期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
基于IGWO算法优化LSSVM的电能质量扰动识别方法
1
作者 江娜 彭震东 +2 位作者 黄芳 尹凤梅 李巧玲 《红水河》 2024年第3期100-106,共7页
为了提高电能质量扰动(power quality disturbance,PQD)识别结果的准确性,笔者提出一种基于改进灰狼优化算法(improved grey wolf optimization,IGWO)优化最小二乘支持向量机(least squares support vector machine,LSSVM)的PQD识别方... 为了提高电能质量扰动(power quality disturbance,PQD)识别结果的准确性,笔者提出一种基于改进灰狼优化算法(improved grey wolf optimization,IGWO)优化最小二乘支持向量机(least squares support vector machine,LSSVM)的PQD识别方法。通过采用收敛因数指数调整、自适应位移和权重动态修订等措施对灰狼优化算法进行改进,得到IGWO算法;以PQD信号的9个特征量为支持向量、7种PQD类型为输出量,利用IGWO算法寻找LSSVM的最优参数,建立基于IGWO-LSSVM的PQD识别模型并进行仿真分析,且与其他模型的识别结果进行对比。结果表明,相比算例中列出的几种对比模型,IGWO-LSSVM模型识别结果的正确率更高,验证了所提PQD识别方法的有效性和实用性。 展开更多
关键词 电能质量扰动 识别 改进灰狼优化算法 最小二乘支持向量机 S变换
下载PDF
基于智能卡的匿名认证方案 被引量:1
2
作者 濮光宁 殷凤梅 侯整风 《合肥师范学院学报》 2020年第3期16-19,共4页
现有的一些身份认证方案中往往存在两个安全问题(1)易受到智能卡丢失攻击;(2)不支持匿名认证。为解决这两个问题,在单向散列函数、随机数和时间戳基础上,提出了一种匿名认证方案。该方案在满足系统安全性的前提下,具备匿名性和相互认证... 现有的一些身份认证方案中往往存在两个安全问题(1)易受到智能卡丢失攻击;(2)不支持匿名认证。为解决这两个问题,在单向散列函数、随机数和时间戳基础上,提出了一种匿名认证方案。该方案在满足系统安全性的前提下,具备匿名性和相互认证性,可抵抗内部攻击、外部攻击、重放攻击和智能卡丢失攻击。仿真实验显示,与同类方案相比,本文方案的计算成本相对较小。 展开更多
关键词 身份认证 匿名性 密钥协商 智能卡
下载PDF
基于OBE的数据结构课程在线教学模式探究 被引量:9
3
作者 殷凤梅 史君华 《长春大学学报》 2021年第4期96-100,共5页
基于OBE教育理念,从知识目标、能力目标和素质目标三个方面,制定以目标为导向的课程教学目标。结合学生的问卷调查,确立“课前自主预习—课中连线直播—课后答疑拓展”教学模式。为实现在线教学“不打折”,实施了如下在线教学举措:①精... 基于OBE教育理念,从知识目标、能力目标和素质目标三个方面,制定以目标为导向的课程教学目标。结合学生的问卷调查,确立“课前自主预习—课中连线直播—课后答疑拓展”教学模式。为实现在线教学“不打折”,实施了如下在线教学举措:①精选资源,夯实在线教学基础;②精选平台,提升课堂认同感;③多措并举,提升学生参与度。从教学平台的成绩统计可以看出,采用超星学习通+钉钉双平台教学模式,学生积极参与各项活动,在线教学效果良好。 展开更多
关键词 OBE 在线教学 智慧课堂 超星学习通 钉钉直播
下载PDF
基于SSM框架的网上招聘系统设计与实现 被引量:4
4
作者 殷凤梅 刘冠中 《长春大学学报》 2022年第4期1-5,62,共6页
在互联网高度发达的今天,越来越多的企业选择使用网上招聘系统招聘人才,求职者们更是将网上求职当作首要选择。本系统基于SSM框架技术开发,用MySQL数据库来存放相关的数据,实现了发布招聘信息、申请与收藏职位、在线下载简历等功能,将... 在互联网高度发达的今天,越来越多的企业选择使用网上招聘系统招聘人才,求职者们更是将网上求职当作首要选择。本系统基于SSM框架技术开发,用MySQL数据库来存放相关的数据,实现了发布招聘信息、申请与收藏职位、在线下载简历等功能,将方便与实惠真正带给企业和求职者。 展开更多
关键词 网上招聘系统 SSM MYSQL
下载PDF
基于智慧课堂的程序设计类课程教学模式探究 被引量:3
5
作者 殷凤梅 王筱薇倩 《长春大学学报》 2020年第8期67-72,共6页
随着“互联网+”和大数据时代的到来,现代信息技术与教育教学深度融合,智慧课堂应运而生。与传统课堂相比,智慧课堂的教学过程从过去依赖于教学经验向现在依赖于客观数据转变。基于迭代式课程改革,课前课中课后连贯一体、线上线下智慧... 随着“互联网+”和大数据时代的到来,现代信息技术与教育教学深度融合,智慧课堂应运而生。与传统课堂相比,智慧课堂的教学过程从过去依赖于教学经验向现在依赖于客观数据转变。基于迭代式课程改革,课前课中课后连贯一体、线上线下智慧互动、校企合作育人,智慧课堂教学打破了传统教学的时空限制。与传统教学班级教学试验对比,智慧课堂教学班的平时成绩和期末成绩显著提高。 展开更多
关键词 智慧课堂 程序设计 校企合作 网络教学平台
下载PDF
基于计算思维的C语言课程案例设计探索 被引量:3
6
作者 马巍巍 殷凤梅 《合肥师范学院学报》 2019年第3期85-87,共3页
针对高校非计算机专业C语言程序设计教学的现状,结合合肥师范学院应用型本科教学的主体思想,对课堂导入、教学深入和实验练习等三个阶段分别提出融入计算思维的案例设计方法,旨在提高学生的计算思维能力和创新意识。
关键词 计算思维 程序设计 案例教学法
下载PDF
基于Java的快餐店商家收银系统研究 被引量:1
7
作者 殷凤梅 尹兰 王筱薇倩 《合肥师范学院学报》 2019年第3期45-49,共5页
分析了在当今快速发展的社会中,快餐店商家收银的现状及出现的问题。基于Java语言,VScode+MySQL+IDEA平台设计前端和后端,实现了一个快餐店商家收银系统。本系统在成功连接数据库,收银员成功登录系统后,可以为顾客点餐、提交订单和结账... 分析了在当今快速发展的社会中,快餐店商家收银的现状及出现的问题。基于Java语言,VScode+MySQL+IDEA平台设计前端和后端,实现了一个快餐店商家收银系统。本系统在成功连接数据库,收银员成功登录系统后,可以为顾客点餐、提交订单和结账。另外,本系统还可以管理菜品。通过软件和硬件环境测试,本系统正确可行。 展开更多
关键词 快餐店 收银系统 VScode JAVA MYSQL
下载PDF
An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability
8
作者 PU Guangning yin fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第4期317-323,共7页
In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authenticati... In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes. 展开更多
关键词 anonymous authentication TRACEABILITY THRESHOLD ring signature linkability
原文传递
Geohash编码的k匿名位置隐私保护方案 被引量:8
9
作者 殷凤梅 陈鸿 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2022年第1期73-82,共10页
采用k匿名技术的位置隐私保护方案为了构造匿名位置集,检索历史数据库的时间开销往往较大,位置服务失去了即时的优越性。为解决此问题,提出了基于Geohash编码的k匿名位置隐私保护方案。该方案将用户的经纬度坐标位置泛化到一个区间区域... 采用k匿名技术的位置隐私保护方案为了构造匿名位置集,检索历史数据库的时间开销往往较大,位置服务失去了即时的优越性。为解决此问题,提出了基于Geohash编码的k匿名位置隐私保护方案。该方案将用户的经纬度坐标位置泛化到一个区间区域,使用Geohash算法编码;选取与Geohash编码相同的位置,经反向检索构成候选匿名位置集;筛选多余位置时兼顾历史查询概率,再附上k-1个伪查询以混淆用户的真实查询内容;收到查询请求服务后,位置服务器获取并加密查询结果,用户再解密获得查询结果,最终实现k匿名位置隐私保护。在双线性映射的相关问题假设前提下,该方案满足正确性、验证性和匿名性,可以抵抗伪装攻击、重放攻击和共谋攻击。仿真实验显示,在处理数据的时间开销和匿名隐私度上,本文提出的方案具有更好的优越性。 展开更多
关键词 Geohash编码 位置服务 k匿名 隐私保护 移动终端
原文传递
Anonymous Authentication Scheme Based on Smart Card and Biometrics in the Electronic Medical Environment
10
作者 PU Guangning yin fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期183-190,共8页
With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the ele... With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the electronic medical environment, it is also necessary to consider that the patient may access multiple hospital servers. Based on three factors of smart card, random number and biometrics, an anonymous authentication scheme in the electronic medical environment is proposed. In order to reduce the burden of the medical registration and certification center(HC), in the proposed anonymous authentication scheme, the patient only needs to register with HC once, then he/she can apply for visiting each hospital that has joined the medical servers. Security analysis shows that the proposed scheme has anonymity and dual authentication, and can resist various types of attacks, such as insider attack, modification attack, replay attack and smart card loss attack. Efficiency analysis shows that the calculation cost of the proposed scheme in the registration and login phase is lower, and it is slightly higher than Lei's scheme and Khan et al's scheme in the authentication phase. The proposed scheme can not only resist various types of attacks, but also support dual authentication and multi-server environment. With a little modification, the proposed scheme can also be used to other application scenarios requiring anonymous authentication. 展开更多
关键词 AUTHENTICATION ANONYMITY key agreement smart card MULTI-SERVER
原文传递
A Traceable and Anonymous Authentication Scheme Based on ECC
11
作者 yin fengmei HOU Zhengfeng WU Hao 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第6期521-526,共6页
Based on elliptic curve public key cryptosystem and with the help of ring signature,a traceable and anonymous authentication scheme is proposed.The security of the proposed scheme is based on the difficulty of solving... Based on elliptic curve public key cryptosystem and with the help of ring signature,a traceable and anonymous authentication scheme is proposed.The security of the proposed scheme is based on the difficulty of solving elliptic curve discrete logarithm problem(ECDLP)and the computational Diffie-Hellman assumption(CDHA).In order to prevent random tracing,the threshold technology is introduced into anonymous tracing.In addition,in the signature generation process,using the private key and the additional random number,the signature satisfies unforgeability.Compared with the existing schemes,the communication overhead of the proposed scheme is relatively small.In the case of similar calculational overhead,the proposed scheme not only has anonymous authentication,signature unforgeability,but also has threshold traceability. 展开更多
关键词 anonymous authentication TRACEABILITY THRESHOLD ECC ring signature
原文传递
An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
12
作者 yin fengmei PU Guangning 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期415-420,共6页
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the thr... A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf(LRSW) and Diffie-Hellman(DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on. 展开更多
关键词 anonymous authentication anonymous tracking threshold conspiracy attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部