期刊文献+
共找到397篇文章
< 1 2 20 >
每页显示 20 50 100
The Theoretical Logic of the Right to Security
1
作者 HE Zhipeng JIANG Yu 《The Journal of Human Rights》 2024年第4期747-775,共29页
The growing significance of security issues has expanded the necessity and possibility of recognizing and achieving the goal of security from the perspective of human rights.Combined with socio-cultural and historical... The growing significance of security issues has expanded the necessity and possibility of recognizing and achieving the goal of security from the perspective of human rights.Combined with socio-cultural and historical dynamics,human rights can be construed as the needs of people to which social authorities should and can respond,and their mechanism depends on“the alignment between people’s intrinsic needs and the social resources available.”Security,as a significant part of people’s intrinsic needs,should be supported by social resources;social authorities at all levels have the duty and potential to support people’s security needs.Thus,security has the socio-cultural basis to be considered as a branch of human rights.Once the human rights attribution of security has been established,further consideration is required for its place in the human rights spectrum.When analyzing the existing set of human rights,we can classify them based on the subject,the object,or the goal.The right to security is more appropriately classified within the dimension of goals,thereby being placed alongside the right to subsistence and the right to development.Integrating security into human rights can resolve the relationship between the right to security and other human rights using the theoretical framework of rights conflict,rights hierarchy,and rights system ranking,thereby avoiding the tendency to curb the security needs of countries and individuals by ideologizing human rights. 展开更多
关键词 human rights security the right to security human rights spectrum human rights classification targeted human rights
下载PDF
半剂量替罗非班辅助PCI术治疗老年急性ST段抬高心肌梗死的疗效与安全性
2
作者 杨丽 刘庆力 《四川生理科学杂志》 2024年第3期487-489,492,共4页
目的:研究半剂量替罗非班辅助经皮冠状动脉介入治疗(Percutaneous coronary intervention,PCI)术治疗老年急性ST段抬高心肌梗死(ST-segment elevation myocardial infarction,STEMI)的疗效与安全性.方法:选择2022年1月至12月在我院接受... 目的:研究半剂量替罗非班辅助经皮冠状动脉介入治疗(Percutaneous coronary intervention,PCI)术治疗老年急性ST段抬高心肌梗死(ST-segment elevation myocardial infarction,STEMI)的疗效与安全性.方法:选择2022年1月至12月在我院接受治疗的98例老年急性STEMI患者作为研究对象,按照随机对照原则分为对照组和研究组,各49例.其中对照组采用全剂量替罗非班辅助PCI术治疗,研究组采用半剂量替罗非班辅助PCI术治疗.比较两组心功能、血管内皮功能、炎症反应、不良事件及出血事件的发生情况.结果:治疗1 m m后,两组左心室舒张末期内径(Left ventricular end diastolic diameter,LVEDD)、左心室收缩末期内径(Left ventricular end systolic diameter,LVESD)、内皮素-1(Endothelin-1,ET-1)、血管性假血友病因子(Von Willebrand factor,vWF)、白介素(Interlenkim-6,IL-6)、肿瘤坏死因子-α(Tumor necrosis factor-α,TNF-α)、超敏C反应蛋白(High-sensitivity C-reactive protein,hs-CRP)均明显降低,而左心室射血分数(Left ventricular ejection fraction,LVEF)、一氧化氮(Nitric oxide,NO)均明显升高(P<0.05),但两组之间均无明显差异(P>0.05).研究组出血事件发生率明显低于对照组(P<0.05).研究组其他不良事件发生率与对照组无明显差异(P>0.05).结论:老年急性STEMI患者采用半剂量替罗非班辅助PCI术治疗不会影响疗效,但可有效降低出血风险,安全性较高. 展开更多
关键词 老年急性st段抬高心肌梗死 PCI术 替罗非班 半剂量 安全性
下载PDF
NSTEMI靶血管为左回旋支与右冠状动脉患者心电图特征的差异及意义
3
作者 韩星 杨亚攀 +1 位作者 申媛媛 范立华 《海南医学》 CAS 2024年第14期2021-2025,共5页
目的探讨急性非ST段抬高型心肌梗死(NSTEMI)靶血管为左回旋支(LCX)与右冠状动脉(RCA)患者心电图特征的差异及意义。方法选取2021年9月至2023年12月河南中医药大学第三附属医院收治的88例靶血管为LCX NSTEMI患者(LCX组)与70例靶血管为RCA... 目的探讨急性非ST段抬高型心肌梗死(NSTEMI)靶血管为左回旋支(LCX)与右冠状动脉(RCA)患者心电图特征的差异及意义。方法选取2021年9月至2023年12月河南中医药大学第三附属医院收治的88例靶血管为LCX NSTEMI患者(LCX组)与70例靶血管为RCA NSTEMI患者(RCA组)纳入研究。比较两组患者的一般资料及心电图特征,采用受试者工作特征曲线(ROC)分析心电图特征对靶血管定位的鉴别诊断价值。结果两组患者的一般资料比较差异均无统计学意义(P>0.05);RCA组患者STⅠ降低、STⅢ↑>STⅡ↑、(ΣSTV_(1)~V_(3)↓/ΣSTⅡ、Ⅲ、aVF↑)≤1、STV4R升高患者占比分别为80.00%、92.86%、92.86%、45.71%,明显高于LCX组的26.14%、38.64%、51.14%、6.82%,STⅠ等电线、STⅡ↑>STⅢ↑、STV4R降低、V_(7)~V_(9)导联QRS波终末扭曲患者占比分别为20.00%、5.71%、2.86%、5.71%,明显低于LCX组的70.45%、60.23%、31.82%、53.41%,差异均有统计学意义(P<0.05);ROC分析结果显示,心电图各特征联合鉴别诊断LCX和RCA靶血管病变的曲线下面积(AUC)为0.907(95%CI:0.850~0.947),其敏感度为94.25%,特异度为87.14%,优于各特征单独鉴别诊断价值(P<0.05)。结论心电图特征为STⅠ降低、STⅢ↑>STⅡ↑、(ΣSTV_(1)~V_(3)↓/ΣSTⅡ、Ⅲ、aVF↑)≤1、STV4R升高对判断NSTEMI靶血管为RCA具有一定价值,STⅠ等电线、STⅡ↑>STⅢ↑、STV4R降低、V_(7)~V_(9)导联QRS波终末扭曲对判断NSTEMI靶血管为LCX具有一定价值,联合应用可作为临床鉴别诊断LCX与RCA靶血管的有效指标。 展开更多
关键词 st段抬高型心肌梗死 靶血管 左回旋支 右冠状动脉 心电图
下载PDF
Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization
4
作者 Zhiyi Ding Lei Sun +2 位作者 Xiuqing Mao Leyu Dai Ruiyang Ding 《Computers, Materials & Continua》 SCIE EI 2024年第9期4387-4412,共26页
Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural netw... Object detection finds wide application in various sectors,including autonomous driving,industry,and healthcare.Recent studies have highlighted the vulnerability of object detection models built using deep neural networks when confronted with carefully crafted adversarial examples.This not only reveals their shortcomings in defending against malicious attacks but also raises widespread concerns about the security of existing systems.Most existing adversarial attack strategies focus primarily on image classification problems,failing to fully exploit the unique characteristics of object detectionmodels,thus resulting in widespread deficiencies in their transferability.Furthermore,previous research has predominantly concentrated on the transferability issues of non-targeted attacks,whereas enhancing the transferability of targeted adversarial examples presents even greater challenges.Traditional attack techniques typically employ cross-entropy as a loss measure,iteratively adjusting adversarial examples to match target categories.However,their inherent limitations restrict their broad applicability and transferability across different models.To address the aforementioned challenges,this study proposes a novel targeted adversarial attack method aimed at enhancing the transferability of adversarial samples across object detection models.Within the framework of iterative attacks,we devise a new objective function designed to mitigate consistency issues arising from cumulative noise and to enhance the separation between target and non-target categories(logit margin).Secondly,a data augmentation framework incorporating random erasing and color transformations is introduced into targeted adversarial attacks.This enhances the diversity of gradients,preventing overfitting to white-box models.Lastly,perturbations are applied only within the specified object’s bounding box to reduce the perturbation range,enhancing attack stealthiness.Experiments were conducted on the Microsoft Common Objects in Context(MS COCO)dataset using You Only Look Once version 3(YOLOv3),You Only Look Once version 8(YOLOv8),Faster Region-based Convolutional Neural Networks(Faster R-CNN),and RetinaNet.The results demonstrate a significant advantage of the proposed method in black-box settings.Among these,the success rate of RetinaNet transfer attacks reached a maximum of 82.59%. 展开更多
关键词 Object detection model security targeted attack gradient diversity
下载PDF
CAS Sets Food Security as Main Target for 2001
5
《Bulletin of the Chinese Academy of Sciences》 2001年第1期8-9,共2页
The Chinese Academy of Sci-ences (CAS)has designatedguaranteeing food safety forthe future population peak of 1.6 bil-lion as its first and foremost targettaking into account the stress thatwill place on China’s exis... The Chinese Academy of Sci-ences (CAS)has designatedguaranteeing food safety forthe future population peak of 1.6 bil-lion as its first and foremost targettaking into account the stress thatwill place on China’s existingresources, said a CAS official at theacademy’s annual work 展开更多
关键词 security target CAS Sets Food security as Main target for 2001
下载PDF
急性ST段抬高型心肌梗死患者救治与降压达标的相关性研究
6
作者 刘东霞 高鹏 +2 位作者 段亚伟 王燕庆 苏晗琪 《河北医药》 CAS 2023年第17期2616-2619,共4页
目的分析急性ST段抬高型心肌梗死(ST-elevation myocardial infarction,STEMI)救治时间节点与降压达标的相关性。方法选择CCU于2017年2月至2018年8月收治的行急诊经皮冠状动脉介入术(PCI)的STEMI患者374例,采用统一调查问卷收集资料,根... 目的分析急性ST段抬高型心肌梗死(ST-elevation myocardial infarction,STEMI)救治时间节点与降压达标的相关性。方法选择CCU于2017年2月至2018年8月收治的行急诊经皮冠状动脉介入术(PCI)的STEMI患者374例,采用统一调查问卷收集资料,根据合并高血压情况分为高血压组168例和非高血压组206例。依据高血压组血压控制达标情况,分为达标组(75例)和未达标组(93例),分析2组间的差异,Logistic回归分析降压达标与首次医疗接解(S-to-FMC)、D-to-B、总缺血时间(TIT)的相关性。结果STEMI患者中高血压患者的检出率44.9%;2、3级高血压患者占92.7%;高血压组与非高血压组比较,2组S-to-FMC、D-to-B、TIT差异无统计学意义(P>0.05);降压达标组S-to-FMC、TIT时间显著低于非达标组(P<0.05)。结论降压达标患者的获益不仅是在降压本身及重要脏器的保护作用,与心血管事件的及时救治有一定的相关性,降压达标的STEMI患者院前延迟时间、心肌总缺血时间缩短,有助于改善患者的预后。 展开更多
关键词 急性st段抬高型心肌梗死 高血压 降压达标 院前延迟
下载PDF
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel 被引量:5
7
作者 Yu Zheng Zheng Li +1 位作者 Xiaolong Xu Qingzhan Zhao 《Digital Communications and Networks》 SCIE CSCD 2022年第4期422-435,共14页
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe... Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security. 展开更多
关键词 Cyber security Dynamic defense Moving target defense Mimic defense
下载PDF
Long-term acupuncture treatment has a multitargeting regulation on multiple brain regions in rats with Alzheimer's disease:a positron emission tomography study 被引量:3
8
作者 Yang-jia Lu Xiao-wen Cai +9 位作者 Gui-feng Zhang Yong Huang Chun-zhi Tang Bao-ci Shan Shao-yang Cui Jun-qi Chen Shan-shan Qu Zheng Zhong Xin-sheng Lai Genevieve Zara Steiner 《Neural Regeneration Research》 SCIE CAS CSCD 2017年第7期1159-1165,共7页
The acute effect of acupuncture on Alzheimer's disease,i.e.,on brain activation during treatment,has been reported.However,the effect of long-term acupuncture on brain activation in Alzheimer's disease is unclear.Th... The acute effect of acupuncture on Alzheimer's disease,i.e.,on brain activation during treatment,has been reported.However,the effect of long-term acupuncture on brain activation in Alzheimer's disease is unclear.Therefore,in this study,we performed long-term needling at Zusanli(ST36)or a sham point(1.5 mm lateral to ST36)in a rat Alzheimer's disease model,for 30 minutes,once per day,for 30 days.The rats underwent 18F-fluorodeoxyglucose positron emission tomography scanning.Positron emission tomography images were processed with SPM2.The brain areas activated after needling at ST36 included the left hippocampus,the left orbital cortex,the left infralimbic cortex,the left olfactory cortex,the left cerebellum and the left pons.In the sham-point group,the activated regions were similar to those in the ST36 group.However,the ST36 group showed greater activation in the cerebellum and pons than the sham-point group.These findings suggest that long-term acupuncture treatment has targeted regulatory effects on multiple brain regions in rats with Alzheimer's disease. 展开更多
关键词 nerve regeneration NEURODEGENERATION ACUPUNCTURE Zusanli (st36) Alzheimer's disease long-term treatment positron emissiontomography rat mechanism targeting effect compensation multi-target regulation neural regeneration
下载PDF
Reliability Analysis of Heterogeneous Sensor-Cloud Systems against Targeted Attacks
9
作者 Hao Peng Zhen Qian +3 位作者 Guangquan Xu Kejie Mao Kangtian Li Dandan Zhao 《China Communications》 SCIE CSCD 2022年第8期181-197,共17页
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to t... Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability. 展开更多
关键词 sensor-cloud systems targeted attacks heterogeneous networks reliability analysis system security
下载PDF
Key Optimization Issues for Renewable Energy Systems under Carbon-Peaking and Carbon Neutrality Targets:Current States and Perspectives
10
作者 Bo Yang Zhengxun Guo +3 位作者 JingboWang Chao Duan Yaxing Ren Yixuan Chen 《Energy Engineering》 EI 2022年第5期1789-1795,共7页
1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhil... 1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhile,has announced through the“carbon-peaking and carbon neutrality targets”in September 2020 that it aims to achieve“peak carbon use”by 2030 and“carbon neutrality”by 2060[1].According to statistical data from the International Energy Agency(IEA),Fig.1 illustrates the carbon intensity of electricity generation in various regions in the Announced Pledge Scenario(APS)from 2010 to 2040[2].One can easily observe that each region aims to accomplish a sharp decrease in the carbon intensity of electricity generation after 2020. 展开更多
关键词 Carbon-peaking and carbon neutrality targets renewable energy optimization modeling power forecast planning and dispatching reliability and security analysis
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
11
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis statistical LEARNING Transduction
下载PDF
基于GRACE评分的针对性分级干预对行PCI的NSTE-ACS胸痛患者的影响 被引量:1
12
作者 白卫丽 张燕军 +2 位作者 钟洁 王妍 悦瑛 《齐鲁护理杂志》 2023年第11期28-31,共4页
目的:探讨基于全球急性冠状动脉事件注册(GRACE)评分的针对性分级干预对行PCI非ST段抬高型急性冠状动脉综合征(NSTE-ACS)胸痛患者的影响。方法:选取2021年4月1日~2022年8月31日行PCI的60例NSTE-ACS胸痛患者为研究对象,将2021年4月1日~12... 目的:探讨基于全球急性冠状动脉事件注册(GRACE)评分的针对性分级干预对行PCI非ST段抬高型急性冠状动脉综合征(NSTE-ACS)胸痛患者的影响。方法:选取2021年4月1日~2022年8月31日行PCI的60例NSTE-ACS胸痛患者为研究对象,将2021年4月1日~12月15日采用常规分级干预的30例患者为对照组,2021年12月15日~2022年8月31日采用基于GRACE评分的针对性分级干预的30例患者为观察组;比较两组救护时间、抢救效果、不良心血管事件发生情况。结果:观察组门球(D-to-B)时间、第一份心电图获取时间、肌钙蛋白T(cTnT)出结果所用时间、建立静脉通道时间、分诊评估用时均短于对照组(P<0.01);观察组抢救成功率高于对照组(P<0.05),住院时间短于对照组(P<0.01);观察组不良心血管事件发生率低于对照组(P<0.05)。结论:基于GRACE评分的针对性分级干预较常规分级干预护理效果更佳,可缩短分诊时间,使NSTE-ACS患者尽快行PCI介入治疗,一定程度提高抢救成功率,降低了不良心血管事件发生风险,有利于改善患者预后。 展开更多
关键词 全球急性冠状动脉事件注册评分 针对性分级干预 st段抬高型急性冠脉综合征 冠状动脉介入治疗
下载PDF
基于Gan-St-YOLOv5的复杂环境下的手势识别
13
作者 郝博 尹兴超 +1 位作者 闫俊伟 张力 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2023年第7期953-963,共11页
在智能工业生产中的复杂环境下进行手势识别人机交互,手势特征受到局部遮挡、强光照、远距离小目标的影响,导致目标检测识别过程中识别出的手势特征减少,甚至分类错误.在复杂环境下提高手势识别精准度成为人机交互任务中亟需解决的问题... 在智能工业生产中的复杂环境下进行手势识别人机交互,手势特征受到局部遮挡、强光照、远距离小目标的影响,导致目标检测识别过程中识别出的手势特征减少,甚至分类错误.在复杂环境下提高手势识别精准度成为人机交互任务中亟需解决的问题.本文提出一种具有创新性的Gan-St-YOLOv5模型,在YOLOv5的基础上生成对抗网络(generative adversarial network,GAN)和Swin Transformer模块,融入SENet通道注意力机制,使用Confluence检测框选取算法,增强模型检测的准确度.为了验证模型的优越性,与YOLOv5模型进行对比,得出Gan-St-YOLOv5在完全可见测试集上mAP_0.5高达96.1%,在强光照测试集上mAP_0.5高达92.3%,在部分遮挡测试集上mAP_0.5高达86.6%,在远距离小目标测试集上准确度高达96.4%,均优于YOLOv5目标检测算法,以较小的效率损失取得了较高精度. 展开更多
关键词 Gan-st-YOLOv5 手势识别 局部遮挡 强光照 远距离小目标
下载PDF
计及风电不确定性的多场景多时段安全约束机组组合解耦求解方法 被引量:1
14
作者 吴雄 何雯雯 +2 位作者 李晓飞 麻淞 刘炳文 《电力自动化设备》 EI CSCD 北大核心 2024年第3期91-97,共7页
为了加速求解计及风电不确定性的安全约束机组组合问题,提出计及风电不确定性的多场景多时段安全约束机组组合解耦求解方法。将原问题解耦为多个场景的安全约束机组组合问题;通过将各场景的调度时段分为多个子时段对各场景安全约束机组... 为了加速求解计及风电不确定性的安全约束机组组合问题,提出计及风电不确定性的多场景多时段安全约束机组组合解耦求解方法。将原问题解耦为多个场景的安全约束机组组合问题;通过将各场景的调度时段分为多个子时段对各场景安全约束机组组合问题进行解耦,形成多个并行的子问题;为了确保多场景解耦和多时段解耦解的可行性,利用一致性约束耦合不同的子问题,并在目标函数中添加惩罚项。通过算例分析验证了所提方法的有效性。结果表明,在可接受的精度下,所提方法比传统集中式方法显著缩短了多场景安全约束机组组合问题的求解时间。 展开更多
关键词 风电 安全约束机组组合 多场景解耦 多时段解耦 目标级联分析
下载PDF
基于人工智能的信息安全防御技术研究
15
作者 张鹏 《移动信息》 2024年第8期171-173,共3页
随着信息技术的快速发展,企业面临的网络安全威胁日益增多,传统的信息安全防御方法已难以满足当前的安全需求。基于人工智能(AI)的信息安全防御技术因其自动化、智能化的特点,成为解决信息安全问题的有效手段。文中设计了一种企业信息... 随着信息技术的快速发展,企业面临的网络安全威胁日益增多,传统的信息安全防御方法已难以满足当前的安全需求。基于人工智能(AI)的信息安全防御技术因其自动化、智能化的特点,成为解决信息安全问题的有效手段。文中设计了一种企业信息安全的人工智能防御方法,包括网络信息防御环境的预处理、多目标信息识别防御机制、企业信息防御模型设计以及组合式加密处理技术。然后,通过对该技术进行测试分析,验证了其在信息安全防御中的有效性。 展开更多
关键词 人工智能 信息安全 网络防御 多目标识别 组合式加密
下载PDF
安检图像小目标违禁品特征提取模块构建与应用
16
作者 刘天时 周泽华 郝敏杰 《现代信息科技》 2024年第4期136-141,共6页
针对物流包裹安检图像中小目标违禁品易漏检问题,通过在感受野模块的多分支并行网络上引入卷积注意力模块,构建一种适用于小目标违禁品检测的特征提取模块。在此基础上,将构建的特征提取模块融入YOLOv5模型的主干部分,使得模型在违禁品... 针对物流包裹安检图像中小目标违禁品易漏检问题,通过在感受野模块的多分支并行网络上引入卷积注意力模块,构建一种适用于小目标违禁品检测的特征提取模块。在此基础上,将构建的特征提取模块融入YOLOv5模型的主干部分,使得模型在违禁品检测的过程中聚焦于图像的重要特征。为了充分发挥所构建模块对于小目标物体的特征提取能力,采用空间深度转换模块替代原模型中的下采样模块,使得YOLOv5模型在特征提取的过程中能够尽可能地保留小目标物体的特征信息,提高对小目标违禁品的检测效果。 展开更多
关键词 安检图像 小目标违禁品 特征提取模块 计算机视觉 物流包裹
下载PDF
基于神经网络架构搜索的X射线图像违禁品检测算法 被引量:2
17
作者 成浪 敬超 陈文鹏 《科学技术与工程》 北大核心 2024年第2期665-675,共11页
为了提高卷积神经网络设计的自动化程度并进一步提高复杂背景下违禁品检测的准确率和速度,提出了一种基于神经网络架构搜索的X射线图像违禁品检测算法。首先,设计逐层渐进式搜索策略和多分支搜索空间,并基于批量归一化指标为每一个laye... 为了提高卷积神经网络设计的自动化程度并进一步提高复杂背景下违禁品检测的准确率和速度,提出了一种基于神经网络架构搜索的X射线图像违禁品检测算法。首先,设计逐层渐进式搜索策略和多分支搜索空间,并基于批量归一化指标为每一个layer结构搜索最佳侧分支;然后,逐层搜索构建新的骨干网络组件;最后,组成由数据驱动的新目标检测模型。该算法在数据集HiXray、OPIXray、PIDray上分别取得了83.4%、87.2%、70.4%的检测精度。实验结果表明,本文算法能够自适应数据集并自动搜索出性能更好的Backbone组件,与FCOS、YOLOv4等主流算法相比,有效提高了复杂背景下违禁品检测的准确率和速度。 展开更多
关键词 神经网络架构搜索 搜索策略 目标检测 违禁品检测 X射线图像
下载PDF
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography 被引量:3
18
作者 Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期157-170,共14页
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE ... The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud.The IoE-based cloud computing services are located at remote locations without the control of the data owner.The data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security capabilities.The lack of knowledge about security capabilities and control over data raises several security issues.Deoxyribonucleic Acid(DNA)computing is a biological concept that can improve the security of IoE big data.The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher algorithms.This paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access issues.The experimental results illustrated that DNACDS performs better than other DNA-based security schemes.The theoretical security analysis of the DNACDS shows better resistance capabilities. 展开更多
关键词 IoE based cloud computing DNA cryptography IoE big data security stS KAP feistel cipher IoE big data access
原文传递
安检CT图像目标物识别方法研究进展
19
作者 孙运达 魏云超 张丽 《CT理论与应用研究(中英文)》 2024年第2期263-271,共9页
基于先进的安检CT扫描设备,研究三维CT图像中的目标物识别方法,对于提升安检质量的可靠性和稳定性具有十分重要的意义。本文系统评述安检CT图像目标物识别的最新研究进展和发展趋势,不仅对近年来本领域的代表性学术研究成果进行总结回顾... 基于先进的安检CT扫描设备,研究三维CT图像中的目标物识别方法,对于提升安检质量的可靠性和稳定性具有十分重要的意义。本文系统评述安检CT图像目标物识别的最新研究进展和发展趋势,不仅对近年来本领域的代表性学术研究成果进行总结回顾,还首次将工业界的相关专利也纳入分析范围;在文献归类环节,除沿用常见的技术路线和任务类型两种归类法,还根据计算空间维度的差异提出一种新的归类法,并对检索到的代表性文献进行多标签归类;通过总结分析本领域研究成果,发现3个重要特点,分析其主要成因,最后对本领域的研究方向提出几点建议。 展开更多
关键词 安检CT 目标物识别 智能识别
下载PDF
基于StOMP稀疏方法的高光谱图像目标检测 被引量:7
20
作者 赵春晖 靖晓昊 李威 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2015年第7期992-996,共5页
稀疏表示方法已经被成功应用于高光谱图像目标检测领域,并且取得了较好的检测效果,但由于高光谱图像往往具有很大的数据量,传统的稀疏检测算法计算成本很高。针对这种情况,提出了应用St OMP算法的高光谱图像稀疏目标检测算法,对求解稀... 稀疏表示方法已经被成功应用于高光谱图像目标检测领域,并且取得了较好的检测效果,但由于高光谱图像往往具有很大的数据量,传统的稀疏检测算法计算成本很高。针对这种情况,提出了应用St OMP算法的高光谱图像稀疏目标检测算法,对求解稀疏系数的步骤进行了改进,减少了此过程中的迭代次数,大幅度降低了运算量,提高了检测速度。使用了2组数据进行仿真实验,结果表明,St OMP算法的应用有效地提高了检测速度与检测精度。 展开更多
关键词 高光谱图像 目标检测 稀疏表示 st OMP算法 快速运算
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部