为提高小麦病害检测精度,实现将模型方便快速部署到移动端,该研究提出了一种基于改进YOLOv8的轻量化小麦病害检测方法。首先,使用PP-LCNet模型替换YOLOv8网络结构的骨干网络,并在骨干网络层引入深度可分离卷积(depthwise separable conv...为提高小麦病害检测精度,实现将模型方便快速部署到移动端,该研究提出了一种基于改进YOLOv8的轻量化小麦病害检测方法。首先,使用PP-LCNet模型替换YOLOv8网络结构的骨干网络,并在骨干网络层引入深度可分离卷积(depthwise separable convolution, DepthSepConv)结构,减少模型参数量,提升模型检测性能;其次,在颈部网络部分添加全局注意力机制(global attention mechanism, GAM)模块,强化特征中语义信息和位置信息,提高模型特征融合能力;然后,引入轻量级通用上采样内容感知重组(content-aware reassembly of features,CARAFE)模块,提高模型对重要特征的提取能力;最后,使用Wise-IoU(weighted interpolation of sequential evidence for intersection over union)边界损失函数代替原损失函数,提升网络边界框回归性能和对小目标病害的检测效果。试验结果表明,对于大田环境下所采集的小麦病害数据集,改进后模型的参数量及模型大小相比原YOLOv8n基线模型分别降低了12.5%和11.3%,同时精确度(precision)及平均精度均值(mean average precision,m AP)相较于原模型分别提高了4.5和1.9个百分点,优于其他对比目标检测算法,可为小麦病害检测无人机等移动端检测装备的部署和应用提供参考。展开更多
A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently...A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.展开更多
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.展开更多
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens...This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way.展开更多
By comparing the entropy and the conditional entropy in a marker, an entropy-based index has been presented for fine-scale linkage disequilibrium gene mapping using high-density marker maps for human disease genes. Th...By comparing the entropy and the conditional entropy in a marker, an entropy-based index has been presented for fine-scale linkage disequilibrium gene mapping using high-density marker maps for human disease genes. The index can quantify the level of linkage disequilibrium (LD) between the marker and the disease susceptibility locus (DSL) of genes. The advantage of using the index is attributed to the fact that it does not depend on marker allele frequencies across loci. Moreover, it is parallel to Hardy-Weinberg disequilibrium (HWD) measure for DSL fine mapping. Through various simulations, the fine mapping perform- ances of the proposed entropy-based index was extensively investigated under various genetic parameters. The results show that the index presented is both robust and powerful for DSL mapping in genes.展开更多
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w...To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.展开更多
To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can sup...To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can support and extend the RBAC96 model. The uniform ontology-based description mechanism of secure policies is applied in OntoRBAC, which can be used to describe different secure policies in distributed systems and integrate policies in semantic level with upper concepts. In addition, some rules have been defined to reason within the OntoRBAC to extend the inference algorithms in ontology, which makes the system accommodate itself to RBAC policies better.展开更多
To solve the problem that metal artifacts severely damage the clarity of the organization structure in computed tomography(CT) images, a sinogram fusion-based metal artifact correction method is proposed. First, the...To solve the problem that metal artifacts severely damage the clarity of the organization structure in computed tomography(CT) images, a sinogram fusion-based metal artifact correction method is proposed. First, the metal image is segmented from the original CT image by the pre-set threshold. The original CT image and metal image are forward projected into the original projection sinogram and metal projection sinogram, respectively. The interpolation-based correction method and mean filter are used to correct the original CT image and preserve the edge of the corrected CT image, respectively. The filtered CT image is forward projected into the filtered image sinogram. According to the position of the metal sinogram in the original sinogram and filtered image sinogram, the corresponding sinograms PM^D ( in the original sinogram) and PM^C ( in the filtered image sinogram)can be acquired from the original sinogram and filtered image sinogram, respectively. Then, PM^D and PM^C are fused into the fused metal sinogram PM^F according to a certain proportion.The final sinogram can be acquired by fusing PM^F , PM^D and the original sinogram P^O. Finally, the final sinogram is reconstructed into the corrected CT image and metal information is compensated into the corrected CT image.Experiments on clinical images demonstrate that the proposed method can effectively reduce metal artifacts. A comparison with classical metal artifacts correction methods shows that the proposed metal artifacts correction method performs better in metal artifacts suppression and tissue feature preservation.展开更多
The theory and its method of machining parameter optimization for high-speed machining are studied. The machining data collected from workshops, labs and references are analyzed. An optimization method based on the ge...The theory and its method of machining parameter optimization for high-speed machining are studied. The machining data collected from workshops, labs and references are analyzed. An optimization method based on the genetic algorithm (GA) is investigated. Its calculation speed is faster than that of traditional optimization methods, and it is suitable for the machining parameter optimization in the automatic manufacturing system. Based on the theoretical studies, a system of machining parameter management and optimization is developed. The system can improve productivity of the high-speed machining centers.展开更多
Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal re...Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal representation,design process model and design algorithm.The implementing scheme and formal description of feature taxonomy,feature operator,feature model validation and feature transformation are given in the paper.The feature based design process model suited for either sequencial or concurrent engineering is proposed and its application to product structural design and process plan design is presented. Some general design algorithms for developing feature based design system are also addressed.The proposed scheme provides a formal methodology elementary for feature based design system development and operation in a structural way.展开更多
Based on the case-based designing (CBD), it is presented that the similarity of the fixtures is described by the fixture information of workpiece and the structure information of feature. Then, the computer-aided fixt...Based on the case-based designing (CBD), it is presented that the similarity of the fixtures is described by the fixture information of workpiece and the structure information of feature. Then, the computer-aided fixture design system is created on case-based reasoning (CBR), in which the attributes information of the main features of workpiece and structure of fixture as case index code are designed for the retrieve of the similar cases, and the structure and hierarchical relation of case library are set up for store. Meanwhile, the algorithm based on the knowledge-guided in the retrieve of the similar cases, the strategy of case adaptation and case storage in which the case identification number is used to distinguish from similar cases are presented. The application of the system in some projects improves the design efficiency and gets a good result.展开更多
Aiming at practical demands of manufacturing enterprises to the CAPP system in the Internet age, the CAPP model is presented based on Web and featured by open, universality and intelligence. A CAPP software package is...Aiming at practical demands of manufacturing enterprises to the CAPP system in the Internet age, the CAPP model is presented based on Web and featured by open, universality and intelligence. A CAPP software package is developed with three layer structures (the database, the Web server and the client server) to realize CAPP online services. In the CAPP software package, a new process planning method called the successive casebased reasoning is presented. Using the method, process planning procedures are divided into three layers (the process planning, the process procedure and the process step), which are treated with the successive process reasoning. Process planning rules can be regularly described due to the granularity-based rule classification. The CAPP software package combines CAPP software with online services. The process planning has the features of variant analogy and generative creation due to adopting the successive case-based reasoning, thus improving the universality and the practicability of the process planning.展开更多
A hybrid technique is developed for the evaluation of two dimensional electromagnetic scattering from electrically large conducting bodies with cracks on their surfaces (TE case). The edge based finite element metho...A hybrid technique is developed for the evaluation of two dimensional electromagnetic scattering from electrically large conducting bodies with cracks on their surfaces (TE case). The edge based finite element method (FEM) is employed to compute the scattering from the cracks. Physical optics (PO) and physical theory of diffraction (PTD) are utilized to evaluate the scattering from the large bodies with the cracks filled with perfect conductors. These two methods are combined by an efficient coupling scheme. Some of numerical results are presented. It is shown that the hybrid technique has some advantages over other methods in regard to saving computer memory units and CPU time.展开更多
文摘为提高小麦病害检测精度,实现将模型方便快速部署到移动端,该研究提出了一种基于改进YOLOv8的轻量化小麦病害检测方法。首先,使用PP-LCNet模型替换YOLOv8网络结构的骨干网络,并在骨干网络层引入深度可分离卷积(depthwise separable convolution, DepthSepConv)结构,减少模型参数量,提升模型检测性能;其次,在颈部网络部分添加全局注意力机制(global attention mechanism, GAM)模块,强化特征中语义信息和位置信息,提高模型特征融合能力;然后,引入轻量级通用上采样内容感知重组(content-aware reassembly of features,CARAFE)模块,提高模型对重要特征的提取能力;最后,使用Wise-IoU(weighted interpolation of sequential evidence for intersection over union)边界损失函数代替原损失函数,提升网络边界框回归性能和对小目标病害的检测效果。试验结果表明,对于大田环境下所采集的小麦病害数据集,改进后模型的参数量及模型大小相比原YOLOv8n基线模型分别降低了12.5%和11.3%,同时精确度(precision)及平均精度均值(mean average precision,m AP)相较于原模型分别提高了4.5和1.9个百分点,优于其他对比目标检测算法,可为小麦病害检测无人机等移动端检测装备的部署和应用提供参考。
基金National Natural Science Foundation of China(62372464)。
文摘A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.
基金Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000)Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
文摘The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.
基金The National High Technology Research and Development Program of China(863Program)(No.2007AA01Z445)
文摘This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way.
文摘By comparing the entropy and the conditional entropy in a marker, an entropy-based index has been presented for fine-scale linkage disequilibrium gene mapping using high-density marker maps for human disease genes. The index can quantify the level of linkage disequilibrium (LD) between the marker and the disease susceptibility locus (DSL) of genes. The advantage of using the index is attributed to the fact that it does not depend on marker allele frequencies across loci. Moreover, it is parallel to Hardy-Weinberg disequilibrium (HWD) measure for DSL fine mapping. Through various simulations, the fine mapping perform- ances of the proposed entropy-based index was extensively investigated under various genetic parameters. The results show that the index presented is both robust and powerful for DSL mapping in genes.
基金The National High Technology Research and Development Program of China(863Program)(No.2001AA115300)the Natural Science Foundation of Liaoning Province(No.20031018,20062023)
文摘To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.
基金The National Natural Science Foundation of China(No60403027)
文摘To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can support and extend the RBAC96 model. The uniform ontology-based description mechanism of secure policies is applied in OntoRBAC, which can be used to describe different secure policies in distributed systems and integrate policies in semantic level with upper concepts. In addition, some rules have been defined to reason within the OntoRBAC to extend the inference algorithms in ontology, which makes the system accommodate itself to RBAC policies better.
基金Open Research Fund of the Key Laboratory of Computer Netw ork and Information Integration of Ministry of Education of Southeast University(No.K93-9-2014-10C)the Scientific Research Foundation of Education Department of Anhui Province(No.KJ2014A186,SK2015A433)the National Basic Research Program of China(973 Program)(No.2010CB732503)
文摘To solve the problem that metal artifacts severely damage the clarity of the organization structure in computed tomography(CT) images, a sinogram fusion-based metal artifact correction method is proposed. First, the metal image is segmented from the original CT image by the pre-set threshold. The original CT image and metal image are forward projected into the original projection sinogram and metal projection sinogram, respectively. The interpolation-based correction method and mean filter are used to correct the original CT image and preserve the edge of the corrected CT image, respectively. The filtered CT image is forward projected into the filtered image sinogram. According to the position of the metal sinogram in the original sinogram and filtered image sinogram, the corresponding sinograms PM^D ( in the original sinogram) and PM^C ( in the filtered image sinogram)can be acquired from the original sinogram and filtered image sinogram, respectively. Then, PM^D and PM^C are fused into the fused metal sinogram PM^F according to a certain proportion.The final sinogram can be acquired by fusing PM^F , PM^D and the original sinogram P^O. Finally, the final sinogram is reconstructed into the corrected CT image and metal information is compensated into the corrected CT image.Experiments on clinical images demonstrate that the proposed method can effectively reduce metal artifacts. A comparison with classical metal artifacts correction methods shows that the proposed metal artifacts correction method performs better in metal artifacts suppression and tissue feature preservation.
文摘The theory and its method of machining parameter optimization for high-speed machining are studied. The machining data collected from workshops, labs and references are analyzed. An optimization method based on the genetic algorithm (GA) is investigated. Its calculation speed is faster than that of traditional optimization methods, and it is suitable for the machining parameter optimization in the automatic manufacturing system. Based on the theoretical studies, a system of machining parameter management and optimization is developed. The system can improve productivity of the high-speed machining centers.
文摘Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal representation,design process model and design algorithm.The implementing scheme and formal description of feature taxonomy,feature operator,feature model validation and feature transformation are given in the paper.The feature based design process model suited for either sequencial or concurrent engineering is proposed and its application to product structural design and process plan design is presented. Some general design algorithms for developing feature based design system are also addressed.The proposed scheme provides a formal methodology elementary for feature based design system development and operation in a structural way.
基金TheNationalHighTechnologyResearchandDevelopmentProgramofChina ( 863Program ) (No .2 0 0 2AA4110 3 0 ) ,theNaturalScientificResearchProgramCollegeofUniversityofJiangsuProvince (No .0 3KJD5 2 0 2 46)
文摘Based on the case-based designing (CBD), it is presented that the similarity of the fixtures is described by the fixture information of workpiece and the structure information of feature. Then, the computer-aided fixture design system is created on case-based reasoning (CBR), in which the attributes information of the main features of workpiece and structure of fixture as case index code are designed for the retrieve of the similar cases, and the structure and hierarchical relation of case library are set up for store. Meanwhile, the algorithm based on the knowledge-guided in the retrieve of the similar cases, the strategy of case adaptation and case storage in which the case identification number is used to distinguish from similar cases are presented. The application of the system in some projects improves the design efficiency and gets a good result.
文摘Aiming at practical demands of manufacturing enterprises to the CAPP system in the Internet age, the CAPP model is presented based on Web and featured by open, universality and intelligence. A CAPP software package is developed with three layer structures (the database, the Web server and the client server) to realize CAPP online services. In the CAPP software package, a new process planning method called the successive casebased reasoning is presented. Using the method, process planning procedures are divided into three layers (the process planning, the process procedure and the process step), which are treated with the successive process reasoning. Process planning rules can be regularly described due to the granularity-based rule classification. The CAPP software package combines CAPP software with online services. The process planning has the features of variant analogy and generative creation due to adopting the successive case-based reasoning, thus improving the universality and the practicability of the process planning.
文摘A hybrid technique is developed for the evaluation of two dimensional electromagnetic scattering from electrically large conducting bodies with cracks on their surfaces (TE case). The edge based finite element method (FEM) is employed to compute the scattering from the cracks. Physical optics (PO) and physical theory of diffraction (PTD) are utilized to evaluate the scattering from the large bodies with the cracks filled with perfect conductors. These two methods are combined by an efficient coupling scheme. Some of numerical results are presented. It is shown that the hybrid technique has some advantages over other methods in regard to saving computer memory units and CPU time.