期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
Analysis of radiation diffusion of COVID-19 driven by social attributes
1
作者 年福忠 杨晓晨 师亚勇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期773-779,共7页
This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was ... This paper first estimated the infectious capacity of COVID-19 based on the time series evolution data of confirmed cases in multiple countries. Then, a method to infer the cross-regional spread speed of COVID-19 was introduced in this paper, which took the gross domestic product(GDP) of each region as one of the factors that affect the spread speed of COVID-19 and studied the relationship between the GDP and the infection density of each region(China's Mainland, the United States, and EU countries). In addition, the geographic distance between regions was also considered in this method and the effect of geographic distance on the spread speed of COVID-19 was studied. Studies have shown that the probability of mutual infection of these two regions decreases with increasing geographic distance. Therefore, this paper proposed an epidemic disease spread index based on GDP and geographic distance to quantify the spread speed of COVID-19 in a region. The analysis results showed a strong correlation between the epidemic disease spread index in a region and the number of confirmed cases. This finding provides reasonable suggestions for the control of epidemics. Strengthening the control measures in regions with higher epidemic disease spread index can effectively control the spread of epidemics. 展开更多
关键词 COVID-19 basic reproduction number gross domestic product(GDP) geographic distance cross-regional spread
下载PDF
Parallel Implementation of the CCSDS Turbo Decoder on GPU
2
作者 Liu Zhanxian Liu Rongke +3 位作者 Zhang Haijun Wang Ning Sun Lei Wang Jianquan 《China Communications》 SCIE CSCD 2024年第10期70-77,共8页
This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Syste... This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Systems(CCSDS)standard.However,the information frame lengths of the CCSDS turbo codes are not suitable for flexible sub-frame parallelism design.To mitigate this issue,we propose a padding method that inserts several bits before the information frame header.To obtain low-latency performance and high resource utilization,two-level intra-frame parallelisms and an efficient data structure are considered.The presented Max-Log-Map decoder can be adopted to decode the Long Term Evolution(LTE)turbo codes with only small modifications.The proposed CCSDS turbo decoder at 10 iterations on NVIDIA RTX3070 achieves about 150 Mbps and 50Mbps throughputs for the code rates 1/6 and 1/2,respectively. 展开更多
关键词 CCSDS CUDA GPU parallel decoding turbo codes
下载PDF
Digital Continuity Guarantee Approach of Electronic Record Based on Data Quality Theory 被引量:7
3
作者 Yongjun Ren Jian Qi +2 位作者 Yaping Cheng Jin Wang Osama Alfarraj 《Computers, Materials & Continua》 SCIE EI 2020年第6期1471-1483,共13页
Since the British National Archive put forward the concept of the digital continuity in 2007,several developed countries have worked out their digital continuity action plan.However,the technologies of the digital con... Since the British National Archive put forward the concept of the digital continuity in 2007,several developed countries have worked out their digital continuity action plan.However,the technologies of the digital continuity guarantee are still lacked.At first,this paper analyzes the requirements of digital continuity guarantee for electronic record based on data quality theory,then points out the necessity of data quality guarantee for electronic record.Moreover,we convert the digital continuity guarantee of electronic record to ensure the consistency,completeness and timeliness of electronic record,and construct the first technology framework of the digital continuity guarantee for electronic record.Finally,the temporal functional dependencies technology is utilized to build the first integration method to insure the consistency,completeness and timeliness of electronic record. 展开更多
关键词 Electronic record digital continuity data quality
下载PDF
Time Optimization of Multiple Knowledge Transfers in the Big Data Environment 被引量:3
4
作者 Chuanrong Wu Evgeniya Zapevalova +1 位作者 Yingwu Chen Feng Li 《Computers, Materials & Continua》 SCIE EI 2018年第3期269-285,共17页
In the big data environment, enterprises must constantly assimilate big dataknowledge and private knowledge by multiple knowledge transfers to maintain theircompetitive advantage. The optimal time of knowledge transfe... In the big data environment, enterprises must constantly assimilate big dataknowledge and private knowledge by multiple knowledge transfers to maintain theircompetitive advantage. The optimal time of knowledge transfer is one of the mostimportant aspects to improve knowledge transfer efficiency. Based on the analysis of thecomplex characteristics of knowledge transfer in the big data environment, multipleknowledge transfers can be divided into two categories. One is the simultaneous transferof various types of knowledge, and the other one is multiple knowledge transfers atdifferent time points. Taking into consideration the influential factors, such as theknowledge type, knowledge structure, knowledge absorptive capacity, knowledge updaterate, discount rate, market share, profit contributions of each type of knowledge, transfercosts, product life cycle and so on, time optimization models of multiple knowledgetransfers in the big data environment are presented by maximizing the total discountedexpected profits (DEPs) of an enterprise. Some simulation experiments have beenperformed to verify the validity of the models, and the models can help enterprisesdetermine the optimal time of multiple knowledge transfer in the big data environment. 展开更多
关键词 Big data knowledge transfer time optimization DEP simulation experiment
下载PDF
Data Secure Storage Mechanism of Sensor Networks Based on Blockchain 被引量:4
5
作者 Jin Wang Wencheng Chen +3 位作者 Lei Wang R.Simon Sherratt Osama Alfarraj Amr Tolba 《Computers, Materials & Continua》 SCIE EI 2020年第12期2365-2384,共20页
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide application.However,it has attracted increasing attent... As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide application.However,it has attracted increasing attention from industry and academia.The blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block data.It is thus naturally able to solve the security problems of the sensor networks.Accordingly,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is secure.In the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in networks.To solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member proof.Moreover,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion requirements.This paper therefore proposes a new type of unbounded accumulator and provides its definition and security model.Finally,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance. 展开更多
关键词 Sensor networks blockchain unbounded accumulator storage mechanism
下载PDF
Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems 被引量:1
6
作者 Weiwei Liu Yang Tang +3 位作者 Fei Yang Chennan Zhang Dun Cao Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2020年第12期2511-2527,共17页
Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulner... Intelligent Transportation System(ITS)is essential for effective identification of vulnerable units in the transport network and its stable operation.Also,it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things(IoT).Previous research on vulnerability has no congestion effect on the peak time of urban road network.The cascading failure of links or nodes is presented by IoT monitoring system,which can collect data from a wireless sensor network in the transport environment.The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure(V2I)channels to simulate key segments and their failure probability.Finally,the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors.The two indices are standardized by calculating the relative change rate,and the comprehensive index of the consequence after road network unit is in a failure state.Therefore,by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state,the comprehensive vulnerability of road network can be evaluated by a risk calculation formula.In short,the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals. 展开更多
关键词 Internet of Things Intelligent Transport Systems vulnerability assessment transport network
下载PDF
Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism 被引量:1
7
作者 Lei Wang Jian Liu +1 位作者 Changming Zhao Alan Yang 《Computers, Materials & Continua》 SCIE EI 2020年第4期401-416,共16页
In this paper,we investigate the performance of secondary transmission scheme based on Markov ON-OFF state of primary users in Underlay cognitive radio networks.We propose flexible secondary cooperative transmission s... In this paper,we investigate the performance of secondary transmission scheme based on Markov ON-OFF state of primary users in Underlay cognitive radio networks.We propose flexible secondary cooperative transmission schemewith interference cancellation technique according to the ON-OFF status of primary transmitter.For maximal ratio combining(MRC)at destination,we have derived exact closed-form expressions of the outage probability in different situations.The numerical simulation results also reveal that the proposed scheme improve the secondary transmission performance compared with traditional mechanism in terms of secondary outage probability and energy efficiency. 展开更多
关键词 Cognitive radio Markov ON-OFF state relay selection outage probability
下载PDF
Belief Propagation List Decoding for Polar Codes:Performance Analysis and Software Implementation on GPU
8
作者 Zhanxian Liu Wei Li +3 位作者 Lei Sun Wei Li Jianquan Wang Haijun Zhang 《China Communications》 SCIE CSCD 2023年第9期115-126,共12页
Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)de... Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)decoding.In this paper,we firstly introduce an enhanced code construction scheme for BPL decoding to improve its errorcorrection capability.Then,a GPU-based BPL decoder with adoption of the new code construction is presented.Finally,the proposed BPL decoder is tested on NVIDIA RTX3070 and GTX1060.Experimental results show that the presented BPL decoder with early termination criterion achieves above 1 Gbps throughput on RTX3070 for the code(1024,512)with 32 lists under good channel conditions. 展开更多
关键词 polar code belief propagation SIMT list decoding GPU
下载PDF
Classification of Arrhythmia Based on Convolutional Neural Networks and Encoder-Decoder Model
9
作者 Jian Liu Xiaodong Xia +2 位作者 Chunyang Han Jiao Hui Jim Feng 《Computers, Materials & Continua》 SCIE EI 2022年第10期265-278,共14页
As a common and high-risk type of disease,heart disease seriously threatens people’s health.At the same time,in the era of the Internet of Thing(IoT),smart medical device has strong practical significance for medical... As a common and high-risk type of disease,heart disease seriously threatens people’s health.At the same time,in the era of the Internet of Thing(IoT),smart medical device has strong practical significance for medical workers and patients because of its ability to assist in the diagnosis of diseases.Therefore,the research of real-time diagnosis and classification algorithms for arrhythmia can help to improve the diagnostic efficiency of diseases.In this paper,we design an automatic arrhythmia classification algorithm model based on Convolutional Neural Network(CNN)and Encoder-Decoder model.The model uses Long Short-Term Memory(LSTM)to consider the influence of time series features on classification results.Simultaneously,it is trained and tested by the MIT-BIH arrhythmia database.Besides,Generative Adversarial Networks(GAN)is adopted as a method of data equalization for solving data imbalance problem.The simulation results show that for the inter-patient arrhythmia classification,the hybrid model combining CNN and Encoder-Decoder model has the best classification accuracy,of which the accuracy can reach 94.05%.Especially,it has a better advantage for the classification effect of supraventricular ectopic beats(class S)and fusion beats(class F). 展开更多
关键词 ELECTROENCEPHALOGRAPHY convolutional neural network long short-term memory encoder-decoder model generative adversarial network
下载PDF
Classification and Research of Skin Lesions Based on Machine Learning
10
作者 Jian Liu Wantao Wang +2 位作者 Jie Chen Guozhong Sun Alan Yang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1187-1200,共14页
Classification of skin lesions is a complex identification challenge.Due to the wide variety of skin lesions,doctors need to spend a lot of time and effort to judge the lesion image which zoomed through the dermatosco... Classification of skin lesions is a complex identification challenge.Due to the wide variety of skin lesions,doctors need to spend a lot of time and effort to judge the lesion image which zoomed through the dermatoscopy.The diagnosis which the algorithm of identifying pathological images assists doctors gets more and more attention.With the development of deep learning,the field of image recognition has made long-term progress.The effect of recognizing images through convolutional neural network models is better than traditional image recognition technology.In this work,we try to classify seven kinds of lesion images by various models and methods of deep learning,common models of convolutional neural network in the field of image classification include ResNet,DenseNet and SENet,etc.We use a fine-tuning model with a multi-layer perceptron,by training the skin lesion model,in the validation set and test set we use data expansion based on multiple cropping,and use five models’ensemble as the final results.The experimental results show that the program has good results in improving the sensitivity of skin lesion diagnosis. 展开更多
关键词 Skin lesions deep learning data expansion ENSEMBLE
下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
11
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
下载PDF
Early Diagnosis of Lung Tumors for Extending Patients’ Life Using Deep Neural Networks
12
作者 A.Manju R.Kaladevi +6 位作者 Shanmugasundaram Hariharan Shih-Yu Chen Vinay Kukreja Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 SCIE EI 2023年第7期993-1007,共15页
The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tum... The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning techniques.Computer-Aided Diagnostic(CAD)system aids in the diagnosis and shortens the time necessary to detect the tumor detected.The application of Deep Neural Networks(DNN)has also been exhibited as an excellent and effective method in classification and segmentation tasks.This research aims to separate lung cancers from images of Magnetic Resonance Imaging(MRI)with threshold segmentation.The Honey hook process categorizes lung cancer based on characteristics retrieved using several classifiers.Considering this principle,the work presents a solution for image compression utilizing a Deep Wave Auto-Encoder(DWAE).The combination of the two approaches significantly reduces the overall size of the feature set required for any future classification process performed using DNN.The proposed DWAE-DNN image classifier is applied to a lung imaging dataset with Radial Basis Function(RBF)classifier.The study reported promising results with an accuracy of 97.34%,whereas using the Decision Tree(DT)classifier has an accuracy of 94.24%.The proposed approach(DWAE-DNN)is found to classify the images with an accuracy of 98.67%,either as malignant or normal patients.In contrast to the accuracy requirements,the work also uses the benchmark standards like specificity,sensitivity,and precision to evaluate the efficiency of the network.It is found from an investigation that the DT classifier provides the maximum performance in the DWAE-DNN depending on the network’s performance on image testing,as shown by the data acquired by the categorizers themselves. 展开更多
关键词 Lung tumor deep wave auto encoder decision tree classifier deep neural networks extraction techniques
下载PDF
Research on CO Pollution Control of Motor Vehicle Exhaust
13
作者 Weiwei Liu Yang Tang +1 位作者 Fei Yang Jin Wang 《Journal on Internet of Things》 2019年第2期71-76,共6页
Carbon monoxide(CO)is harmful to our health,and even causes death.The main source of CO is automobile exhaust.Therefore,this article determines that CO is the emission factor,and finally the evaluation model is establ... Carbon monoxide(CO)is harmful to our health,and even causes death.The main source of CO is automobile exhaust.Therefore,this article determines that CO is the emission factor,and finally the evaluation model is established.The model provides an important basis for the highway construction project design,traffic management,environmental pollution control,energy saving,environmental evaluation and so on.Compared with the traditional method that calculates the road traffic volume through the air emissions model,according to the total amount of air pollution control,this paper builds the emission diffusion model,which calculates the road traffic volume by road exhaust density.First of all,this paper measures CO emissions by testing 435 multifunction detectors from Shanghai typical roads,and compares the results with the national standard control.According to the standard in automobile exhaust emissions,the extreme values of the traffic volume over the road are calculated.Finally,the model’s reasonableness and accuracy are validated through case study.The results from case analysis show that the evaluation model is of great practical significance. 展开更多
关键词 Highway transportation traffic volume limit emission control carbon monoxide.
下载PDF
Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism
14
作者 Lei Wang Jian Liu Alan Yang 《Journal of Information Hiding and Privacy Protection》 2019年第3期119-133,共15页
In this paper,we study the state-dependent interference channel,where the Rayleigh channel is non-causally known at cognitive network.We propose an active secondary transmission mechanism with interference cancellatio... In this paper,we study the state-dependent interference channel,where the Rayleigh channel is non-causally known at cognitive network.We propose an active secondary transmission mechanism with interference cancellation technique according to the ON-OFF status of primary network.the secondary transmission mechanism is divided into four cases according to the active state of the primary user in the two time slots.For these interference cases,numerical results are provided to show that active interference cancellation mechanism significantly reduces the secondary transmission performance in terms of secondary outage probability and energy efficiency. 展开更多
关键词 Cognitive radio Markov ON-OFF state outage probability energy efficiency.
下载PDF
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:2
15
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain IIoT data storage cryptographic commitment
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
16
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks 被引量:16
17
作者 Jin Wang Chunwei Ju +2 位作者 Yu Gao Arun Kumar Sangaiah Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2018年第9期433-446,共14页
Wireless Sensor Networks(WSNs)are large-scale and high-density networks that typically have coverage area overlap.In addition,a random deployment of sensor nodes cannot fully guarantee coverage of the sensing area,whi... Wireless Sensor Networks(WSNs)are large-scale and high-density networks that typically have coverage area overlap.In addition,a random deployment of sensor nodes cannot fully guarantee coverage of the sensing area,which leads to coverage holes in WSNs.Thus,coverage control plays an important role in WSNs.To alleviate unnecessary energy wastage and improve network performance,we consider both energy efficiency and coverage rate for WSNs.In this paper,we present a novel coverage control algorithm based on Particle Swarm Optimization(PSO).Firstly,the sensor nodes are randomly deployed in a target area and remain static after deployment.Then,the whole network is partitioned into grids,and we calculate each grid’s coverage rate and energy consumption.Finally,each sensor nodes’sensing radius is adjusted according to the coverage rate and energy consumption of each grid.Simulation results show that our algorithm can effectively improve coverage rate and reduce energy consumption. 展开更多
关键词 PARTICLE SWARM optimization COVERAGE control energy EFFICIENCY WIRELESS sensor networks
下载PDF
Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification 被引量:34
18
作者 Ya Tu Yun Lin +1 位作者 Jin Wang Jeong-Uk Kim 《Computers, Materials & Continua》 SCIE EI 2018年第5期243-254,共12页
Deep Learning(DL)is such a powerful tool that we have seen tremendous success in areas such as Computer Vision,Speech Recognition,and Natural Language Processing.Since Automated Modulation Classification(AMC)is an imp... Deep Learning(DL)is such a powerful tool that we have seen tremendous success in areas such as Computer Vision,Speech Recognition,and Natural Language Processing.Since Automated Modulation Classification(AMC)is an important part in Cognitive Radio Networks,we try to explore its potential in solving signal modulation recognition problem.It cannot be overlooked that DL model is a complex model,thus making them prone to over-fitting.DL model requires many training data to combat with over-fitting,but adding high quality labels to training data manually is not always cheap and accessible,especially in real-time system,which may counter unprecedented data in dataset.Semi-supervised Learning is a way to exploit unlabeled data effectively to reduce over-fitting in DL.In this paper,we extend Generative Adversarial Networks(GANs)to the semi-supervised learning will show it is a method can be used to create a more dataefficient classifier. 展开更多
关键词 Deep Learning automated modulation classification semi-supervised learning generative adversarial networks
下载PDF
Adversarial Learning for Distant Supervised Relation Extraction 被引量:7
19
作者 Daojian Zeng Yuan Dai +2 位作者 Feng Li R.Simon Sherratt Jin Wang 《Computers, Materials & Continua》 SCIE EI 2018年第4期121-136,共16页
Recently,many researchers have concentrated on using neural networks to learn features for Distant Supervised Relation Extraction(DSRE).These approaches generally use a softmax classifier with cross-entropy loss,which... Recently,many researchers have concentrated on using neural networks to learn features for Distant Supervised Relation Extraction(DSRE).These approaches generally use a softmax classifier with cross-entropy loss,which inevitably brings the noise of artificial class NA into classification process.To address the shortcoming,the classifier with ranking loss is employed to DSRE.Uniformly randomly selecting a relation or heuristically selecting the highest score among all incorrect relations are two common methods for generating a negative class in the ranking loss function.However,the majority of the generated negative class can be easily discriminated from positive class and will contribute little towards the training.Inspired by Generative Adversarial Networks(GANs),we use a neural network as the negative class generator to assist the training of our desired model,which acts as the discriminator in GANs.Through the alternating optimization of generator and discriminator,the generator is learning to produce more and more discriminable negative classes and the discriminator has to become better as well.This framework is independent of the concrete form of generator and discriminator.In this paper,we use a two layers fully-connected neural network as the generator and the Piecewise Convolutional Neural Networks(PCNNs)as the discriminator.Experiment results show that our proposed GAN-based method is effective and performs better than state-of-the-art methods. 展开更多
关键词 Relation extraction generative adversarial networks distant supervision piecewise convolutional neural networks pair-wise ranking loss
下载PDF
A Fusion Steganographic Algorithm Based on Faster R-CNN 被引量:10
20
作者 Ruohan Meng Steven G.Rice +1 位作者 Jin Wang Xingming Sun 《Computers, Materials & Continua》 SCIE EI 2018年第4期1-16,共16页
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret ... The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret message should not be damaged on the process of the cover media.In order to ensure the invisibility of secret message,complex texture objects should be chosen for embedding information.In this paper,an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message.Firstly,complex texture regions are selected based on a kind of objects detection algorithm.Secondly,three different steganographic methods were used to hide secret message into the selected block region.Experimental results show that the approach enhances the security and robustness. 展开更多
关键词 Faster R-CNN fusion steganography object detection CNNS information hiding.
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部