基金supported by the Hunan University of Science and Technology Doctoral Research Foundation Project(E51873).
文摘Due to the lack of consideration of movement behavior information other than time and location perception in current location prediction methods,the movement characteristics of trajectory data cannot be well expressed,which in turn affects the accuracy of the prediction results.First,a new trajectory data expression method by associating the movement behavior information is given.The pre-association method is used to model the movement behavior information according to the individual movement behavior features and the group movement behavior features extracted from the trajectory sequence and the region.The movement behavior features based on pre-association may not always be the best for the prediction model.Therefore,through association analysis and importance analysis,the final association feature is selected from the pre-association features.The trajectory data is input into the LSTM networks after associated features and genetic algorithm(GA)is used to optimize the combination of the length of time window and the number of hidden layer nodes.The experimental results show that compared with the original trajectory data,the trajectory data associated with the movement behavior information helps to improve the accuracy of location prediction.
基金This work was supported by Key project of Hunan Provincial Education Department(20A191)Hunan teaching research and reform project(2019-134)+3 种基金Cooperative Education Fund of China Ministry of Education(201702113002,201801193119)Hunan Natural Science Foundation(2018JJ2138)Hunan teaching research and reform project(2019)Natural Science Foundation of Hunan Province(2020JJ7007).
文摘A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service.We quantified the sensitive level of information according to the user’s personalized sensitive information protection needs.Based on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was constructed.Through the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive information.Furthermore,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered comprehensively.Further on,the leakage of the user’s sensitive information was measured.Finally,the feasibility of the model was described by experiments.
基金supported by Key project of Hunan Provincial Education Department(20A191)Hunan teaching research and reformproject(2019-134)+2 种基金Cooperative Education Fund of ChinaMinistry of Education(201702113002,201801193119)Hunan Natural Science Foundation(2018JJ2138)Hunan teaching research and reform project(2019).
文摘Vehicular ad hoc network(VANET)is a self-organizing wireless sensor network model,which is extensively used in the existing traffic.Due to the openness of wireless channel and the sensitivity of traffic information,data transmission process in VANET is vulnerable to leakage and attack.Authentication of vehicle identitywhile protecting vehicle privacy information is an advantageous way to improve the security of VANET.We propose a scheme based on fair blind signature and secret sharing algorithm.In this paper,we prove that the scheme is feasible through security analysis.
文摘The miniaturization and endurance of wearable devices have been the research direction for a long time.With the development of nanotechnology and the emergence of microelectronics products,people have explored many new strategies that may be applied to wearable devices.In this overview,we will summarize the recent research of wearable devices in these two directions,and summarize some available related technologies.