期刊文献+
共找到2,854篇文章
< 1 2 143 >
每页显示 20 50 100
Utility of Droplet Digital PCR Assay for Quantitative Detection of Norovirus in Shellfish, from Production to Consumption in Guangxi, China 被引量:4
1
作者 TAN Dong Mei LYU Su Ling +7 位作者 LIU Wei ZENG Xian Ying LAN Lan QU Cong ZHUGE Shi Yang ZHONG Yan Xu XIE Yi Hong LI Xiu Gui 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2018年第10期713-720,共8页
Objective Shellfish are recognized as important vehicles of norovirus-associated gastroenteritis. The present study aimed to monitor norovirus contamination in oysters along the farm-to-fork continuum in Guangxi, a ma... Objective Shellfish are recognized as important vehicles of norovirus-associated gastroenteritis. The present study aimed to monitor norovirus contamination in oysters along the farm-to-fork continuum in Guangxi, a major oyster production area in Southwestern China. Methods Oyster samples were collected monthly from farms, markets, and restaurants, from January to December 2016. Norovirus was detected and quantified by one-step reverse transcription-droplet digital polymerase chain reaction(RT-ddPCR). Results A total of 480 oyster samples were collected and tested for norovirus genogroups I and II. Norovirus was detected in 20.7% of samples, with genogroup II predominating. No significant difference was observed in norovirus prevalence among different sampling sites. The norovirus levels varied widely, with a geometric mean of 19,300 copies/g in digestive glands. Both norovirus prevalence and viral loads showed obvious seasonality, with a strong winter bias. Conclusion This study provides a systematic analysis of norovirus contamination ‘from the farm to the fork' in Guangxi. RT-ddPCR can be a useful tool for detection and quantification of low amounts of norovirus in the presence of inhibitors found particularly in foodstuffs. This approach will contribute to the development of strategies for controlling and reducing the risk of human illness resulting from shellfish consumption. 展开更多
关键词 NOROVIRUS DROPLET digital PCR SHELLFISH Quantitative detection
下载PDF
Digital coherent detection research on Brillouin optical time domain reflectometry with simplex pulse codes 被引量:6
2
作者 郝蕴琦 叶青 +2 位作者 潘政清 蔡海文 瞿荣辉 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期253-256,共4页
The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensi... The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement. 展开更多
关键词 Brillouin optical time domain reflectometry digital coherent detection simplex pulse codes signal-to-noise ratio
下载PDF
Application of droplet digital PCR in detection of seed-transmitted pathogen Acidovorax citrulli 被引量:2
3
作者 LU Yu ZHANG Hai-jun +6 位作者 ZHAO Zi-jing WEN Chang-long WU Ping SONG Shun-hua YU Shuan-cang Luo Lai-xin XU Xiu-lan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2020年第2期561-569,共9页
Bacterial fruit blotch caused by Acidovorax citrulli is a serious threat to cucurbit industry worldwide.The pathogen is seedtransmitted,so seed detection to prevent distribution of contaminated seed is crucial in dise... Bacterial fruit blotch caused by Acidovorax citrulli is a serious threat to cucurbit industry worldwide.The pathogen is seedtransmitted,so seed detection to prevent distribution of contaminated seed is crucial in disease management.In this study,we adapted a quantitative real-time PCR(qPCR)assay to droplet digital PCR(ddPCR)format for A.citrulli detection by optimizing reaction conditions.The performance of ddPCR in detecting A.citrulli pure culture,DNA,infested watermelon/melon seed and commercial seed samples were compared with multiplex PCR,qPCR,and dilution plating method.The lowest concentrations detected(LCD)by ddPCR reached up to 2 fg DNA,and 102 CFU mL–1 bacterial cells,which were ten times more sensitive than those of the qPCR.When testing artificially infested watermelon and melon seed,0.1%infestation level was detectable using ddPCR and dilution plating method.The 26 positive samples were identified in 201 commercial seed samples through ddPCR,which was the highest positive number among all the methods.High detection sensitivity achieved by ddPCR demonstrated a promising technique for improving seed-transmitted pathogen detection threshold in the future. 展开更多
关键词 bacterial fruit blotch Acidovorax citrulli droplet digital PCR seed detection quantitative real-time PCR
下载PDF
Using UAVs for detection of trees from digital surface models
4
作者 Nusret Demir 《Journal of Forestry Research》 SCIE CAS CSCD 2018年第3期804-812,共9页
A difficult problem in forestry is tree inventory.In this study, a GoProHero attached to a small unmanned aerial vehicle was used to capture images of a small area covered by pinus pinea trees. Then, a digital surface... A difficult problem in forestry is tree inventory.In this study, a GoProHero attached to a small unmanned aerial vehicle was used to capture images of a small area covered by pinus pinea trees. Then, a digital surface model was generated with image matching. The elevation model representing the terrain surface, a ‘digital terrain model’,was extracted from the digital surface model using morphological filtering. Individual trees were extracted by analyzing elevation flow on the digital elevation model because the elevation reached the highest value on the tree peaks compared to the neighborhood elevation pixels. The quality of the results was assessed by comparison with reference data for correctness of the estimated number of trees. The tree heights were calculated and evaluated with ground truth dataset. The results showed 80% correctness and 90% completeness. 展开更多
关键词 Tree detection digital surface model Fish-eye camera PHOTOGRAMMETRY UAV
下载PDF
Digital Signal Processing Based Real Time Vehicular Detection System 被引量:3
5
作者 杨兆选 林涛 +2 位作者 李香萍 刘春义 高健 《Transactions of Tianjin University》 EI CAS 2005年第2期119-124,共6页
Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is ... Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation. 展开更多
关键词 数字信号处理技术 智能交通系统 汽车 服务器 网络 计算机技术
下载PDF
A Novel Method for Detection and Removal of Line Scratch in High Resolution Digital Film
6
作者 周磊 倪强 周源华 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第1期22-26,共5页
With increasing need of high quality movie, more and more standard resolution films are upconverted to the high-resolution films. After this operation, the defects exist in the old movie are more obvious because they ... With increasing need of high quality movie, more and more standard resolution films are upconverted to the high-resolution films. After this operation, the defects exist in the old movie are more obvious because they are enlarged in size, therefore, an efficient artifacts detection method with more precise result and lower computational complexity is in need. This paper provided a line scratch mathematical model, which derives from the Kokaram model and Bruni model, and then gave a detection method to meet the requirements of the high-resolution video application. 展开更多
关键词 digital film restoration line scratch scratch detection scratch removal
下载PDF
Digital Cross-Correlation Detection of Multi-Laser Beams Measuring System for Wind Field Detection
7
作者 Li-Min Zhou Ya-Dong Jiang +1 位作者 Zheng-Yu Zhang Xiao-Lin Sui 《Journal of Electronic Science and Technology》 CAS 2010年第4期366-371,共6页
A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finit... A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finite impulse response (FIR) digital filter. The processing of backscatter signals using single-pulse and three-pulse cross-correlation detection methods is depicted in detail. From calculation results, the multi-pulse cross-correlation detection could effectively improve signal-to-noise ratio (SNR). Finally, both wind velocity and direction are determined by the peak-delay method based on the correlation function which shows high measuring precision and high SNR of the MLBM system with the assistance of the digital cross- correlation detection. 展开更多
关键词 Cross-correlation detection digital filter multi-laser beams measuring system signal processing signal to noise ratio.
下载PDF
Use of the Wavelet Transform for Digital Terrain Model Edge Detection (Special Issue—Wavelet Analysis)
8
作者 Clovis Gaboardi 《Journal of Applied Mathematics and Physics》 2018年第10期1997-2005,共9页
The purpose of this work is to analyze the feasibility of using the wavelet transform in the edge detection of digital terrain models (DTM) obtained by Laser Scanner. The Haar wavelet transform and the edge detection ... The purpose of this work is to analyze the feasibility of using the wavelet transform in the edge detection of digital terrain models (DTM) obtained by Laser Scanner. The Haar wavelet transform and the edge detection method called Wavelet Transform Modulus Maxima (WTMM), both implemented in Matlab language, were used. In order to validate and verify the efficiency of WTMM, the edge detection of the same DTM was performed by the Roberts, Sobel-Feldman and Canny methods, chosen due to the wide use in the scientific community in the area of Image Processing and Remote Sensing. The comparison of the results showed superior performance of WTMM in terms of processing time. 展开更多
关键词 digital TERRAIN Model Edge detection WAVELETS TRANSFORM CANNY Roberts SOBEL Sobel-Feldman
下载PDF
Sequential Detection of Digital Watermarking
9
作者 李莉 俞玉莲 王沛 《Journal of Donghua University(English Edition)》 EI CAS 2005年第5期129-134,共6页
The paper analyzed a new watermarking detection paradigm including double detection thresholds based on sequential hypothesis testing. A joint design of watermarking encoding and detection was proposed. The paradigm h... The paper analyzed a new watermarking detection paradigm including double detection thresholds based on sequential hypothesis testing. A joint design of watermarking encoding and detection was proposed. The paradigm had good immunity to noisy signal attacks and high detection probability. Many experiments proved that the above algorithm can detect watermarks about 66% faster than popular detectors, which could have significant impact on many applications such as video watermarking detection and watermark-searching in a large database of digital contents. 展开更多
关键词 数字水印 水印检测 按序检测 水印长度
下载PDF
Research on Influence of Electromagnetic Interference on X-Ray Digital Detection
10
作者 Guo Taotao Wang Dada +1 位作者 Guo Tieqiao Yu Hong 《Electricity》 2012年第5期38-43,共6页
X-ray digital imaging technology has found wide application owing to its advantages of real-time, visualization and rapid imaging. In substations the substantial electromagnetic interference has some influence on the ... X-ray digital imaging technology has found wide application owing to its advantages of real-time, visualization and rapid imaging. In substations the substantial electromagnetic interference has some influence on the live detection by the X-ray digital imaging technology, hindering the promotion of the technology in the detection of electric equipment. Based on a large number of field tests, the author carried out a series of researches on electromagnetic interference protection measures, image de-noising, and image enhancement algorithms. 展开更多
关键词 电磁干扰 数字检测 X射线 数字成像技术 图像增强算法 快速成像 现场检测 电气设备
下载PDF
Dual Attribute Adversarial Camouflage toward camouflaged object detection 被引量:2
11
作者 Yang Wang Zheng Fang +3 位作者 Yun-fei Zheng Zhen Yang Wen Tong Tie-yong Cao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第4期166-175,共10页
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w... The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world. 展开更多
关键词 Adversarial camouflage digital camouflage generation Visual concealment Object detection Adversarial patch
下载PDF
A Review of Machine Learning Techniques in Cyberbullying Detection
12
作者 Daniyar Sultan Batyrkhan Omarov +5 位作者 Zhazira Kozhamkulova Gulnur Kazbekova Laura Alimzhanova Aigul Dautbayeva Yernar Zholdassov Rustam Abdrakhmanov 《Computers, Materials & Continua》 SCIE EI 2023年第3期5625-5640,共16页
Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social me... Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social media has become an integral part of adolescents’lives and how serious the impacts of cyberbullying and online harassment can be,particularly among teenagers.This paper contains a systematic literature review of modern strategies,machine learning methods,and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet.We undertake an in-depth review of 13 papers from four scientific databases.The article provides an overview of scientific literature to analyze the problem of cyberbullying detection from the point of view of machine learning and natural language processing.In this review,we consider a cyberbullying detection framework on social media platforms,which includes data collection,data processing,feature selection,feature extraction,and the application ofmachine learning to classify whether texts contain cyberbullying or not.This article seeks to guide future research on this topic toward a more consistent perspective with the phenomenon’s description and depiction,allowing future solutions to be more practical and effective. 展开更多
关键词 CYBERBULLYING hate speech digital drama online harassment detection classification machine learning NLP
下载PDF
Using Digital Twin to Diagnose Faults in Braiding Machinery Based on IoT
13
作者 Youping Lin Huangbin Lin Dezhi Wei 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1363-1379,共17页
The digital twin(DT)includes real-time data analytics based on the actual product or manufacturing processing parameters.Data from digital twins can predict asset maintenance requirements ahead of time.This saves mone... The digital twin(DT)includes real-time data analytics based on the actual product or manufacturing processing parameters.Data from digital twins can predict asset maintenance requirements ahead of time.This saves money by decreasing operating expenses and asset downtime,which improves company efficiency.In this paper,a digital twin in braiding machinery based on IoT(DTBM-IoT)used to diagnose faults.When an imbalance fault occurs,the system gathers experimental data.After that,the information is sent into a digital win model of the rotor system to see whether it can quantify and locate imbalance for defect detection.It is possible to anticipate asset maintenance requirements with DT technology by IoT(Internet of Things)sensors,XR(X-Ray)capabilities,and AI-powered analytics.A DT model’s appropriate design and flexibility remain difficult because of the nonlinear dynamics and unpre-dictability inherent in the degrading process of equipment.The results indicate that the DT in braiding machinery developed allows for precise diagnostic and dynamic deterioration analysis.At least there is 37%growth in efficiency over conventional approaches. 展开更多
关键词 Braiding machinery IOT digital twin defect detection rotor system
下载PDF
A Thorough Investigation on Image Forgery Detection
14
作者 Anjani Kumar Rai Subodh Srivastava 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1489-1528,共40页
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for... Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field. 展开更多
关键词 Forgery detection digital forgery image forgery localization image segmentation image forensics multimedia security
下载PDF
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
15
作者 Amal H.Alharbi S.Karthick +2 位作者 K.Venkatachalam Mohamed Abouhawwash Doaa Sami Khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2773-2787,共15页
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop... Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms. 展开更多
关键词 Image processing edge detection edge net auto-encoder face authentication digital security
下载PDF
Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
16
作者 Lelisa Adeba Jilcha Deuk-Hun Kim +1 位作者 Julian Jang-Jaccard Jin Kwak 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3261-3284,共24页
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or data.The growing use of Internet of Things(IoT)technology in the co... Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or data.The growing use of Internet of Things(IoT)technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation,as it facilitates multiple new attack vectors to emerge effortlessly.As such,existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems.To address this problem,we designed a blended threat detection approach,considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.We collectively refer to the convergence of different technology sectors as the internet of blended environment.The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder.An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02%detection accuracy.Furthermore,performance of the proposed approach was compared with various single model(autoencoder)-based network intrusion detection approaches:autoencoder,variational autoencoder,convolutional variational autoencoder,and long short-term memory variational autoencoder.The proposed model outperformed all compared models,demonstrating F1-score improvements of 4.99%,2.25%,1.92%,and 3.69%,respectively. 展开更多
关键词 Network intrusion detection anomaly detection TON_IoT dataset smart grid smart city smart factory digital healthcare autoencoder variational autoencoder LSTM convolutional variational autoencoder ensemble learning
下载PDF
An Efficient Method for Underwater Video Summarization and Object Detection Using YoLoV3
17
作者 Mubashir Javaid Muazzam Maqsood +2 位作者 Farhan Aadil Jibran Safdar Yongsung Kim 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1295-1310,共16页
Currently,worldwide industries and communities are concerned with building,expanding,and exploring the assets and resources found in the oceans and seas.More precisely,to analyze a stock,archaeology,and surveillance,s... Currently,worldwide industries and communities are concerned with building,expanding,and exploring the assets and resources found in the oceans and seas.More precisely,to analyze a stock,archaeology,and surveillance,sev-eral cameras are installed underseas to collect videos.However,on the other hand,these large size videos require a lot of time and memory for their processing to extract relevant information.Hence,to automate this manual procedure of video assessment,an accurate and efficient automated system is a greater necessity.From this perspective,we intend to present a complete framework solution for the task of video summarization and object detection in underwater videos.We employed a perceived motion energy(PME)method tofirst extract the keyframes followed by an object detection model approach namely YoloV3 to perform object detection in underwater videos.The issues of blurriness and low contrast in underwater images are also taken into account in the presented approach by applying the image enhancement method.Furthermore,the suggested framework of underwater video summarization and object detection has been evaluated on a publicly available brackish dataset.It is observed that the proposed framework shows good performance and hence ultimately assists several marine researchers or scientists related to thefield of underwater archaeology,stock assessment,and surveillance. 展开更多
关键词 Computer vision deep learning digital image processing underwater video analysis video summarization object detection YOLOV3
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
18
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 Elliptic curve cryptography(ECC) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
A spatiotemporal intelligent framework and experimental platform for urban digital twins
19
作者 Jinxing HU Zhihan LV +5 位作者 Diping YUAN Bing HE Wenjiang CHEN Xiongfei YE Donghao LI Ge YANG 《Virtual Reality & Intelligent Hardware》 2023年第3期213-231,共19页
Backgrounds This work emphasizes the current research status of the urban Digital Twins to establish an intelligent spatiotemporal framework.A Geospatial Artificial Intelligent(GeoAI)system is developed based on the G... Backgrounds This work emphasizes the current research status of the urban Digital Twins to establish an intelligent spatiotemporal framework.A Geospatial Artificial Intelligent(GeoAI)system is developed based on the Geographic Information System and Artificial Intelligence.It integrates multi-video technology and Virtual City in urban Digital Twins.Methods Besides,an improved small object detection model is proposed:YOLOv5-Pyramid,and Siamese network video tracking models,namely MPSiam and FSSiamese,are established.Finally,an experimental platform is built to verify the georeferencing correction scheme of video images.Result The MultiplyAccumulate value of MPSiam is 0.5B,and that of ResNet50-Siam is 4.5B.Besides,the model is compressed by 4.8times.The inference speed has increased by 3.3 times,reaching 83 Frames Per Second.3%of the Average Expectation Overlap is lost.Therefore,the urban Digital Twins-oriented GeoAI framework established here has excellent performance for video georeferencing and target detection problems. 展开更多
关键词 Spatiotemporal intelligence Urban digital twins Geographic information system Artificial intelligence Small target detection
下载PDF
Detecting circulating tumor material and digital pathology imaging during pancreatic cancer progression 被引量:2
20
作者 Radim Moravec Rao Divi Mukesh Verma 《World Journal of Gastrointestinal Oncology》 SCIE CAS 2017年第6期235-250,共16页
Pancreatic cancer(PC) is a leading cause of cancerrelated death worldwide. Clinical symptoms typically present late when treatment options are limited and survival expectancy is very short. Metastatic mutations are he... Pancreatic cancer(PC) is a leading cause of cancerrelated death worldwide. Clinical symptoms typically present late when treatment options are limited and survival expectancy is very short. Metastatic mutations are heterogeneous and can accumulate up to twenty years before PC diagnosis. Given such genetic diversity, detecting and managing the complex states of disease progression may be limited to imaging modalities and markers present in circulation. Recent developments in digital pathology imaging show potential for early PC detection, making a differential diagnosis, and predicting treatment sensitivity leading to long-term survival in advanced stage patients. Despite large research efforts, the only serum marker currently approved for clinical use is CA 19-9. Utility of CA 19-9 has been shown to improve when it is used in combination with PC-specific markers. Efforts are being made to develop early-screening assays that can detect tumor-derived material, present in circulation, before metastasis takes a significant course. Detection of markers that identify circulating tumor cells and tumor-derived extracellular vesicles(EVs) in biofluid samples offers a promising non-invasive method for this purpose. Circulating tumor cells exhibit varying expression of epithelial and mesenchymal markers depending on the state of tumor differentiation. This offers a possibility for monitoring disease progression using minimally invasive procedures. EVs also offer the benefit of detecting molecular cargo of tumor origin and add the potential to detect circulating vesicle markers from tumors that lack invasive properties. This review integrates recent genetic insights of PC progression with developments in digitalpathology and early detection of tumor-derived circulating material. 展开更多
关键词 传播肿瘤房间 数字病理 早察觉 EXOSOMES 胰腺的癌症
下载PDF
上一页 1 2 143 下一页 到第
使用帮助 返回顶部