期刊文献+
共找到77,322篇文章
< 1 2 250 >
每页显示 20 50 100
基于MobileNetV3Small-ECA的水稻病害轻量级识别研究 被引量:2
1
作者 袁培森 欧阳柳江 +1 位作者 翟肇裕 田永超 《农业机械学报》 EI CAS CSCD 北大核心 2024年第1期253-262,共10页
为实现水稻病害的轻量化识别与检测,使用ECA注意力机制改进MobileNetV3Small模型,并使用共享参数迁移学习对水稻病害进行智能化轻量级识别和检测。在PlantVillage数据集上进行预训练,将预训练得到的共享参数迁移到对水稻病害识别模型上... 为实现水稻病害的轻量化识别与检测,使用ECA注意力机制改进MobileNetV3Small模型,并使用共享参数迁移学习对水稻病害进行智能化轻量级识别和检测。在PlantVillage数据集上进行预训练,将预训练得到的共享参数迁移到对水稻病害识别模型上微调优化。在开源水稻病害数据集上进行试验测试,试验结果表明,在非迁移学习下,识别准确率达到97.47%,在迁移学习下识别准确率达到99.92%,同时参数量减少26.69%。其次,通过Grad-CAM进行可视化,本文方法与其他注意力机制CBAM和SENET相比,ECA模块生成的结果与图像中病斑的位置和颜色更加一致,表明网络可以更好地聚焦水稻病害的特征,并且通过可视化和各水稻病害分析了误分类原因。本文方法实现了水稻病害识别模型的轻量化,使其能够在移动设备等资源受限的场景中部署,达到快速、高效、便携的目的。同时开发了基于Android的水稻病害识别系统,方便于在边缘端进行水稻病害识别分析。 展开更多
关键词 水稻病害识别 迁移学习 高效通道注意力机制 mobileNetV3Small 移动端部署
下载PDF
Instrumented assisted soft tissue mobilization vs extracorporeal shock wave therapy in treatment of myofascial pain syndrome 被引量:1
2
作者 Nourhan Elsayed Shamseldeen Mohammed Moustafa Aldosouki Hegazy +1 位作者 Nadia Abdalazeem Fayaz Nesreen Fawzy Mahmoud 《World Journal of Orthopedics》 2023年第7期572-581,共10页
BACKGROUND Active myofascial trigger points(TrPs)often occur in the upper region of the upper trapezius(UT)muscle.These TrPs can be a significant source of neck,shoulder,and upper back pain and headaches.These TrPs an... BACKGROUND Active myofascial trigger points(TrPs)often occur in the upper region of the upper trapezius(UT)muscle.These TrPs can be a significant source of neck,shoulder,and upper back pain and headaches.These TrPs and their related pain and disability can adversely affect an individual’s everyday routine functioning,work-related productivity,and general quality of life.AIM To investigate the effects of instrument assisted soft tissue mobilization(IASTM)vs extracorporeal shock wave therapy(ESWT)on the TrPs of the UT muscle.METHODS A randomized,single-blind,comparative clinical study was conducted at the Medical Center of the Egyptian Railway Station in Cairo.Forty patients(28 females and 12 males),aged between 20-years-old and 40-years-old,with active myofascial TrPs in the UT muscle were randomly assigned to two equal groups(A and B).Group A received IASTM,while group B received ESWT.Each group was treated twice weekly for 2 weeks.Both groups received muscle energy technique for the UT muscle.Patients were evaluated twice(pre-and posttreatment)for pain intensity using the visual analogue scale and for pain pressure threshold(PPT)using a pressure algometer.RESULTS Comparing the pre-and post-treatment mean values for all variables for group A,there were significant differences in pain intensity for TrP1 and TrP2(P=0.0001)and PPT for TrP1(P=0.0002)and TrP2(P=0.0001).Also,for group B,there were significant differences between the pre-and post-treatment pain intensity for TrP1 and TrP2 and PPT for TrP1 and TrP2(P=0.0001).There were no significant differences between the two groups in the post-treatment mean values of pain intensity for TrP1(P=0.9)and TrP2(P=0.76)and PPT for TrP1(P=0.09)and for TrP2(P=0.91).CONCLUSION IASTM and ESWT are effective methods for improving pain and PPT in patients with UT muscle TrPs.There is no significant difference between either treatment method. 展开更多
关键词 Myofascial trigger points Upper trapezius muscle Instrument-assisted soft tissue mobilization Extracorporeal shock wave therapy Myofascial pain syndrome
下载PDF
IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks 被引量:1
3
作者 Ying Zhang Weiming Niu Leibing Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期885-902,共18页
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ... In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes. 展开更多
关键词 mobile edge computing(MEC) unmanned aerial vehicle(UAV) intelligent reflecting surface(IRS) zero forcing(ZF)
下载PDF
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
4
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 mobile application security AES data encryption time parameter mobile device
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
5
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing
6
作者 Yong Ma Han Zhao +5 位作者 Kunyin Guo Yunni Xia Xu Wang Xianhua Niu Dongge Zhu Yumin Dong 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期907-927,共21页
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be dep... Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery,ultimately enhancing the quality of the user experience.However,due to the typical placement of edge devices and nodes at the network’s periphery,these components may face various potential fault tolerance challenges,including network instability,device failures,and resource constraints.Considering the dynamic nature ofMEC,making high-quality content caching decisions for real-time mobile applications,especially those sensitive to latency,by effectively utilizing mobility information,continues to be a significant challenge.In response to this challenge,this paper introduces FT-MAACC,a mobility-aware caching solution grounded in multi-agent deep reinforcement learning and equipped with fault tolerance mechanisms.This approach comprehensively integrates content adaptivity algorithms to evaluate the priority of highly user-adaptive cached content.Furthermore,it relies on collaborative caching strategies based onmulti-agent deep reinforcement learningmodels and establishes a fault-tolerancemodel to ensure the system’s reliability,availability,and persistence.Empirical results unequivocally demonstrate that FTMAACC outperforms its peer methods in cache hit rates and transmission latency. 展开更多
关键词 mobile edge networks mobilITY fault tolerance cooperative caching multi-agent deep reinforcement learning content prediction
下载PDF
A Problem Not to Be Ignored: The Influencing Factors of Mobile Phone Addiction and Its Influence on Sleep Quality
7
作者 Zihan Ji Lian Zhou 《Health》 2024年第5期459-469,共11页
Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attentio... Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attention. The present study aims to analyze the current state of mobile phone addiction and its impact on sleep quality within the population, while also exploring the influence of related factors on sleep quality. Ultimately, this research will provide a scientific foundation for targeted intervention measures and strategies. Methods: A total of 253 permanent residents in Nanjing were randomly selected as study subjects. The Mobile Phone Addiction Index (MPAI) and Pittsburgh Sleep Quality Index (PSQI) were used to evaluate the degree of smartphone addiction and sleep quality of the study subjects. Body mass index (BMI) was measured according to standardized procedures. Independent sample t-test, Chi-square test, rank sum test and multiple linear regression were used to analyze the correlation between mobile phone addiction and sleep quality, and P Results: 117 people (46.2%) were addicted to mobile phones. Chi-square test showed that the rate of mobile phone addiction in drinking group was significantly higher than that in non-drinking group (P P P P P P P P P P Conclusion: Mobile phone addiction may lead to shorter sleep duration and reduce sleep efficiency. The withdrawal of mobile phone addiction may have a negative impact on sleep quality. According to the characteristics of the population, appropriate comprehensive intervention measures should be taken to build an effective evaluation system, so as to reduce the impact of mobile phone addiction and withdrawal problems on sleep and improve sleep quality. 展开更多
关键词 mobile Phone Addiction Influencing Factors WITHDRAWAL Sleep Quality
下载PDF
Mobility edges and localization characteristics in one-dimensional quasiperiodic quantum walk
8
作者 崔鑫辉 王慧敏 李志坚 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期156-160,共5页
We construct a one-dimensional quasiperiodic quantum walk to investigate the localization–delocalization transition.The inverse participation ratio and Lyapunov exponent are employed as two indexes to determine the m... We construct a one-dimensional quasiperiodic quantum walk to investigate the localization–delocalization transition.The inverse participation ratio and Lyapunov exponent are employed as two indexes to determine the mobility edge, a critical energy to distinguish the energy regions of extended and localized states. The analytical solution of mobility edge is obtained by the Lyapunov exponents in global theory, and the consistency of the two indexes is confirmed. We further study the dynamic characteristics of the quantum walk and show that the probabilities are localized to some specific lattice sites with time evolution. This phenomenon is explained by the effective potential of the Hamiltonian which corresponds to the phase in the coin operator of the quantum walk. 展开更多
关键词 quantum walk mobility edges QUASIPERIODICITY
下载PDF
Air-Ground Collaborative Mobile Edge Computing:Architecture,Challenges,and Opportunities
9
作者 Qin Zhen He Shoushuai +5 位作者 Wang Hai Qu Yuben Dai Haipeng Xiong Fei Wei Zhenhua Li Hailong 《China Communications》 SCIE CSCD 2024年第5期1-16,共16页
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow... By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC. 展开更多
关键词 air-ground ARCHITECTURE COLLABORATIVE mobile edge computing
下载PDF
SAC-Based Computation Offloading for Reconfigurable Intelligent Surface-Aided Mobile Edge Networks
10
作者 Li Bin Qian Zhen Fei Zesong 《China Communications》 SCIE CSCD 2024年第6期261-270,共10页
In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consump... In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consumption of all UEs by jointly optimizing the discrete phase shift of RIS,UEs’transmitting power,computing resources allocation,and the UEs’task offloading strategies for local computing and offloading.The formulated problem is a sequential decision making across multiple coherent time slots.Furthermore,the mobility of UEs brings uncertainties into the decision-making process.To cope with this challenging problem,the deep reinforcement learning-based Soft Actor-Critic(SAC)algorithm is first proposed to effectively optimize the discrete phase of RIS and the UEs’task offloading strategies.Then,the transmitting power and computing resource allocation can be determined based on the action.Numerical results demonstrate that the proposed algorithm can be trained more stably and perform approximately 14%lower than the deep deterministic policy gradient benchmark in terms of energy consumption. 展开更多
关键词 MEC RIS soft actor-critic user mobility
下载PDF
Privacy-Preserving Federated Mobility Prediction with Compound Data and Model Perturbation Mechanism
11
作者 Long Qingyue Wang Huandong +4 位作者 Chen Huiming Jin Depeng Zhu Lin Yu Li Li Yong 《China Communications》 SCIE CSCD 2024年第3期160-173,共14页
Human mobility prediction is important for many applications.However,training an accurate mobility prediction model requires a large scale of human trajectories,where privacy issues become an important problem.The ris... Human mobility prediction is important for many applications.However,training an accurate mobility prediction model requires a large scale of human trajectories,where privacy issues become an important problem.The rising federated learning provides us with a promising solution to this problem,which enables mobile devices to collaboratively learn a shared prediction model while keeping all the training data on the device,decoupling the ability to do machine learning from the need to store the data in the cloud.However,existing federated learningbased methods either do not provide privacy guarantees or have vulnerability in terms of privacy leakage.In this paper,we combine the techniques of data perturbation and model perturbation mechanisms and propose a privacy-preserving mobility prediction algorithm,where we add noise to the transmitted model and the raw data collaboratively to protect user privacy and keep the mobility prediction performance.Extensive experimental results show that our proposed method significantly outperforms the existing stateof-the-art mobility prediction method in terms of defensive performance against practical attacks while having comparable mobility prediction performance,demonstrating its effectiveness. 展开更多
关键词 federated learning mobility prediction PRIVACY
下载PDF
Computing Resource Allocation for Blockchain-Based Mobile Edge Computing
12
作者 Wanbo Zhang Yuqi Fan +2 位作者 Jun Zhang Xu Ding Jung Yoon Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期863-885,共23页
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a... Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC. 展开更多
关键词 mobile edge computing blockchain resource allocation
下载PDF
The Contribution of AI-Powered Mobile Apps to Smart City Ecosystems
13
作者 Zaki Ali Bayashot 《Journal of Software Engineering and Applications》 2024年第3期143-154,共12页
In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is metic... In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is meticulously examined. This comprehensive research delineates the multifaceted ways in which AI-powered mobile applications can significantly enhance the efficiency, sustainability, and livability of urban environments, marking a pivotal step towards the realization of smart cities globally. Bayashot meticulously outlines the critical areas where AI-powered apps offer unprecedented advantages, including urban mobility, public safety, energy management, and environmental monitoring. By leveraging AI’s capabilities, these applications not only streamline city operations but also foster a more sustainable interaction between city dwellers and their environment. The paper emphasizes the importance of data-driven decision-making in urban planning, showcasing how AI analytics can predict and mitigate traffic congestion, optimize energy consumption, and enhance emergency response strategies. The author also explores the social implications of AI in urban settings, highlighting the potential for these technologies to bridge the gap between government entities and citizens. Through engaging case studies, Bayashot demonstrates how participatory governance models, enabled by AI apps, can promote transparency, accountability, and citizen engagement in urban management. A significant contribution of this research is its focus on the challenges and opportunities presented by the integration of AI into smart city ecosystems. Bayashot discusses the technical, ethical, and privacy concerns associated with AI applications, advocating for a balanced approach that ensures technological advancements do not come at the expense of civil liberties. The study calls for robust regulatory frameworks to govern the use of AI in public spaces, emphasizing the need for ethical AI practices that respect privacy and promote inclusivity. Furthermore, Bayashot’s research underscores the necessity of cross-disciplinary collaboration in the development and implementation of AI technologies in urban contexts. By bringing together experts from information technology, urban planning, environmental science, and social sciences, the author argues for a holistic approach to smart city development. This interdisciplinary strategy ensures that AI applications are not only technologically sound but also socially and environmentally responsible. The paper concludes with a visionary outlook on the future of smart cities, posited on the seamless integration of AI technologies. Bayashot envisions a world where AI-powered mobile apps not only facilitate smoother urban operations but also empower citizens to actively participate in the shaping of their urban environments. This research serves as a critical call to action for policymakers, technologists, and urban planners to embrace AI as a tool for creating more sustainable, efficient, and inclusive cities. By presenting a detailed analysis of the current state of AI in urban development, coupled with practical insights and forward-looking recommendations, “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems” stands as a seminal work that is poised to inspire and guide the evolution of urban landscapes worldwide. Its comprehensive exploration of the subject matter, combined with its impactful conclusions, make it a must-read for anyone involved in the field of smart city development, AI technology, or urban policy-making. 展开更多
关键词 mobile Applications Smart Cities Artificial Intelligence IOT
下载PDF
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
14
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
下载PDF
RPL-Based IoT Networks under Decreased Rank Attack:Performance Analysis in Static and Mobile Environments
15
作者 Amal Hkiri Mouna Karmani +3 位作者 Omar Ben Bahri Ahmed Mohammed Murayr Fawaz Hassan Alasmari Mohsen Machhout 《Computers, Materials & Continua》 SCIE EI 2024年第1期227-247,共21页
The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks r... The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks remains a concern.This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static andmobilenetwork environments.We employ the Random Direction Mobility Model(RDM)for mobile scenarios within the Cooja simulator.Our systematic evaluation focuses on critical performance metrics,including Packet Delivery Ratio(PDR),Average End to End Delay(AE2ED),throughput,Expected Transmission Count(ETX),and Average Power Consumption(APC).Our findings illuminate the disruptive impact of this attack on the routing hierarchy,resulting in decreased PDR and throughput,increased AE2ED,ETX,and APC.These results underscore the urgent need for robust security measures to protect RPL-based IoT networks.Furthermore,our study emphasizes the exacerbated impact of the attack in mobile scenarios,highlighting the evolving security requirements of IoT networks. 展开更多
关键词 RPL decreased rank attacks mobilITY random direction model
下载PDF
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
16
作者 Chunlin Xiong Zhengqiu Weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
下载PDF
Mobile Crowdsourcing Task Allocation Based on Dynamic Self-Attention GANs
17
作者 Kai Wei Song Yu Qingxian Pan 《Computers, Materials & Continua》 SCIE EI 2024年第4期607-622,共16页
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encoun... Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation. 展开更多
关键词 mobile crowdsourcing task allocation anomaly detection GAN attention mechanisms
下载PDF
Heuristic Expanding Disconnected Graph:A Rapid Path Planning Method for Mobile Robots
18
作者 Yong Tao Lian Duan +3 位作者 He Gao Yufan Zhang Yian Song Tianmiao Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第2期68-82,共15页
Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of th... Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of the neighborhood search strategy,the robots could hardly obtain the most optimal global path.A global path planning algorithm,denoted as EDG*,is proposed by expanding nodes using a well-designed expanding disconnected graph operator(EDG)in this paper.Firstly,all obstacles are marked and their corners are located through the map pre-processing.Then,the EDG operator is designed to find points in non-obstruction areas to complete the rapid expansion of disconnected nodes.Finally,the EDG*heuristic iterative algorithm is proposed.It selects the candidate node through a specific valuation function and realizes the node expansion while avoiding collision with a minimum offset.Path planning experiments were conducted in a typical indoor environment and on the public dataset CSM.The result shows that the proposed EDG*reduced the planning time by more than 90%and total length of paths reduced by more than 4.6%.Compared to A*,Dijkstra and JPS,EDG*does not show an exponential explosion effect in map size.The EDG*showed better performance in terms of path smoothness,and collision avoidance.This shows that the EDG*algorithm proposed in this paper can improve the efficiency of path planning and enhance path quality. 展开更多
关键词 Global path planning mobile robot Expanding disconnected graph Edge node OFFSET
下载PDF
Characteristics of long-distance mobile mRNAs from shoot to root in grafted plant species
19
作者 Mengmeng Fu Zhen Xu +7 位作者 Huaying Ma Yifan Hao Ji Tian Yi Wang Xinzhong Zhang Xuefeng Xu Zhenhai Han Ting Wu 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第1期25-37,共13页
Thousands of long-distance mobile mRNAs were identified from different grafting systems,based on high-throughput sequencing technology.Moreover,the long-distance delivery of RNAs was proved to involve multiple mechani... Thousands of long-distance mobile mRNAs were identified from different grafting systems,based on high-throughput sequencing technology.Moreover,the long-distance delivery of RNAs was proved to involve multiple mechanisms.Here,we analyzed the homology,motif,and tRNA-like structure(TLS)of long-distance mobile mRNAs identified by RNA-seq as well as the RNA-binding protein(RBP)in nine grafting combinations including Arabidopsis thaliana,Vitis vinifera,Cucumis sativus,Citrullus lanatus,Nicotiana benthamiana,Malus domestica,Pyrus spp.,Glycine max and Phaseolus vulgaris.Although several mRNAs were found to be shared in herbaceous,woody,and related species,the vast majority of long-distance mobile mRNAs were species-specific.Four non-specific movement-related motifs were identified,while the TLS was not necessary for mRNA long distance mobility.In addition,we found that RBPs were conserved among herbaceous and woody plants as well as related species.This paper reports a further in-depth analysis of the endogenous mechanisms by which the species-specific transportable m RNAs were selected by bioinformatics,in order to provide insights for future research on long-distance mobile mRNAs. 展开更多
关键词 Grafting combination Long-distance mobile mRNA TLS RNA binding proteins
下载PDF
Deep Reinforcement Learning-Based Task Offloading and Service Migrating Policies in Service Caching-Assisted Mobile Edge Computing
20
作者 Ke Hongchang Wang Hui +1 位作者 Sun Hongbin Halvin Yang 《China Communications》 SCIE CSCD 2024年第4期88-103,共16页
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.... Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms. 展开更多
关键词 deep reinforcement learning mobile edge computing service caching service migrating
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部