期刊文献+
共找到432篇文章
< 1 2 22 >
每页显示 20 50 100
BACNN: Multi-scale feature fusion-based bilinear attention convolutional neural network for wood NIR classification 被引量:1
1
作者 Zihao Wan Hong Yang +2 位作者 Jipan Xu Hongbo Mu Dawei Qi 《Journal of Forestry Research》 SCIE EI CAS CSCD 2024年第4期202-214,共13页
Effective development and utilization of wood resources is critical.Wood modification research has become an integral dimension of wood science research,however,the similarities between modified wood and original wood... Effective development and utilization of wood resources is critical.Wood modification research has become an integral dimension of wood science research,however,the similarities between modified wood and original wood render it challenging for accurate identification and classification using conventional image classification techniques.So,the development of efficient and accurate wood classification techniques is inevitable.This paper presents a one-dimensional,convolutional neural network(i.e.,BACNN)that combines near-infrared spectroscopy and deep learning techniques to classify poplar,tung,and balsa woods,and PVA,nano-silica-sol and PVA-nano silica sol modified woods of poplar.The results show that BACNN achieves an accuracy of 99.3%on the test set,higher than the 52.9%of the BP neural network and 98.7%of Support Vector Machine compared with traditional machine learning methods and deep learning based methods;it is also higher than the 97.6%of LeNet,98.7%of AlexNet and 99.1%of VGGNet-11.Therefore,the classification method proposed offers potential applications in wood classification,especially with homogeneous modified wood,and it also provides a basis for subsequent wood properties studies. 展开更多
关键词 Wood classification Near infrared spectroscopy Bilinear network SE module Anti-noise algorithm
下载PDF
Some Modified Equations of the Sine-Hilbert Type
2
作者 闫铃娟 刘亚杰 胡星标 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第4期1-6,共6页
Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based... Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived. 展开更多
关键词 BILINEAR EQUATIONS EQUATION
下载PDF
Dark Localized Waves in Shallow Waters:Analysis within an Extended Boussinesq System
3
作者 Zhengping Yang Wei-Ping Zhong Milivoj Belic 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第4期32-37,共6页
We study dark localized waves within a nonlinear system based on the Boussinesq approximation,describing the dynamics of shallow water waves.Employing symbolic calculus,we apply the Hirota bilinear method to transform... We study dark localized waves within a nonlinear system based on the Boussinesq approximation,describing the dynamics of shallow water waves.Employing symbolic calculus,we apply the Hirota bilinear method to transform an extended Boussinesq system into a bilinear form,and then use the multiple rogue wave method to obtain its dark rational solutions.Exploring the first-and second-order dark solutions,we examine the conditions under which these localized solutions exist and their spatiotemporal distributions.Through the selection of various parameters and by utilizing different visualization techniques(intensity distributions and contour plots),we explore the dynamical properties of dark solutions found:in particular,the first-and second-order dark rogue waves.We also explore the methods of their control.The findings presented here not only deepen the understanding of physical phenomena described by the(1+1)-dimensional Boussinesq equation,but also expand avenues for further research.Our method can be extended to other nonlinear systems,to conceivably obtain higher-order dark rogue waves. 展开更多
关键词 BOUSSINESQ BILINEAR nonlinear
下载PDF
Direct scaling of residual displacements for bilinear and pinching oscillators
4
作者 Mohammad Saifullah Vinay K.Gupta 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期129-149,共21页
The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displ... The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displacements plays an important role in ensuring cost-feasible or cost-effective repairs in a damaged structure after the event.An attempt is made in this study to obtain statistical estimates of constant-ductility residual displacement spectra for bilinear and pinching oscillators with 5%initial damping,directly in terms of easily available seismological,site,and model parameters.None of the available models for the bilinear and pinching oscillators are useful when design spectra for a seismic hazard at a site are not available.The statistical estimates of a residual displacement spectrum are proposed in terms of earthquake magnitude,epicentral distance,site geology parameter,and three model parameters for a given set of ductility demand and a hysteretic energy capacity coefficient in the case of bilinear and pinching models,as well as for a given set of pinching parameters for displacement and strength at the breakpoint in the case of pinching model alone.The proposed scaling model is applicable to horizontal ground motions in the western U.S.for earthquake magnitudes less than 7 or epicentral distances greater than 20 km. 展开更多
关键词 residual displacement spectrum bilinear hysteresis model pinching hysteresis model nonlinear analysis scaling model
下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
5
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(VANET)
下载PDF
Dynamics of Nonlinear Waves in(2+1)-Dimensional Extended Boiti-Leon-Manna-Pempinelli Equation
6
作者 SUN Junxiu WANG Yunhu 《应用数学》 北大核心 2024年第4期1103-1113,共11页
Based on the Hirota bilinear method,this study derived N-soliton solutions,breather solutions,lump solutions and interaction solutions for the(2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation.The dynamic... Based on the Hirota bilinear method,this study derived N-soliton solutions,breather solutions,lump solutions and interaction solutions for the(2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation.The dynamical characteristics of these solutions were displayed through graphical,particularly revealing fusion and ssion phenomena in the interaction of lump and the one-stripe soliton. 展开更多
关键词 Hirota bilinear method N-soliton solutions Breather solutions Lump solutions Interaction solutions (2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation
下载PDF
Model Order Reduction Methods for Discrete Systems via Discrete Pulse Orthogonal Functions
7
作者 XIE Zhen TANG Shengguo WANG Zhaohong 《新疆大学学报(自然科学版中英文)》 CAS 2024年第6期641-650,共10页
This paper explores model order reduction(MOR)methods for discrete linear and discrete bilinear systems via discrete pulse orthogonal functions(DPOFs).Firstly,the discrete linear systems and the discrete bilinear syst... This paper explores model order reduction(MOR)methods for discrete linear and discrete bilinear systems via discrete pulse orthogonal functions(DPOFs).Firstly,the discrete linear systems and the discrete bilinear systems are expanded in the space spanned by DPOFs,and two recurrence formulas for the expansion coefficients of the system’s state variables are obtained.Then,a modified Arnoldi process is applied to both recurrence formulas to construct the orthogonal projection matrices,by which the reduced-order systems are obtained.Theoretical analysis shows that the output variables of the reducedorder systems can match a certain number of the expansion coefficients of the original system’s output variables.Finally,two numerical examples illustrate the feasibility and effectiveness of the proposed methods. 展开更多
关键词 model order reduction discrete linear systems discrete bilinear systems discrete pulse orthogonal functions
下载PDF
High-Order Solitons and Hybrid Behavior of (3 + 1)-Dimensional Potential Yu-Toda-Sasa-Fukuyama Equation with Variable Coefficients
8
作者 Xiyu Tan Xingying Li 《Journal of Applied Mathematics and Physics》 2024年第8期2738-2763,共26页
In this paper, some exact solutions of the (3 + 1)-dimensional variable-coefficient Yu-Toda-Sasa-Fukuyama equation are investigated. By using Hirota’s direct method and symbolic computation, we obtained N-soliton sol... In this paper, some exact solutions of the (3 + 1)-dimensional variable-coefficient Yu-Toda-Sasa-Fukuyama equation are investigated. By using Hirota’s direct method and symbolic computation, we obtained N-soliton solution. By using the long wave limit method, the N-order rational solution can be obtained from N-order soliton solution. Then, through the paired complexification of parameters, the lump solution is obtained from N-order rational solution. Meanwhile, we obtained a hybrid solution between 1-lump solution and N-soliton (N=1,2) by using the long wave limit method and parameter complex. Furthermore, four different sets of three-dimensional graphs of solitons, lump solutions and hybrid solutions are drawn by selecting four different sets of coefficient functions which include one set of constant coefficient function and three sets of variable coefficient functions. 展开更多
关键词 Variable-Coefficient YTSF Equation Hirota Bilinear Method N-SOLITON Hybrid Solution
下载PDF
High-Order Soliton Solutions and Hybrid Behavior for the (2 + 1)-Dimensional Konopelchenko-Dubrovsky Equations
9
作者 Xingying Li Yin Ji 《Journal of Applied Mathematics and Physics》 2024年第7期2452-2466,共15页
In this paper, the evolutionary behavior of N-solitons for a (2 + 1)-dimensional Konopelchenko-Dubrovsky equations is studied by using the Hirota bilinear method and the long wave limit method. Based on the N-soliton ... In this paper, the evolutionary behavior of N-solitons for a (2 + 1)-dimensional Konopelchenko-Dubrovsky equations is studied by using the Hirota bilinear method and the long wave limit method. Based on the N-soliton solution, we first study the evolution from N-soliton to T-order (T=1,2) breather wave solutions via the paired-complexification of parameters, and then we get the N-order rational solutions, M-order (M=1,2) lump solutions, and the hybrid behavior between a variety of different types of solitons combined with the parameter limit technique and the paired-complexification of parameters. Meanwhile, we also provide a large number of three-dimensional figures in order to better show the degeneration of the N-soliton and the interaction behavior between different N-solitons. 展开更多
关键词 Konopelchenko-Dubrovsky Equations Hirota Bilinear Method M-Order Lump Solutions High-Order Hybrid Solutions Interaction Behavior
下载PDF
标准模型下一种实用的和可证明安全的IBE方案 被引量:4
10
作者 徐鹏 崔国华 +2 位作者 雷凤宇 汤学明 陈晶 《计算机学报》 EI CSCD 北大核心 2010年第2期335-344,共10页
组合公钥方案是一种用于基于身份密码体制中生成用户加密密钥和私钥的知名方案.针对组合公钥方案存在合谋攻击的问题,通过仅扩展该方案的私钥生成过程,实现了扩展方案的抗合谋攻击性.在此基础上构建标准模型下基于Decisional Bilinear D... 组合公钥方案是一种用于基于身份密码体制中生成用户加密密钥和私钥的知名方案.针对组合公钥方案存在合谋攻击的问题,通过仅扩展该方案的私钥生成过程,实现了扩展方案的抗合谋攻击性.在此基础上构建标准模型下基于Decisional Bilinear Diffie-Hell man假设可证明安全的一种新的基于身份加密方案.最后,为了说明所构新方案的实用性,分析了扩展组合公钥方案的用户加密密钥抗碰撞性;对比了新方案和同类的3个知名方案在安全性证明的归约程度方面、加解密的时间复杂度方面和密文的长度方面的性能,表明了新方案在以上3点上具有目前最优的指标.因此新方案是相对较实用的. 展开更多
关键词 组合公钥 合谋攻击 标准模型 Decisional BILINEAR DIFFIE-HELLMAN假设 基于身份加密
下载PDF
NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD 被引量:2
11
作者 杨君佐 王永建 周渊 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第2期187-192,共6页
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ... Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational. 展开更多
关键词 remote user authentication password authentication remote login bilinear pairings
下载PDF
一种新的基于身份的安全组播密钥协商方案 被引量:2
12
作者 陈礼青 张福泰 《电子与信息学报》 EI CSCD 北大核心 2008年第1期21-24,共4页
密钥管理是安全组播的难点。该文提出了一个新的基于身份的密钥协商方案,并具体地分析了子组之间的通信过程,以及组成员动态变化时密钥的更新过程。结果表明该方案满足密钥协商安全性要求,且在降低计算和通信代价方面取得了较好的效果。
关键词 安全组播 密钥协商 基于身份的密码系统 BILINEAR PAIRING
下载PDF
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
13
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature ID-based cryptosystem bilinear pairings
下载PDF
Pitfalls in Identity Based Encryption Using Extended Chebyshev Polynomial
14
作者 Qian Haifeng Li Xiangxue Yu Yu 《China Communications》 SCIE CSCD 2012年第1期58-63,共6页
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ... Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty. 展开更多
关键词 IBE extended Chebyshev polynomial chaotic cryptography bilinearity
下载PDF
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings 被引量:24
15
作者 WANG Shengbao CAO Zhenfu WANG Licheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1278-1282,共5页
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser... In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols. 展开更多
关键词 Web security authenticated key agreement certificateless public key cryptography bilinear pairings
下载PDF
Higher-Dimensional KdV Equations and Their Soliton Solutions 被引量:12
16
作者 ZHANG Yu-Feng Tam Honwah ZHAO Jing 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第3期411-413,共3页
A (2+1)-dimensional KdV equation is obtained by use of Hirota method, which possesses N-soliton solution, specially its exact two-soliton solution is presented. By employing a proper algebraic transformation and th... A (2+1)-dimensional KdV equation is obtained by use of Hirota method, which possesses N-soliton solution, specially its exact two-soliton solution is presented. By employing a proper algebraic transformation and the Riccati equation, a type of hell-shape soliton solutions are produced via regarding the variable in the Riccati equation as the independent variable. Finally, we extend the above (2+1)-dimensional KdV equation into (3+1)-dimensional equation, the two-soliton solutions are given. 展开更多
关键词 bilinear operator KdV equation soliton equation
下载PDF
Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model 被引量:13
17
作者 Qi Zhenghua Ren Xunyi Yang Geng 《China Communications》 SCIE CSCD 2012年第11期107-116,共10页
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre... To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation. 展开更多
关键词 identity-based cryptography SIGNCRYPTION aggregate signature bilinear pairing
下载PDF
Alliance-Authentication Protocol in Clouds Computing Environment 被引量:7
18
作者 Zhang Qikun Li Yuanzhang +1 位作者 Song Danjie Tan Yuan 《China Communications》 SCIE CSCD 2012年第7期42-54,共13页
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids 展开更多
关键词 Alliance-Authentication direct product DECOMPOSITION bilinear mapping cloud computing
下载PDF
Provably Secure Certificateless Ring Signcryption Scheme 被引量:10
19
作者 祁正华 杨庚 任勋益 《China Communications》 SCIE CSCD 2011年第3期99-106,共8页
Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inhere... Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inherent key escrow problem.In this paper a new certificateless ring signcryption scheme from pairings is presented.It is escrow free in that no KGC is able to decrypt ciphertexts itself.We then formally prove the security of the new scheme in the random oracle model IND-CCA2 and EUF-CMA. 展开更多
关键词 ring signcryption certificateless cryptography bilinear pairing
下载PDF
SLIDING-MODE CONTROL OF UNOERTAINTY BILINEAR SYSTEM
20
作者 王海涛 王先来 李光泉 《Transactions of Tianjin University》 EI CAS 1999年第1期57-60,共4页
In this paper,the sliding-mode control of a bilinear system is studied. It improves the dynamicresponse of the closedweloop system around the original point and is rather robust to the bounded disturbance. At last,the... In this paper,the sliding-mode control of a bilinear system is studied. It improves the dynamicresponse of the closedweloop system around the original point and is rather robust to the bounded disturbance. At last,the model of an ammonia synthesis reactor is adopted to illustrate the phenomenon described. 展开更多
关键词 bilinear system sliding-mode control ROBUSTNESS
下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部