期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
1
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(s-box)
下载PDF
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes 被引量:1
2
作者 Xuan-Ping Zhang Rui Guo +2 位作者 Heng-Wei Chen Zhong-Meng Zhao Jia-Yin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期170-178,共9页
Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusi... Single or multiple S-boxes are widely used in image encryption schemes, and in many image encryption schemes the asynchronous encryption structure is utilized, which separates the processes of substitution and diffusion. In this paper, we analyze the defects of this structure based on the example of an article and crack it using a simpler method. To address the defects of the asynchronous encryption structure, a novel encryption scheme is proposed, in which the structure of synchronous substitution and diffusion based on double S-boxes is utilized, so the processes of substitution and diffusion are combined together and the attackers cannot crack the cryptosystem by any of the processes. The simulation results and security analysis show that the proposed encryption scheme is safer and more efficient to expediently use in the real-time system. 展开更多
关键词 image encryption s-box CRACK synchronous substitution and diffusion
下载PDF
Study on Synthesis and Chiral Inversion of Substituted Oxazolines
3
《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 1999年第S1期144-144,共1页
关键词 Study on Synthesis and Chiral inversion of substituted Oxazolines
下载PDF
矩阵多项式的逆矩阵求解方法
4
作者 蔡学鹏 《科技风》 2024年第14期25-27,共3页
矩阵多项式理论知识在很多线性代数或者高等代数教材中都有所涉及,其逆矩阵求解计算性较强,方法较多。本文主要概述了不同矩阵多项式的逆矩阵的各类求解方法,即:多项式除法、待定系数法、替代法、综合除法.教师在课堂教学中适当地融入... 矩阵多项式理论知识在很多线性代数或者高等代数教材中都有所涉及,其逆矩阵求解计算性较强,方法较多。本文主要概述了不同矩阵多项式的逆矩阵的各类求解方法,即:多项式除法、待定系数法、替代法、综合除法.教师在课堂教学中适当地融入本文内容作为素材,可以深化教学内容,增强知识点之间的关联性,也能培养学生探索知识点间相互渗透的主动意识,对培养学生创新意识、创新能力,提高学生学习线性代数和高等代数课程的主动性有着重要的作用. 展开更多
关键词 逆矩阵 多项式除法 待定系数法 替代法 综合除法
下载PDF
Numerical estimation of choice of the regularization parameter for NMR T2 inversion 被引量:2
5
作者 You-Long Zou Ran-Hong Xie Alon Arad 《Petroleum Science》 SCIE CAS CSCD 2016年第2期237-246,共10页
Nuclear Magnetic inversion is the basis of NMR Resonance (NMR) T2 logging interpretation. The regularization parameter selection of the penalty term directly influences the NMR T2 inversion result. We implemented b... Nuclear Magnetic inversion is the basis of NMR Resonance (NMR) T2 logging interpretation. The regularization parameter selection of the penalty term directly influences the NMR T2 inversion result. We implemented both norm smoothing and curvature smoothing methods for NMR T2 inversion, and compared the inversion results with respect to the optimal regular- ization parameters ((Xopt) which were selected by the dis- crepancy principle (DP), generalized cross-validation (GCV), S-curve, L-curve, and the slope of L-curve methods, respectively. The numerical results indicate that the DP method can lead to an oscillating or oversmoothed solution which is caused by an inaccurately estimated noise level. The (Xopt selected by the L-curve method is occa- sionally small or large which causes an undersmoothed or oversmoothed T2 distribution. The inversion results from GCV, S-curve and the slope of L-curve methods show satisfying inversion results. The slope of the L-curve method with less computation is more suitable for NMR T2 inversion. The inverted T2 distribution from norm smoothing is better than that from curvature smoothing when the noise level is high. 展开更多
关键词 NMR T2 inversion Tikhonov regularizationVariable substitution Levenberg-Marquardt method Regularization parameter selection
下载PDF
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
6
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(s-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
下载PDF
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
7
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 CRYPTOGRAPHY Boolean functions substitution boxes s-boxes) strict avalanche criterion (SAC) CONCATENATION CONSTRUCTION
下载PDF
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes
8
作者 Sankhanil Dey Ranjan Ghosh 《Advances in Pure Mathematics》 2018年第3期272-306,共35页
4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations h... 4-bit linear relations play an important role in cryptanalysis of 4-bit crypto S-boxes. 4-bit finite differences have also been a major part of cryptanalysis of 4-bit S-boxes. Existence of all 4-bit linear relations have been counted for all of 16 input and 16 output 4-bit bit patterns of 4-bit Crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxes. Count of existing finite differences from each element of output S-boxes to distant output S-boxes have been noted in Differential Cryptanalysis of S-boxes. In this paper a brief review of these two cryptanalytic methods for 4-bit S-boxes has been introduced in a very lucid and conceptual manner. Two new analysis techniques, one to search for the existing linear approximations among the input vectors (IPVs) and output Boolean functions (BFs) of a particular S-box has also been introduced in this paper. The search is limited to find the existing linear relations or approximations in the contrary to count the number of existent linear relations among all 16, 4-bit input and output bit patterns within all possible linear approximations. Another is to find number of balanced BFs in difference output S-boxes. Better the number of Balanced BFs, Better the security. 展开更多
关键词 Linear CRYPTANALYSIS Differential CRYPTANALYSIS substitution BOXES s-boxes Cryptography CRYPTANALYSIS
下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
9
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box s-box correlation power analysis
下载PDF
无需测速的微震源反演数学模型研究 被引量:1
10
作者 庞聪 李查玮 +2 位作者 马武刚 江勇 廖成旺 《内陆地震》 2023年第1期52-59,共8页
微震源反演数学模型、反演算法等对象是微震源定位误差的重要来源。针对P波速度易衰减、首波到时数据拾取误差较大的情况,基于到时差模型(ATD)和P波到时方程组,建立到时差比值法反演数学模型(ATDRM),从目标函数中消除了P波速度和发震时... 微震源反演数学模型、反演算法等对象是微震源定位误差的重要来源。针对P波速度易衰减、首波到时数据拾取误差较大的情况,基于到时差模型(ATD)和P波到时方程组,建立到时差比值法反演数学模型(ATDRM),从目标函数中消除了P波速度和发震时刻等参数;同时,引入范数概念,得到改进的L1、L2、L3、L4范数模型,设计一系列反演模型对比实验和反演算法对比实验综合分析研究这些模型的优越性。工程数据显示:ATDRM模型的定位效果整体比经典ATD模型更好,ATDRM-L1模型震源误差可减少13.437 0 m;反演模型的定位误差受反演算法影响较大,单形替换法相比遗传算法(GA)、非线性最小二乘法(NLSM)、模拟退火算法(SA)等方法定位精度更高,稳定性更好;在应用单形替换法求解模型时,反演误差会随着范数参数N的增加(L1→L4)呈现先下降再上升的现象;ATDRM模型及其范式形式对提高微震源定位精度有一定价值。 展开更多
关键词 反演模型 微震源定位 范数 单形替换法 随机三角 P波速度
下载PDF
Fluorine Substitution Tunes the Nanofiber Chirality of Supramolecular Hydrogels to Promote Cell Adhesion and Proliferation 被引量:1
11
作者 Huijie Lu Yu Zhao +5 位作者 Shuchun Qin Yanyan Zhang Jinying Liu Jian Zhang Chuanliang Feng Weili Zhao 《Advanced Fiber Materials》 SCIE EI 2023年第1期377-387,共11页
Fluorine atoms confer desirable biophysical,chemical,and biological properties to peptides/proteins by participating in various intermolecular interactions with their environment,but they are rarely used to control su... Fluorine atoms confer desirable biophysical,chemical,and biological properties to peptides/proteins by participating in various intermolecular interactions with their environment,but they are rarely used to control supramolecular chirality and functional.Herein,to identify the effects of fluorine substitution on the chirality and function of supramolecular assem-blies,C2-symmetric benzene-paradicarboxamide-based phenylalanine(phe)derivatives and three monofluorinated variants that had a single fluorine atom on their benzyl side chain in either the ortho,meta,or para position were synthesized.The experimental and theoretical results clearly show that the resulting assembled fibrils were supported by multiple interactions,including hydrogen bonding,π–πstacking and C/O–H…F–CAr interactions.Compared to nonfluorinated analogs,fluorine and its ring position on the aromatic side chain dictated the type and strength of the F···H interaction and then induced changes in supramolecular chirality and fiber morphology.Further studies on cell behavior showed that the order of positive interac-tion between high-order supramolecular chirality(M,P)and molecular chirality(L,D)on cell proliferation and viability is LM>DM>LP>DP.These findings provide a protocol for leveraging fluorine atoms and their positional dependence on directing chiral nanostructures with desirable handedness and creating fluorinated supramolecular hydrogels as extracellular matrix-mimetic scaffolds for cell culture and regenerative medicine. 展开更多
关键词 Supramolecular chirality Helical inversion Fluorine substitution Positional effect Cell adhesion
原文传递
基于约束条件横波速度反演和流体替代 被引量:17
12
作者 李维新 王红 +2 位作者 姚振兴 刘伊克 常旭 《地球物理学报》 SCIE EI CAS CSCD 北大核心 2009年第3期785-791,共7页
依据辽东湾地区一组在地层条件和不同流体相态下(气饱和与水饱和)实验室测定的岩石纵波速度、横波速度及密度等数据.讨论 Gassmann 方程在横波速度反演和流体替代方面的应用效果,指出岩石骨架剪切模量和体积模量估算精度是影响纵波、横... 依据辽东湾地区一组在地层条件和不同流体相态下(气饱和与水饱和)实验室测定的岩石纵波速度、横波速度及密度等数据.讨论 Gassmann 方程在横波速度反演和流体替代方面的应用效果,指出岩石骨架剪切模量和体积模量估算精度是影响纵波、横波速度预测精度的关键因素之一,提出基于约束条件横波速度反演和流体替代方法,速度预测精度的改善十分明显. 展开更多
关键词 横波速度反演 流体替代 GASSMANN方程
下载PDF
一种用于矩阵求逆的原位替换算法及硬件实现 被引量:4
13
作者 张多利 蒋雯 +2 位作者 叶紫燕 宋宇鲲 汪健 《合肥工业大学学报(自然科学版)》 CAS 北大核心 2020年第1期75-80,共6页
对于数字信号处理、无线通信技术等数值计算领域中大量的矩阵求逆运算,采用传统的求逆算法,如伴随矩阵法、高斯消去法等,计算量庞大、过程复杂,且存储空间需求大、并行性低,硬件实现计算加速效率不高。文章提出一种原位替换矩阵求逆算法... 对于数字信号处理、无线通信技术等数值计算领域中大量的矩阵求逆运算,采用传统的求逆算法,如伴随矩阵法、高斯消去法等,计算量庞大、过程复杂,且存储空间需求大、并行性低,硬件实现计算加速效率不高。文章提出一种原位替换矩阵求逆算法,针对算法设计地址控制和硬件架构,在Xilinx公司的Virtex7现场可编程逻辑门阵列(field programmable gate array,FPGA)中进行了硬件实现,验证了所设计的硬件架构在原存储空间内,能够并行高效地完成2^n阶单精度实数矩阵求逆运算,结果精度能达到10^-6。与基于Cholesky分解的矩阵求逆方法相比,该算法能取得近10倍的加速比;其并行性高,占用的存储和硬件资源少,具有较高的性能。 展开更多
关键词 矩阵求逆 原位替换 硬件架构 并行计算 存储资源
下载PDF
清水洼陷致密砂岩地震岩石物理特征及优势储层预测 被引量:2
14
作者 高荣锦 《特种油气藏》 CAS CSCD 北大核心 2021年第5期53-59,共7页
针对常规叠后反演无法准确预测储层中流体的问题,采用叠前AVO流体预测方法,分析清水洼陷致密砂岩中的岩石物理特征及AVO响应特征,开展叠前流体因子反演研究。通过岩石物理实验测定致密砂岩的弹性模量及砂岩饱和不同性质流体时的纵横波... 针对常规叠后反演无法准确预测储层中流体的问题,采用叠前AVO流体预测方法,分析清水洼陷致密砂岩中的岩石物理特征及AVO响应特征,开展叠前流体因子反演研究。通过岩石物理实验测定致密砂岩的弹性模量及砂岩饱和不同性质流体时的纵横波速度关系,开展流体替代及叠前AVO分析。研究结果表明:清水洼陷致密砂岩在饱和油、气、水状态下,密度和泊松比变化明显,尤其是含气后密度和泊松比迅速减小,AVO反射振幅表现为随偏移距增大而快速衰减的特征。利用该特征及实测泥石基线约束叠前AVO流体因子反演,有效地提高了该区致密砂岩油气预测的准确性,为该区油气水关系的准确预测奠定基础。 展开更多
关键词 致密砂岩 岩石物理 流体替代 AVO反演 流体因子 储层预测
下载PDF
英语医学科技论文中的修辞手段
15
作者 王征爱 张丽莉 许瑾 《第一军医大学学报》 CSCD 北大核心 2003年第7期754-756,共3页
本文总结概括了英文医学科技论文中修辞的使用,并对修辞中省略、替代及倒装的用法作了总结介绍。
关键词 英语医学科技论文 修辞 省略 替代 倒装
下载PDF
徐有壬优化八线互求的方法研究
16
作者 王海林 苏建新 《内蒙古师范大学学报(自然科学汉文版)》 CAS 2010年第6期635-639,共5页
徐有壬的八线互求方法是清代数学的重要内容之一.详细阐述了徐有壬正弦求正矢级数的推导方法及其比例商除法、还原术和借径术,探讨了其八线互求方法的特点.
关键词 徐有壬 八线互求法 正弦 正矢 比例商除法 还原术 借径术
下载PDF
线性矩阵方程:AXB+CYD=F的递推解法
17
作者 谢延波 《大连民族学院学报》 CAS 2003年第1期78-81,共4页
解矩阵方程是一个有很强应用背景的传统问题. 应用广义逆矩阵和简单矩阵方程:AX=B,XC=D的求解方法,探索线性矩阵方程:AXB+CYD=F 的求解问题.
关键词 线性矩阵方程 广义逆矩阵 递推解法 相容性 通解 复数域
下载PDF
准噶尔SWD地区含油气砂体识别方法
18
作者 陈习峰 陈佳良 +1 位作者 张齐鸣 陈胜红 《勘探地球物理进展》 2004年第4期251-255,共5页
在寻找准噶尔SWD地区隐蔽砂体过程中,波阻抗资料已成为三维资料解释的主要依据。利用流体置换方法标定SWD地区目的层AVO及其相关属性的含油敏感度;用shuey近似公式反演得到纵波阻抗和横波阻抗;然后根据属性优选结果提取波松比和流体阻... 在寻找准噶尔SWD地区隐蔽砂体过程中,波阻抗资料已成为三维资料解释的主要依据。利用流体置换方法标定SWD地区目的层AVO及其相关属性的含油敏感度;用shuey近似公式反演得到纵波阻抗和横波阻抗;然后根据属性优选结果提取波松比和流体阻抗数据体,发现最大值指示泥岩,中间值指示饱含水砂岩,最小值指示饱含油气砂岩。这一结果和试油结果相吻合,并利用它们圈定了可能的含油气砂体发育区。 展开更多
关键词 砂体 准噶尔 油气 AVO 数据体 波阻抗 砂岩 试油 置换方法 含水
下载PDF
关于广义几何数列的讨论
19
作者 张立国 《沈阳理工大学学报》 CAS 2017年第5期108-110,共3页
广义几何数列是数列的推广,其收敛情况与数列的值域密切相关。按照数列的取值范围,讨论广义几何数列的性质,给出收敛的充要条件和必要条件,为极限理论的后续研究提供思路。
关键词 广义几何数列 倒数代换 收敛
下载PDF
一种AES算法中S盒和逆S盒替换的表达式方法 被引量:7
20
作者 覃晓草 李树国 《微电子学与计算机》 CSCD 北大核心 2014年第1期112-115,共4页
S盒替换与逆S盒替换是AES算法性能的主要瓶颈,它直接影响AES芯片的运算速度.在优化Q-M化简法基础上,提出了一种实现AES算法中S盒替换和逆S盒替换的表达式方法,这种表达式方法相比于普遍使用的查表法,其延时减小了8.5%,面积减小了27.4%,... S盒替换与逆S盒替换是AES算法性能的主要瓶颈,它直接影响AES芯片的运算速度.在优化Q-M化简法基础上,提出了一种实现AES算法中S盒替换和逆S盒替换的表达式方法,这种表达式方法相比于普遍使用的查表法,其延时减小了8.5%,面积减小了27.4%,功耗减小了17%. 展开更多
关键词 AES算法 S盒替换 逆S盒替换 Q—M化简法 表达式方法
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部