期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
多头季铵盐表面活性剂的合成及性能评价
1
作者 崔丛丛 张红丽 玄光善 《日用化学工业(中英文)》 CAS 北大核心 2023年第8期899-907,共9页
以不同碳链长度的卤代烷、氯化苄、1,4-对二氯苄为原料合成了双头季铵盐表面活性剂(BTAE-n)和四头季铵盐表面活性剂(PTAE-n)。用HPLC,FT-IR,1H NMR和LC-MS对合成的表面活性剂进行结构表征,并对表面活性剂的Krafft点、乳化性能、润湿性... 以不同碳链长度的卤代烷、氯化苄、1,4-对二氯苄为原料合成了双头季铵盐表面活性剂(BTAE-n)和四头季铵盐表面活性剂(PTAE-n)。用HPLC,FT-IR,1H NMR和LC-MS对合成的表面活性剂进行结构表征,并对表面活性剂的Krafft点、乳化性能、润湿性能、起泡性能四个方面进行表面性能的评价。结果表明BTAE-n和PTAE-n表面活性剂的Krafft点均小于0℃,表现出较好的水溶性和低温溶解性。与苯扎氯铵相比,BTAE-n与PTAE-n的表面活性剂有更好的泡沫稳定性,并且随着烷基长链的碳个数的增加起泡性能下降,而乳化性能增加。接触角的测定结果表明润湿性能BTAE-n优于PTAE-n。根据抑菌、杀菌性能评价结果可知,BTAE-n和PTAE-n对革兰氏阳性菌(金黄色葡萄球菌)和革兰氏阴性菌(大肠杆菌)以及真菌(白色念珠菌)表现出有效的抑菌、杀菌活性,并且相同碳链的四头季铵盐优于双头季铵盐的效果,在相同的类型中随着碳链长度的增加,抑菌、杀菌效果更好。 展开更多
关键词 多头季铵盐 合成 表面性能 抑菌作用
下载PDF
抗污染环氧丙醇复合反渗透膜
2
作者 林晓红 张红梨 +3 位作者 高玉冰 伍丽萍 陈立业 盖景刚 《高分子材料科学与工程》 EI CAS CSCD 北大核心 2018年第8期124-128,共5页
利用聚酰胺膜表面未反应的酰氯基团,采用间苯二胺(MPD)或聚乙烯亚胺(PEI)作为连接剂,环氧丙醇作为改性剂,对聚酰胺膜抗污染性能进行了研究。结果表明:(1)以双氨基MPD(1.0%)为连接剂、0.2%的环氧丙醇改性膜的接触角降低了14.0°;(2)... 利用聚酰胺膜表面未反应的酰氯基团,采用间苯二胺(MPD)或聚乙烯亚胺(PEI)作为连接剂,环氧丙醇作为改性剂,对聚酰胺膜抗污染性能进行了研究。结果表明:(1)以双氨基MPD(1.0%)为连接剂、0.2%的环氧丙醇改性膜的接触角降低了14.0°;(2)以多胺基的PEI(0.5%)为连接剂,0.8%的环氧丙醇改性膜的接触角可降低31.7°,抗蛋白污染测试后改性膜的水通量恢复率显著提高。 展开更多
关键词 聚酰胺反渗透膜 海水淡化 抗污染 环氧丙醇 聚乙烯亚胺
下载PDF
Prison Term Prediction on Criminal Case Description with Deep Learning 被引量:3
3
作者 Shang Li hongli zhang +4 位作者 Lin Ye Shen Su Xiaoding Guo Haining Yu Binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1217-1231,共15页
The task of prison term prediction is to predict the term of penalty based on textual fact description for a certain type of criminal case.Recent advances in deep learning frameworks inspire us to propose a two-step m... The task of prison term prediction is to predict the term of penalty based on textual fact description for a certain type of criminal case.Recent advances in deep learning frameworks inspire us to propose a two-step method to address this problem.To obtain a better understanding and more specific representation of the legal texts,we summarize a judgment model according to relevant law articles and then apply it in the extraction of case feature from judgment documents.By formalizing prison term prediction as a regression problem,we adopt the linear regression model and the neural network model to train the prison term predictor.In experiments,we construct a real-world dataset of theft case judgment documents.Experimental results demonstrate that our method can effectively extract judgment-specific case features from textual fact descriptions.The best performance of the proposed predictor is obtained with a mean absolute error of 3.2087 months,and the accuracy of 72.54%and 90.01%at the error upper bounds of three and six months,respectively. 展开更多
关键词 Neural networks prison term prediction criminal case text comprehension
下载PDF
Catalyzing Random Access at Physical Layer for Internet of Things:An Intelligence Enabled User Signature Code Acquisition Approach 被引量:1
4
作者 Xiaojie Fang Xinyu Yin +2 位作者 Xuejun Sha Jinghui Qiu hongli zhang 《China Communications》 SCIE CSCD 2021年第10期181-192,共12页
Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access atte... Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity. 展开更多
关键词 Internet of Things(IoT) artificial intelligence physical layer CROSS-ENTROPY random access
下载PDF
Ripple+:An Improved Scheme of Ripple Consensus Protocol in Deployability,Liveness and Timing Assumption 被引量:1
5
作者 Chuanwang Ma Yu zhang +3 位作者 Binxing Fang hongli zhang Yidong Jin Dasheng Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第1期463-481,共19页
Ripple acts as a real-time settlement and payment system to connect banks and payment providers.As the consensus support of the Ripple network to ensure network consistency,Ripple consensus protocol has been widely co... Ripple acts as a real-time settlement and payment system to connect banks and payment providers.As the consensus support of the Ripple network to ensure network consistency,Ripple consensus protocol has been widely concerned in recent years.Compared with those Byzantine fault tolerant protocols,Ripple has a significant difference that the system can reach an agreement under decentralized trust model.However,Ripple has many problems both in theory and practice,which arementioned in the previous researches.This paper presents Ripple+,an improved scheme of Ripple consensus protocol,which improves Ripple fromthree aspects:(1)Ripple+employs a specific trustmodel and a corresponding guideline for Unique Node List selection,which makes it easy to deploy in practice to meet the safety and liveness condition;(2)the primary and viewchangemechanismare joined to solve the problem discussed by the previous research that Ripple may lose liveness in some extreme scenarios;(3)we remove the strong synchrony clock and timeout during consensus periods to make it suitable for weak synchrony assumption.We implemented a prototype of Ripple+and conducted experiments to show that Ripple+can achieve the throughput of tens of thousands of transactions per second with no more than half a minute latency,and the view change mechanism hardly incurs additional cost. 展开更多
关键词 RIPPLE CONSENSUS decentralized trust byzantine fault tolerant protocol
下载PDF
EDSM-Based Binary Protocol State Machine Reversing
6
作者 Shen Wang Fanghui Sun +3 位作者 hongli zhang Dongyang Zhan Shuang Li Jun Wang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3711-3725,共15页
Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols ... Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols,most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging)to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition,this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications. 展开更多
关键词 Network security protocol state machine EDSM algorithm protocol reverse engineering protocol analyzing
下载PDF
A Review of Data Cleaning Methods for Web Information System
7
作者 Jinlin Wang Xing Wang +2 位作者 Yuchen Yang hongli zhang Binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1053-1075,共23页
Web information system(WIS)is frequently-used and indispensable in daily social life.WIS provides information services in many scenarios,such as electronic commerce,communities,and edutainment.Data cleaning plays an e... Web information system(WIS)is frequently-used and indispensable in daily social life.WIS provides information services in many scenarios,such as electronic commerce,communities,and edutainment.Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service.In this paper,we present a review of the state-of-the-art methods for data cleaning in WIS.According to the characteristics of data cleaning,we extract the critical elements of WIS,such as interactive objects,application scenarios,and core technology,to classify the existing works.Then,after elaborating and analyzing each category,we summarize the descriptions and challenges of data cleaning methods with sub-elements such as data&user interaction,data quality rule,model,crowdsourcing,and privacy preservation.Finally,we analyze various types of problems and provide suggestions for future research on data cleaning in WIS from the technology and interactive perspective. 展开更多
关键词 Data cleaning web information system data quality rule crowdsourcing privacy preservation
下载PDF
Information Classification and Extraction on Official Web Pages of Organizations
8
作者 Jinlin Wang Xing Wang +3 位作者 hongli zhang Binxing Fang Yuchen Yang Jianan Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期2057-2073,共17页
As a real-time and authoritative source,the official Web pages of organizations contain a large amount of information.The diversity of Web content and format makes it essential for pre-processing to get the unified at... As a real-time and authoritative source,the official Web pages of organizations contain a large amount of information.The diversity of Web content and format makes it essential for pre-processing to get the unified attributed data,which has the value of organizational analysis and mining.The existing research on dealing with multiple Web scenarios and accuracy performance is insufficient.This paper aims to propose a method to transform organizational official Web pages into the data with attributes.After locating the active blocks in the Web pages,the structural and content features are proposed to classify information with the specific model.The extraction methods based on trigger lexicon and LSTM(Long Short-Term Memory)are proposed,which efficiently process the classified information and extract data that matches the attributes.Finally,an accurate and efficient method to classify and extract information from organizational official Web pages is formed.Experimental results show that our approach improves the performing indicators and exceeds the level of state of the art on real data set from organizational official Web pages. 展开更多
关键词 Web pre-process feature classification data extraction trigger lexicon LSTM
下载PDF
TdBrnn:An Approach to Learning Users’Intention to Legal Consultation with Normalized Tensor Decomposition and Bi-LSTM
9
作者 Xiaoding Guo hongli zhang +1 位作者 Lin Ye Shang Li 《Computers, Materials & Continua》 SCIE EI 2020年第4期315-336,共22页
With the development of Internet technology and the enhancement of people’s concept of the rule of law,online legal consultation has become an important means for the general public to conduct legal consultation.Howe... With the development of Internet technology and the enhancement of people’s concept of the rule of law,online legal consultation has become an important means for the general public to conduct legal consultation.However,different people have different language expressions and legal professional backgrounds.This phenomenon may lead to the phenomenon of different descriptions of the same legal consultation.How to accurately understand the true intentions behind different users’legal consulting statements is an important issue that needs to be solved urgently in the field of legal consulting services.Traditional intent understanding algorithms rely heavily on the lexical and semantic information between the original data,and are not scalable,and often require taxing manual annotation work.This article proposes a new approach TdBrnn which is based on the normalized tensor decomposition method and Bi-LSTM to learn users’intention to legal consulting.First,we present the users’legal consulting statements as a tensor.And then we use the normalized tensor decomposition layer proposed by this article to extract the tensor elements and structural information of the original tensor which can best represent users’intention of legal consultation,namely the core tensor.The core tensor relies less on the lexical and semantic information of the original users’legal consulting statements data,it reduces the dimension of the original tensor,and greatly reduces the computational complexity of the subsequent Bi-LSTM algorithm.Furthermore,we use a large number of core tensors obtained by the tensor decomposition layer with users’legal consulting statements tensors as inputs to continuously train Bi-LSTM,and finally derive the users’legal consultation intention classification model which can comprehensively understand the user’s legal consultation intention.Experiments show that our method has faster convergence speed and higher accuracy than traditional recurrent neural networks. 展开更多
关键词 Normalized tensor decomposition Bi-LSTM legal consultation users’intention
下载PDF
Scalable Multi-Hash Name Lookup Method for Named Data Networking
10
作者 Dongliang Xu hongli zhang +1 位作者 Yanbin Sun Yufeng Liu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第6期62-68,共7页
A Scalable Multi-Hash( SMH) name lookup method is proposed,which is based on hierarchical name decomposition to aggregate names sharing common prefixes and multiple scalable hash tables to minimize collisions among pr... A Scalable Multi-Hash( SMH) name lookup method is proposed,which is based on hierarchical name decomposition to aggregate names sharing common prefixes and multiple scalable hash tables to minimize collisions among prefixes. We take the component instead of the entire name as a key in the hash functions. The SMH method achieves lookup speeds of 21. 45 and 20. 87 Mbps on prefix table with 2 million and 3. 6 million names,respectively. The proposed method is the fastest of the four methods considered and requires 61.63 and 89.17 Mb of memory on the prefix tables with 2 million and 3. 6 million names,respectively. The required memory is slightly larger than the best method. The scalability of SMH outperforms that of the other two methods. 展开更多
关键词 NDN name lookup scalable multi-hash longest prefix match
下载PDF
Road Distance Computation Using Homomorphic Encryption in Road Networks
11
作者 Haining Yu Lailai Yin +3 位作者 hongli zhang Dongyang Zhan Jiaxing Qu Guangyao zhang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3445-3458,共14页
Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services.The shortest road distance computation has been considered as one of the m... Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services.The shortest road distance computation has been considered as one of the most fundamental operations of road networks computation.To alleviate privacy concerns about location privacy leaks during road distance computation,it is desirable to have a secure and efficient road distance computation approach.In this paper,we propose two secure road distance computation approaches,which can compute road distance over encrypted data efficiently.An approximate road distance computation approach is designed by using Partially Homomorphic Encryption and road network set embedding.An exact road distance computation is built by using Somewhat Homomorphic Encryption and road network hypercube embedding.We implement our two road distance computation approaches,and evaluate them on the real cityscale road network.Evaluation results show that our approaches are accurate and efficient. 展开更多
关键词 Road network road distance homomorphic encryption
下载PDF
Self-Certificating Root:A Root Zone Security Enhancement Mechanism for DNS
12
作者 Wenfeng Liu Yu zhang +3 位作者 Wenjia zhang Lu Liu hongli zhang Binxing Fang 《Computers, Materials & Continua》 SCIE EI 2020年第4期521-536,共16页
As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hi... As a critical Internet infrastructure,domain name system(DNS)protects the authenticity and integrity of domain resource records with the introduction of security extensions(DNSSEC).DNSSEC builds a single-center and hierarchical resource authentication architecture,which brings management convenience but places the DNS at risk from a single point of failure.When the root key suffers a leak or misconfiguration,top level domain(TLD)authority cannot independently protect the authenticity of TLD data in the root zone.In this paper,we propose self-certificating root,a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol.By adding the TLD public key and signature of the glue records to the root zone,this mechanism enables the TLD authority to certify the self-submitted data in the root zone and protects the TLD authority from the risk of root key failure.This mechanism is implemented on an open-source software,namely,Berkeley Internet Name Domain(BIND),and evaluated in terms of performance,compatibility,and effectiveness.Evaluation results show that the proposed mechanism enables the resolver that only supports DNS/DNSSEC to authenticate the root zone TLD data effectively with minimal performance difference. 展开更多
关键词 Domain name system root zone security single point of failure
下载PDF
Skipping Undesired High-Frequency Content to Boost DPI Engine
13
作者 Likun Liu Jiantao Shi +2 位作者 Xiangzhan Yu hongli zhang Dongyang Zhan 《Computers, Materials & Continua》 SCIE EI 2020年第5期649-661,共13页
Deep Packet Inspection(DPI)at the core of many monitoring appliances,such as NIDS,NIPS,plays a major role.DPI is beneficial to content providers and censorship to monitor network traffic.However,the surge of network t... Deep Packet Inspection(DPI)at the core of many monitoring appliances,such as NIDS,NIPS,plays a major role.DPI is beneficial to content providers and censorship to monitor network traffic.However,the surge of network traffic has put tremendous pressure on the performance of DPI.In fact,the sensitive content being monitored is only a minority of network traffic,that is to say,most is undesired.A close look at the network traffic,we found that it contains many undesired high frequency content(UHC)that are not monitored.As everyone knows,the key to improve DPI performance is to skip as many useless characters as possible.Nevertheless,researchers generally study the algorithm of skipping useless characters through sensitive content,ignoring the high-frequency non-sensitive content.To fill this gap,in this literature,we design a model,named Fast AC Model with Skipping(FAMS),to quickly skip UHC while scanning traffic.The model consists of a standard AC automaton,where the input traffic is scanned byte-by-byte,and an additional sub-model,which includes a mapping set and UHC matching model.The mapping set is a bridge between the state node of AC and UHC matching model,while the latter is to select a matching function from hash and fingerprint functions.Our experiments show promising results that we achieve a throughput gain of 1.3-2.6 times the original throughput and 1.1-1.3 times Barr’s double path method. 展开更多
关键词 Deep packet inspection pattern matching algorithm AC
下载PDF
Determination and Evaluation of Heavy Metal Content of Freshwater Economic Fish in Northeast Guangdong
14
作者 Yanmei ZHONG Qingmei ZHENG +2 位作者 Chunyan HAN Rushu WEN hongli zhang 《Asian Agricultural Research》 2015年第1期61-65 70,70,共6页
Concentrations of lead( Pb),cadmium( Cd),chromium( Cr),copper( Cu),zinc( Zn) and manganese( Mn) were measured in various organs( such as in liver and muscle) from 9 species of freshwater economic fishes which were col... Concentrations of lead( Pb),cadmium( Cd),chromium( Cr),copper( Cu),zinc( Zn) and manganese( Mn) were measured in various organs( such as in liver and muscle) from 9 species of freshwater economic fishes which were collected from northeast area of Guangdong Province. The concentration of metals was measured by inductively coupled plasma atomic emission spectrometry( ICP- AES). Results showed that the levels of metals in hepatopancreas of the fishes were found in order of Zn > Pb > Cu > Hg > Cd,while in muscles were Zn > Cr> Pb > Mn > Cu > Cd. In general,the metals concentrations were significantly higher in liver samples than that in muscle samples. Based on the " pollution index of single factor",the fishes,to one degree or another,were polluted by Pb,Cd,Cr,Cu and Zn,and pollution levels were mostly followed by Pb > Cd > Cr > Cu > Zn. The indexes of Pb and Cd tested in hepatopancreas of the fishes were in a majority exceeded the national safety criteria for food in China. What's more,it was found that the contents of the heavy metals in fishes did not vary with the trophic level which they belong to. In summary,the fishes were polluted by Pb,Cd,Cr,Cu and Zn to some extent,which indicated that hidden danger of heavy metals pollution was present in ecological environment or safety in fishery production in the area. 展开更多
关键词 ECONOMIC FISH Heavy metal Muscle Liver EVALUATION
下载PDF
A Measurement Study on Resource Popularity and Swarm Evolution of BitTorrent System
15
作者 Majing Su hongli zhang +1 位作者 Binxing Fang Lin Ye 《International Journal of Communications, Network and System Sciences》 2013年第6期300-308,共9页
Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies ... Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies on BT almost cover each important aspect, little work reflects the recent development of BT system. In this paper, we develop a hybrid measurement system incorporating both active and passive approaches. By exploiting DHT (Distribute Hash Table) and PEX (Peer Exchange) protocols, we collect more extensive information compared to prior measurement systems. Based on the measurement results, we study the resource popularity and swarm evolution with different population in minute/ hour/day scales, and discover that: 1) the resources in BT system appear obvious unbalanced distribution and hotspot phenomenon, in that 74.6% torrents have no more than 1000 peers;2) The lifetime of torrents can be divided into a fast growing stage, a dramatically shrinking stage, a sustaining stage and a slowly fading out stage in terms of swarm population;3) Users’ interest and diurnal periodicity are the main factors that influence the swarm evolution. The former dominates the first two stages, while the latter is decisive in the third stage. We raise an improved peer arrival rate model to describe the variation of the swarm population. Comparison results show that our model outperforms the state-of-the-art approach according to root mean square error and correlation coefficient. 展开更多
关键词 P2P BITTORRENT MEASUREMENT Modeling POPULARITY SWARM EVOLUTION
下载PDF
A Measurement Study on BitTorrent System
16
作者 Lin Ye hongli zhang +1 位作者 Fei Li Majing Su 《International Journal of Communications, Network and System Sciences》 2010年第12期916-924,共9页
Measuring and characterizing peer-to-peer (P2P) file-sharing systems will benefit the optimization and management of P2P systems. Though there are a lot of measurement studies on BitTorrent almost in every important a... Measuring and characterizing peer-to-peer (P2P) file-sharing systems will benefit the optimization and management of P2P systems. Though there are a lot of measurement studies on BitTorrent almost in every important aspect, few of them focus on the measurement issues and the corresponding solutions, which can strongly influence the accuracy of measurement results. This paper analyzes the key difficulties of measuring BitTorrent and presents a measurement system with combination of active and passive ways, which can han-dle with the problems well and balance the efficiency and integrity. Then compared to other work, a more complete and representative measurement was performed for nearly two months and several characteristics are concerned: 1) there are diverse content sharing in BitTorrent system, but multimedia files that are larger than 100 MB are the most. 2) Distributed Hash Tables has indeed enhanced the ability of peer discovery though there are some pitfalls to be addressed. 3) Pieces are distributed uniformly after the early stage and there are few rare pieces. Furthermore, peer arrival rate shows a periodical pattern, which was not well mod-eled before. Then an improved model is proposed and the experiment results indicate that new model is fitted in with actual measurement results with high accuracy. 展开更多
关键词 P2P BITTORRENT MEASUREMENT PEER PIECE
下载PDF
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH
17
作者 Mahmoud Emam Qi Han hongli zhang 《国际计算机前沿大会会议论文集》 2016年第1期83-85,共3页
Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo ... Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo some manipulations before being shared without leaving any obvious traces of tampering; due to existence of the powerful image editing softwares. Copy-move forgery technique is a very simple and common type of image forgery, where a part of the image is copied and then pasted in the same image to replicate or hide some parts from the image. In this paper, we proposed a copy-scale-move forgery detection method based on Scale Invariant Feature Operator (SFOP) detector. The keypoints are then described using MROGH descriptor. Experimental results show that the proposed method is able to locate and detect the forgery even if under some geometric transformations such as scaling. 展开更多
关键词 Image FORENSICS Copy-move FORGERY DETECTION SCALE invariant feature RANSAC MROGH descriptor
下载PDF
SVR Recommendation Algorithm of Civil Aviation Auxiliary Service Based on Context-Awareness
18
作者 Haohan Liu hongli zhang +1 位作者 Kanghua Hui Huaiqing He 《国际计算机前沿大会会议论文集》 2015年第B12期58-60,共3页
Analysis of the particularity of the civil aviation passenger auxiliary service recommendation scenario.As application of the traditional recommendation algorithm has certain limitation in civil aviation auxiliary ser... Analysis of the particularity of the civil aviation passenger auxiliary service recommendation scenario.As application of the traditional recommendation algorithm has certain limitation in civil aviation auxiliary services recommendation,a SVR recommendation algorithm of auxiliary service of civil aviation based on context-awareness was proposed.Analysis of the civil aviation passenger travel data,construct the civil aviation passenger preference model,then recommend auxiliary service for passengers.Based on the traditional two-dimensional user-item recommendation,considering the user characteristics,item attributes and user contextual information in the process of recommendation,which can effectively reduce the data sparseness in some degree.In addition,when there is a new user or a new item,whose similar users or items can be found according to the user or item attributes,to some extent,which can solve the problem of cold start.The experimental results show that the algorithm can recommend auxiliary service for passengers more accurately,which can provide convenience for passengers as well as increase the quality of airlines’services. 展开更多
关键词 CONTEXT-AWARE RECOMMENDATION SVR AUXILIARY SERVICE of civil aviation RECOMMENDATION Collaborative filtering
下载PDF
Monitoring of Sweat pH and Dual-Mode Anti-Counterfeiting from Metal-Organic Framework-Based Multifunctional Gel
19
作者 Xiangnan Wang hongli zhang +1 位作者 Jiahe Li Gang Zou 《Chinese Journal of Chemistry》 SCIE CAS CSCD 2024年第5期491-498,共8页
Monitoring of sweat pH plays important roles in physiological health,nutritional balance,psychological stress,and sports performance.However,the combination of functional MOFs with phosphorescent material to acquire t... Monitoring of sweat pH plays important roles in physiological health,nutritional balance,psychological stress,and sports performance.However,the combination of functional MOFs with phosphorescent material to acquire the real-time physiological information,as well as the application of dual mode anti-counterfeiting,has seldom been reported.Herein,we developed multifunctional gel films based on MOFs and phosphorescent dyes which responded to H+ions and the related mechanism was studied in detail.Upon exposure to H+,the composite gel film exhibited decreased fluorescent signal but enhanced room temperature phosphorescence(RTP),which could be utilized for sweat pH sensing through a dual-mode.Moreover,multifunctional gel films exhibited a potential application in information encryption and anti-counterfeiting by designing of stimulus responsive multiple patterns.This research provided a new avenue for portable and non-invasive sweat pH monitoring methods while also offering insights into stimulus-responsive multifunctional materials. 展开更多
关键词 Metal–Organic Frameworks Room-temperature phosphorescence Fluorescence Sweat pH monitor ANTI-COUNTERFEITING YTTRIUM Polymer composites Luminescence
原文传递
A New Filter Collaborative State Transition Algorithm for Two-Objective Dynamic Reactive Power Optimization 被引量:3
20
作者 hongli zhang Cong Wang Wenhui Fan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第1期30-43,共14页
Dynamic Reactive Power Optimization(DRPO) is a large-scale, multi-period, and strongly coupled nonlinear mixed-integer programming problem that is difficult to solve directly. First, to handle discrete variables and s... Dynamic Reactive Power Optimization(DRPO) is a large-scale, multi-period, and strongly coupled nonlinear mixed-integer programming problem that is difficult to solve directly. First, to handle discrete variables and switching operation constraints, DRPO is formulated as a nonlinear constrained two-objective optimization problem in this paper. The first objective is to minimize the real power loss and the Total Voltage Deviations(TVDs), and the second objective is to minimize incremental system loss. Then a Filter Collaborative State Transition Algorithm(FCSTA) is presented for solving DRPO problems. Two populations corresponding to two different objectives are employed. Moreover, the filter technique is utilized to deal with constraints. Finally, the effectiveness of the proposed method is demonstrated through the results obtained for a 24-hour test on Ward & Hale 6 bus, IEEE 14 bus, and IEEE 30 bus test power systems. To substantiate the effectiveness of the proposed algorithms, the obtained results are compared with different approaches in the literature. 展开更多
关键词 dynamic reactive power optimization FILTER COLLABORATIVE state transition ALGORITHM WARD &Hale 6bus EEE 14bus IEEE 30bus
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部