期刊文献+
共找到315篇文章
< 1 2 16 >
每页显示 20 50 100
Thermo-hydro-poro-mechanical responses of a reservoir-induced landslide tracked by high-resolution fiber optic sensing nerves 被引量:3
1
作者 Xiao Ye Hong-Hu Zhu +4 位作者 Gang Cheng Hua-Fu Pei Bin Shi Luca Schenato Alessandro Pasuto 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第3期1018-1032,共15页
Thermo-poro-mechanical responses along sliding zone/surface have been extensively studied.However,it has not been recognized that the potential contribution of other crucial engineering geological interfaces beyond th... Thermo-poro-mechanical responses along sliding zone/surface have been extensively studied.However,it has not been recognized that the potential contribution of other crucial engineering geological interfaces beyond the slip surface to progressive failure.Here,we aim to investigate the subsurface multiphysics of reservoir landslides under two extreme hydrologic conditions(i.e.wet and dry),particularly within sliding masses.Based on ultra-weak fiber Bragg grating(UWFBG)technology,we employ specialpurpose fiber optic sensing cables that can be implanted into boreholes as“nerves of the Earth”to collect data on soil temperature,water content,pore water pressure,and strain.The Xinpu landslide in the middle reach of the Three Gorges Reservoir Area in China was selected as a case study to establish a paradigm for in situ thermo-hydro-poro-mechanical monitoring.These UWFBG-based sensing cables were vertically buried in a 31 m-deep borehole at the foot of the landslide,with a resolution of 1 m except for the pressure sensor.We reported field measurements covering the period 2021 and 2022 and produced the spatiotemporal profiles throughout the borehole.Results show that wet years are more likely to motivate landslide motions than dry years.The annual thermally active layer of the landslide has a critical depth of roughly 9 m and might move downward in warmer years.The dynamic groundwater table is located at depths of 9e15 m,where the peaked strain undergoes a periodical response of leap and withdrawal to annual hydrometeorological cycles.These interface behaviors may support the interpretation of the contribution of reservoir regulation to slope stability,allowing us to correlate them to local damage events and potential global destabilization.This paper also offers a natural framework for interpreting thermo-hydro-poro-mechanical signatures from creeping reservoir bank slopes,which may form the basis for a landslide monitoring and early warning system. 展开更多
关键词 Reservoir landslide Thermo-hydro-poro-mechanical response Ultra-weak fiber bragg grating(UWFBG) subsurface evolution Engineering geological interface Geotechnical monitoring
下载PDF
Deep Learning for Financial Time Series Prediction:A State-of-the-Art Review of Standalone and HybridModels
2
作者 Weisi Chen Walayat Hussain +1 位作者 Francesco Cauteruccio Xu Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期187-224,共38页
Financial time series prediction,whether for classification or regression,has been a heated research topic over the last decade.While traditional machine learning algorithms have experienced mediocre results,deep lear... Financial time series prediction,whether for classification or regression,has been a heated research topic over the last decade.While traditional machine learning algorithms have experienced mediocre results,deep learning has largely contributed to the elevation of the prediction performance.Currently,the most up-to-date review of advanced machine learning techniques for financial time series prediction is still lacking,making it challenging for finance domain experts and relevant practitioners to determine which model potentially performs better,what techniques and components are involved,and how themodel can be designed and implemented.This review article provides an overview of techniques,components and frameworks for financial time series prediction,with an emphasis on state-of-the-art deep learning models in the literature from2015 to 2023,including standalonemodels like convolutional neural networks(CNN)that are capable of extracting spatial dependencies within data,and long short-term memory(LSTM)that is designed for handling temporal dependencies;and hybrid models integrating CNN,LSTM,attention mechanism(AM)and other techniques.For illustration and comparison purposes,models proposed in recent studies are mapped to relevant elements of a generalized framework comprised of input,output,feature extraction,prediction,and related processes.Among the state-of-the-artmodels,hybrid models like CNNLSTMand CNN-LSTM-AM in general have been reported superior in performance to stand-alone models like the CNN-only model.Some remaining challenges have been discussed,including non-friendliness for finance domain experts,delayed prediction,domain knowledge negligence,lack of standards,and inability of real-time and highfrequency predictions.The principal contributions of this paper are to provide a one-stop guide for both academia and industry to review,compare and summarize technologies and recent advances in this area,to facilitate smooth and informed implementation,and to highlight future research directions. 展开更多
关键词 Financial time series prediction convolutional neural network long short-term memory deep learning attention mechanism FINANCE
下载PDF
Instance Segmentation of Characters Recognized in Palmyrene Aramaic Inscriptions
3
作者 Adéla Hamplová Alexey Lyavdansky +3 位作者 TomášNovák Ondrej Svojše David Franc Arnošt Veselý 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2869-2889,共21页
This study presents a single-class and multi-class instance segmentation approach applied to ancient Palmyrene inscriptions,employing two state-of-the-art deep learning algorithms,namely YOLOv8 and Roboflow 3.0.The go... This study presents a single-class and multi-class instance segmentation approach applied to ancient Palmyrene inscriptions,employing two state-of-the-art deep learning algorithms,namely YOLOv8 and Roboflow 3.0.The goal is to contribute to the preservation and understanding of historical texts,showcasing the potential of modern deep learning methods in archaeological research.Our research culminates in several key findings and scientific contributions.We comprehensively compare the performance of YOLOv8 and Roboflow 3.0 in the context of Palmyrene character segmentation—this comparative analysis mainly focuses on the strengths and weaknesses of each algorithm in this context.We also created and annotated an extensive dataset of Palmyrene inscriptions,a crucial resource for further research in the field.The dataset serves for training and evaluating the segmentation models.We employ comparative evaluation metrics to quantitatively assess the segmentation results,ensuring the reliability and reproducibility of our findings and we present custom visualization tools for predicted segmentation masks.Our study advances the state of the art in semi-automatic reading of Palmyrene inscriptions and establishes a benchmark for future research.The availability of the Palmyrene dataset and the insights into algorithm performance contribute to the broader understanding of historical text analysis. 展开更多
关键词 Optical character recognition instance segmentation Palmyrene ancient languages computer vision
下载PDF
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
4
作者 周新卫 蒋东华 +4 位作者 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期418-433,共16页
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop... Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance. 展开更多
关键词 cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection
下载PDF
A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks
5
作者 Abdullah Alsaleh 《Computer Systems Science & Engineering》 2024年第2期431-449,共19页
With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detectin... With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious activity.IDS is important in developing advanced security models.This study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention systems.Specifically,it focuses on machine learning(ML)and deep learning(DL)techniques for IDS.This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles.To speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).Processing data are enhanced using the synthetic minority oversampling technique to ensure learning accuracy.The nearest class mean classifier is applied during the testing phase to identify new attacks.Experimental results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods. 展开更多
关键词 Internet of Vehicles intrusion detection machine learning unknown attacks data processing layer
下载PDF
Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering
6
作者 Fady Samann Shavan Askar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2421-2444,共24页
Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms.K-clustering algorithms are sim... Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms.K-clustering algorithms are simplistic,with fast performance and relative accuracy.However,their implementation depends on the initial selection of clusters number(K),the initial clusters’centers,and the clustering metric.This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time(LET)as a clustering metric.Realistic traffic flows were considered for three maps,namely Highway,Traffic Light junction,and Roundabout junction,to study the effect of road layout on estimating the K number.A fast version of the PAM algorithm was used for clustering with a modification to reduce time complexity.The Affinity propagation algorithm sets the baseline for the estimated K number,and the Medoid Silhouette method is used to quantify the clustering.OMNET++,Veins,and SUMO were used to simulate the traffic,while the related algorithms were implemented in Python.The Scott’s formula estimation of the K number only matched the baseline when the road layout was simple.Moreover,the clustering algorithm required one iteration on average to converge when used with LET. 展开更多
关键词 CLUSTERING vehicular network Scott’s formula FastPAM
下载PDF
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
7
作者 Kai Gao Chin-Chen Chang Chia-Chen Lin 《Computer Systems Science & Engineering》 2024年第3期813-833,共21页
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ... Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases. 展开更多
关键词 Data hiding multipredictor mechanism high-fidelity knapsack problem
下载PDF
Three predictive scores compared in a retrospective multicenter study of nonunion tibial shaft fracture
8
作者 Davide Quarta Marco Grassi +3 位作者 Giuliano Lattanzi Antonio Pompilio Gigante Alessio D'Anca Domenico Potena 《World Journal of Orthopedics》 2024年第6期560-569,共10页
BACKGROUND Delayed union,malunion,and nonunion are serious complications in the healing of fractures.Predicting the risk of nonunion before or after surgery is challenging.AIM To compare the most prevalent predictive ... BACKGROUND Delayed union,malunion,and nonunion are serious complications in the healing of fractures.Predicting the risk of nonunion before or after surgery is challenging.AIM To compare the most prevalent predictive scores of nonunion used in clinical practice to determine the most accurate score for predicting nonunion.METHODS We collected data from patients with tibial shaft fractures undergoing surgery from January 2016 to December 2020 in three different trauma hospitals.In this retrospective multicenter study,we considered only fractures treated with intramedullary nailing.We calculated the tibia FRACTure prediction healING days(FRACTING)score,Nonunion Risk Determination score,and Leeds-Genoa Nonunion Index(LEG-NUI)score at the time of definitive fixation.RESULTS Of the 130 patients enrolled,89(68.4%)healed within 9 months and were classified as union.The remaining patients(n=41,31.5%)healed after more than 9 months or underwent other surgical procedures and were classified as nonunion.After calculation of the three scores,LEG-NUI and FRACTING were the most accurate at predicting healing.CONCLUSION LEG-NUI and FRACTING showed the best performances by accurately predicting union and nonunion. 展开更多
关键词 TRAUMA BONE Tibial fracture NONUNION SCORES Prediction model
下载PDF
Depositional process of hyperpycnal flow deposits:A case study on Lower Cretaceous Sangyuan outcrop in the Luanping Basin,Northeast China
9
作者 De-zhi Yan Ru-kai Zhu +8 位作者 Hao Shou Zhao-hui Xu Wei-hong Liu Si-cheng Zhu Zhi-cheng Lei Jing-ya Zhang Chang Liu Yi Cai Huai-min Xu 《China Geology》 CAS CSCD 2024年第3期505-516,共12页
Sedimentary process research is of great significance for understanding the distribution and characteristics of sediments.Through the detailed observation and measurement of the Sangyuan outcrop in Luanping Basin,this... Sedimentary process research is of great significance for understanding the distribution and characteristics of sediments.Through the detailed observation and measurement of the Sangyuan outcrop in Luanping Basin,this paper studies the depositional process of the hyperpycnal flow deposits,and divides their depositional process into three phases,namely,acceleration,erosion and deceleration.In the acceleration phase,hyperpycnal flow begins to enter the basin nearby,and then speeds up gradually.Deposits developed in the acceleration phase are reverse.In addition,the original deposits become unstable and are taken away by hyperpycnal flows under the eroding force.As a result,there are a lot of mixture of red mud pebbles outside the basin and gray mud pebbles within the basin.In the erosion phase,the reverse deposits are eroded and become thinner or even disappear.Therefore,no reverse grading characteristic is found in the proximal major channel that is closer to the source,but it is still preserved in the middle branch channel that is far from the source.After entering the deceleration phase,normally grading deposits appear and cover previous deposits.The final deposits in the basin are special.Some are reverse,and others are normal.They are superimposed with each other under the action of hyperpycnal flow.The analysis of the Sangyuan outcrop demonstrates the sedimentary process and distribution of hyperpycnites,and reasonably explain the sedimentary characteristics of hyperpycnites.It is helpful to the prediction of oil and gas exploration targets in gravity flow deposits. 展开更多
关键词 Hyperpycnal flow Sedimentary characteristics Depositional process Gravity flow deposit Hyperpycnite Red mud pebble Gray mud pebble Oil and gas exploration engineering Luanping Basin
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
10
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
Energy Management System with Power Offering Strategy for a Microgrid Integrated VPP
11
作者 Yeonwoo Lee 《Computers, Materials & Continua》 SCIE EI 2023年第4期2313-2329,共17页
In the context of both the Virtual Power Plant (VPP) and microgrid(MG), the Energy Management System (EMS) is a key decision-maker forintegrating Distributed renewable Energy Resources (DERs) efficiently. TheEMS is re... In the context of both the Virtual Power Plant (VPP) and microgrid(MG), the Energy Management System (EMS) is a key decision-maker forintegrating Distributed renewable Energy Resources (DERs) efficiently. TheEMS is regarded as a strong enabler of providing the optimized schedulingcontrol in operation and management of usage of disperse DERs and RenewableEnergy reSources (RES) such as a small-size wind-turbine (WT) andphotovoltaic (PV) energies. The main objective to be pursued by the EMSis the minimization of the overall operating cost of the MG integrated VPPnetwork. However, the minimization of the power peaks is a new objective andopen issue to a well-functional EMS, along with the maximization of profitin the energy market. Thus, both objectives have to be taken into accountat the same time. Thus, this paper proposes the EMS application incorporatingpower offering strategy applying a nature-inspired algorithm such asParticle Swarm Optimization (PSO) algorithm, in order to find the optimalsolution of the objective function in the context of the overall operating cost,the coordination of DERs, and the energy losses in a MG integrated VPPnetwork. For a fair DERs coordination with minimized power fluctuationsin the power flow, the power offering strategies with an active power controland re-distribution are proposed. Simulation results show that the proposedMG integrated VPP model with PSO-based EMS employing EgalitarianreDistribution (ED) power offering strategy is most feasible option for theoverall operating cost of VPP revenue. The total operating cost of the proposedEMS with ED strategy is 40.98$ compared to 432.8$ of MGs only withoutEMS. It is concluded that each MGs in the proposed VPP model intelligentlyparticipates in energy trading market compliant with the objective function,to minimize the overall cost and the power fluctuation. 展开更多
关键词 Artificial intelligence energy management system MICROGRID nature-inspired algorithm virtual power plant
下载PDF
Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques
12
作者 Dana F.Doghramachi Siddeeq Y.Ameen 《Computers, Materials & Continua》 SCIE EI 2023年第10期717-732,共16页
The rapid adoption of the Internet of Things(IoT)across industries has revolutionized daily life by providing essential services and leisure activities.However,the inadequate software protection in IoT devices exposes... The rapid adoption of the Internet of Things(IoT)across industries has revolutionized daily life by providing essential services and leisure activities.However,the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences.Intrusion Detection Systems(IDS)are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic.The security research community has shown particular interest in leveraging Machine Learning(ML)approaches to develop practical IDS applications for general cyber networks and IoT environments.However,most available datasets related to Industrial IoT suffer from imbalanced class distributions.This study proposes a methodology that involves dataset preprocessing,including data cleaning,encoding,and normalization.The class imbalance is addressed by employing the Synthetic Minority Oversampling Technique(SMOTE)and performing feature reduction using correlation analysis.Multiple ML classifiers,including Logistic Regression,multi-layer perceptron,Decision Trees,Random Forest,and XGBoost,are employed to model IoT attacks.The effectiveness and robustness of the proposed method evaluate using the IoTID20 dataset,which represents current imbalanced IoT scenarios.The results highlight that the XGBoost model,integrated with SMOTE,achieves outstanding attack detection accuracy of 0.99 in binary classification,0.99 in multi-class classification,and 0.81 in multiple sub-classifications.These findings demonstrate our approach’s significant improvements to attack detection in imbalanced IoT datasets,establishing its superiority over existing IDS frameworks. 展开更多
关键词 IOT detection system machine learning SMOTE XGboost
下载PDF
How Do V2V and V2I Messages Affect the Performance of Driving Smart Vehicles?
13
作者 Abdullah Alsaleh 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2313-2336,共24页
Intelligent transportation systems(ITSs)are becoming increasingly popular as they support efficient coordinated transport.ITSs aim to improve the safety,efficiency and reliability of road transportation through integr... Intelligent transportation systems(ITSs)are becoming increasingly popular as they support efficient coordinated transport.ITSs aim to improve the safety,efficiency and reliability of road transportation through integrated approaches to the exchange of relevant information.Mobile adhoc networks(MANETs)and vehicle ad-hoc networks(VANETs)are integral components of ITS.The VANET is composed of interconnected vehicles with sensitivity capabilities to exchange traffic,positioning,weather and emergency information.One of the main challenges in VANET is the reliable and timely dissemination of information between vehicular nodes to improve decision-making processes.This paper illustrates challenges in VANET and reviews possible solutions to improve road safety control and management using V2V and V2I communications.This paper also summarizes existing rules-based and optimized-based solutions,including reducing the effect of mixed environments,obstacles,malfunctions and short wireless ranges on transportation efficiency and reducing false messages that cause unintended vehicle actions and unreliable transportation systems.Additionally,an event simulation algorithm was designed to maximize the benefits of exchangeable messages among vehicles.Furthermore,simulated VANET environments were developed to demonstrate how the algorithm can be used for transformable messages.Experimental results show that coupling of both V2V and V2I messages yielded better results in terms of end-to-end delay and average time.Future research directions were highlighted to be taken into account in the development of ITS and intelligent routing mechanisms. 展开更多
关键词 Vehicle-to-vehicle vehicle-to-infrastructure transport systems
下载PDF
Design and Optimization of Actuator for HT-25 Multifunctional Loader
14
作者 Md. Al Imran Tapu Joy Howlader +2 位作者 Md. Shahriar Sujan Md. Jahangir Alam Md. Mehedi Hassan 《World Journal of Engineering and Technology》 2023年第4期874-892,共19页
To break down the development interaction of the working gadget of the multi-practical wheel loader and to compute the heap of each part, the Denavit-Hartenberg strategy was applied to build up the kinematics of the i... To break down the development interaction of the working gadget of the multi-practical wheel loader and to compute the heap of each part, the Denavit-Hartenberg strategy was applied to build up the kinematics of the instrument model. Also, all the while, set up the elements model of dynamic framework. A multi-body element programming MSC, ADAMS and its active module were applied to assemble component power through a pressure framework reenactment model. An entirety working cycle interaction of the functioning gadget of the wheel loader was mimicked, and the investigation results thoroughly show the development interaction of the functional device and the stacked state of each part, and check the mechanical properties of the working gadget and dynamic execution water-driven framework effectively. 展开更多
关键词 Multifunctional Loader Hydraulic Circuit CAD Power System Hydraulic Actuator and Pump
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
15
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Enhancing Indoor User Localization:An Adaptive Bayesian Approach for Multi-Floor Environments
16
作者 Abdulraqeb Alhammadi Zaid Ahmed Shamsan Arijit De 《Computers, Materials & Continua》 SCIE EI 2024年第8期1889-1905,共17页
Indoor localization systems are crucial in addressing the limitations of traditional global positioning system(GPS)in indoor environments due to signal attenuation issues.As complex indoor spaces become more sophistic... Indoor localization systems are crucial in addressing the limitations of traditional global positioning system(GPS)in indoor environments due to signal attenuation issues.As complex indoor spaces become more sophisticated,indoor localization systems become essential for improving user experience,safety,and operational efficiency.Indoor localization methods based on Wi-Fi fingerprints require a high-density location fingerprint database,but this can increase the computational burden in the online phase.Bayesian networks,which integrate prior knowledge or domain expertise,are an effective solution for accurately determining indoor user locations.These networks use probabilistic reasoning to model relationships among various localization parameters for indoor environments that are challenging to navigate.This article proposes an adaptive Bayesian model for multi-floor environments based on fingerprinting techniques to minimize errors in estimating user location.The proposed system is an off-the-shelf solution that uses existing Wi-Fi infrastructures to estimate user’s location.It operates in both online and offline phases.In the offline phase,a mobile device with Wi-Fi capability collects radio signals,while in the online phase,generating samples using Gibbs sampling based on the proposed Bayesian model and radio map to predict user’s location.Experimental results unequivocally showcase the superior performance of the proposed model when compared to other existing models and methods.The proposed model achieved an impressive lower average localization error,surpassing the accuracy of competing approaches.Notably,this noteworthy achievement was attained with minimal reliance on reference points,underscoring the efficiency and efficacy of the proposed model in accurately estimating user locations in indoor environments. 展开更多
关键词 LOCALIZATION POSITIONING BAYESIAN fingerprinting received signal strength(RSS)
下载PDF
Physical insights into trapping effects on vertical GaN-on-Si trench MOSFETs from TCAD
17
作者 NicolòZagni Manuel Fregolent +9 位作者 Andrea Del Fiol Davide Favero Francesco Bergamin Giovanni Verzellesi Carlo De Santi Gaudenzio Meneghesso Enrico Zanoni Christian Huber Matteo Meneghini Paolo Pavan 《Journal of Semiconductors》 EI CAS CSCD 2024年第3期45-52,共8页
Vertical GaN power MOSFET is a novel technology that offers great potential for power switching applications.Being still in an early development phase,vertical GaN devices are yet to be fully optimized and require car... Vertical GaN power MOSFET is a novel technology that offers great potential for power switching applications.Being still in an early development phase,vertical GaN devices are yet to be fully optimized and require careful studies to foster their development.In this work,we report on the physical insights into device performance improvements obtained during the development of vertical GaN-on-Si trench MOSFETs(TMOS’s)provided by TCAD simulations,enhancing the dependability of the adopted process optimization approaches.Specifically,two different TMOS devices are compared in terms of transfer-curve hysteresis(H)and subthreshold slope(SS),showing a≈75%H reduction along with a≈30%SS decrease.Simulations allow attributing the achieved improvements to a decrease in the border and interface traps,respectively.A sensitivity analysis is also carried out,allowing to quantify the additional trap density reduction required to minimize both figures of merit. 展开更多
关键词 vertical GaN trench MOSFET SiO_(2) interface traps border traps HYSTERESIS BTI
下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID)
18
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
下载PDF
Multi-scale cross-domain alignment for person image generation
19
作者 Liyuan Ma Tingwei Gao +1 位作者 Haibin Shen Kejie Huang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期374-387,共14页
Person image generation aims to generate images that maintain the original human appearance in different target poses.Recent works have revealed that the critical element in achieving this task is the alignment of app... Person image generation aims to generate images that maintain the original human appearance in different target poses.Recent works have revealed that the critical element in achieving this task is the alignment of appearance domain and pose domain.Previous alignment methods,such as appearance flow warping,correspondence learning and cross attention,often encounter challenges when it comes to producing fine texture details.These approaches suffer from limitations in accurately estimating appearance flows due to the lack of global receptive field.Alternatively,they can only perform cross-domain alignment on high-level feature maps with small spatial dimensions since the computational complexity increases quadratically with larger feature sizes.In this article,the significance of multi-scale alignment,in both low-level and high-level domains,for ensuring reliable cross-domain alignment of appearance and pose is demonstrated.To this end,a novel and effective method,named Multi-scale Crossdomain Alignment(MCA)is proposed.Firstly,MCA adopts global context aggregation transformer to model multi-scale interaction between pose and appearance inputs,which employs pair-wise window-based cross attention.Furthermore,leveraging the integrated global source information for each target position,MCA applies flexible flow prediction head and point correlation to effectively conduct warping and fusing for final transformed person image generation.Our proposed MCA achieves superior performance on two popular datasets than other methods,which verifies the effectiveness of our approach. 展开更多
关键词 artificial intelligence image processing image reconstruction
下载PDF
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
20
作者 Zengxiang Li Yongchong Wu +3 位作者 Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期847-869,共23页
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus... Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications. 展开更多
关键词 Image hiding ROBUSTNESS wavelet transform dynamic region attention
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部