期刊文献+
共找到43,783篇文章
< 1 2 250 >
每页显示 20 50 100
Point Cloud Classification Using Content-Based Transformer via Clustering in Feature Space 被引量:2
1
作者 Yahui Liu Bin Tian +2 位作者 Yisheng Lv Lingxi Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期231-239,共9页
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est... Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT. 展开更多
关键词 content-based Transformer deep learning feature aggregator local attention point cloud classification
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
2
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
下载PDF
Mapping and measuring urban-rural inequalities in accessibility to social infrastructures 被引量:1
3
作者 Chenmeng Guo Weiqi Zhou +1 位作者 Chuanbao Jing Dawa Zhaxi 《Geography and Sustainability》 CSCD 2024年第1期41-51,共11页
Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social inf... Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social infras-tructures in urban areas across various scales,with less attention to rural areas,where inequality can be more severe.Particularly,few have investigated the disparities of accessibility to social infrastructures between urban and rural areas.Here,using the Changsha-Zhuzhou-Xiangtan urban agglomeration,China,as an example,we investigated the inequality of accessibility in both urban and rural areas,and further compared the urban-rural difference.Accessibility was measured by travel time of residents to infrastructures.We selected four types of social infrastructures including supermarkets,bus stops,primary schools,and health care,which were funda-mentally important to both urban and rural residents.We found large disparities in accessibility between urban and rural areas,ranging from 20 min to 2 h.Rural residents had to spend one to two more hours to bus stops than urban residents,and 20 min more to the other three types of infrastructures.Furthermore,accessibility to multiple infrastructures showed greater urban-rural differences.Rural residents in more than half of the towns had no access to any infrastructure within 15 min,while more than 60%of the urban residents could access to all infrastructures within 15 min.Our results revealed quantitative accessibility gap between urban and rural areas and underscored the necessity of social infrastructures planning to address such disparities. 展开更多
关键词 accessIBILITY Social infrastructures Urban-rural difference INEQUALITY Regional sustainability
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
4
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model Internet access rural China
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
5
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
Access数据库技术及其应用研究 被引量:1
6
作者 侯培杰 《信息与电脑》 2024年第3期149-151,共3页
文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于... 文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于Access数据库的实例应用进行分析,展示Access数据库在提高工作效率、优化数据管理和增强决策能力等方面的作用。 展开更多
关键词 access 数据库技术 应用
下载PDF
基于BOPPPS模型和思维导图的Access数据库课程教学设计
7
作者 于惠雯 赵艺洁 《集成电路应用》 2024年第1期82-83,共2页
阐述BOPPPS模式和思维导图开展Access数据库课程教学设计,分析BOPPPS模型和思维导图的特点,探讨Access数据库课程教学设计中的应用,包括课堂引入、课程目标、参与式学习、考试评估。
关键词 思维导图 access数据库 课程设计 BOPPPS模型
下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
8
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite Internet of Things
下载PDF
Which Neighborhoods Have Easier Access to Online Home Delivery Services?A Spatiotemporal Accessibility Analysis in Nanjing,China
9
作者 KONG Yu ZHEN Feng +1 位作者 ZHANG Shanqi SHEN Lizhen 《Chinese Geographical Science》 SCIE CSCD 2024年第4期722-738,共17页
The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about ... The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about the temporal dimension of OHDS accessibility as well as the geographic and socioeconomic differences in the spatiotemporal accessibility of OHDS.This study measures the spatiotemporal accessibility of four types of OHDS,namely leisure,fresh and convenient,medical,and catering services.The geographic and socioeconomic disparities in the spatiotemporal accessibility of these four types of OHDS are then identified using spatial statistical methods and the Kruskal-Wallis test(K-W test).The case study in Nanjing,China,suggests that:1)spatiotemporal accessibility better reflects the temporal variation of OHDS accessibility and avoids overestimation of OHDS accessibility when only considering its spatial dimension.2)The spatiotemporal accessibility of OHDS varies geographically and socioeconomically.Neighborhoods located in the main city or neighborhoods with higher housing prices,higher population density,and higher point of interest(POI)mix have better OHDS spatiotemporal accessibility.Our study contributes to the understanding of OHDS accessibility from a spatiotemporal perspective,and the empirical insights can assist policymakers in creating intervention plans that take into account variations in OHDS spatiotemporal accessibility. 展开更多
关键词 online home delivery services(OHDS) spatiotemporal accessibility neighborhoods accessibility differences Nanjing City China
下载PDF
The Extended Hybrid Carrier-Based Multiple Access Technology for High Mobility Scenarios 被引量:1
10
作者 Ge Song Xiaojie Fang Xuejun Sha 《China Communications》 SCIE CSCD 2024年第1期53-68,共16页
The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communicatio... The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communication.By employing the EHC modulation,a power layered multiplexing framework is realized,which exhibits enhanced interference suppression capability owing to the more uniform energy distribution design.The implementation method and advantage mechanism are explicated respectively for the uplink and downlink,and the performance analysis under varying channel conditions is provided.In addition,considering the connectivity demand,we explore the non-orthogonal multiple access(NOMA)method of the EHC system and develop the EHC sparse code multiple access scheme.The proposed scheme melds the energy spread superiority of EHC with the access capacity of NOMA,facilitating superior support for massive connectivity in high mobility environments.Simulation results have verified the feasibility and advantages of the proposed scheme.Compared with existing HC multiple access schemes,the proposed scheme exhibits robust bit error rate performance and can better guarantee multiple access performance in complex scenarios of nextgeneration communications. 展开更多
关键词 extended hybrid carrier system high mo-Received:Jun.09 2023 Revised:Nov.20 2023 Editor:Yuanwei Liu bility communications multiple access
下载PDF
6G New Multiple Access Technology
11
作者 Yifei Yuan Yongpeng Wu +3 位作者 Lei Wang Zhifeng Yuan Wei Bai Yuanwei Liu 《China Communications》 SCIE CSCD 2024年第1期I0002-I0005,共4页
As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generatio... As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generation(5G)of mobile communications,3GPP conducted preliminary study on non-orthogonal multiple access without reaching the consensus to standardize the technology. 展开更多
关键词 TECHNOLOGY access attracting
下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
12
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
下载PDF
OFDMA-Based Unsourced Random Access in LEO Satellite Internet of Things
13
作者 Jiaqi Fang Gangle Sun +2 位作者 Wenjin Wang Li You Rui Ding 《China Communications》 SCIE CSCD 2024年第1期13-23,共11页
This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform plana... This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform planar array(UPA)is equipped on the satellite.In LEO satellite communications,unavoidable timing and frequency offsets cause phase shifts in the transmitted signals,substantially diminishing the decoding performance of current terrestrial CCS URA receiver.To cope with this issue,we expand the inner codebook with predefined timing and frequency offsets and formulate the inner decoding as a tractable compressed sensing(CS)problem.Additionally,we leverage the inherent sparsity of the UPA-equipped LEO satellite angular domain channels,thereby enabling the outer decoder to support more active devices.Furthermore,the outputs of the outer decoder are used to reduce the search space of the inner decoder,which cuts down the computational complexity and accelerates the convergence of the inner decoding.Simulation results verify the effectiveness of the proposed scheme. 展开更多
关键词 LEO OFDMA SATELLITE unsourced random access UPA
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
14
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
15
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
Scenario Modeling-Aided AP Placement Optimization Method for Indoor Localization and Network Access
16
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第3期37-50,共14页
Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)sig... Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)significantly influences localization accuracy and network access.However,the indoor scenario and network access are not fully considered in previous AP placement optimization methods.This study proposes a practical scenario modelingaided AP placement optimization method for improving localization accuracy and network access.In order to reduce the gap between simulation-based and field measurement-based AP placement optimization methods,we introduce an indoor scenario modeling and Gaussian process-based RSS prediction method.After that,the localization and network access metrics are implemented in the multiple objective particle swarm optimization(MOPSO)solution,Pareto front criterion and virtual repulsion force are applied to determine the optimal AP placement.Finally,field experiments demonstrate the effectiveness of the proposed indoor scenario modeling method and RSS prediction model.A thorough comparison confirms the localization and network access improvement attributed to the proposed anchor placement method. 展开更多
关键词 indoor localization MOPSO network access RSS prediction
下载PDF
Al-modified yolk-shell silica particle-supported NiMo catalysts for ultradeep hydrodesulfurization of dibenzothiophene and 4,6-dimethyldibenzothiophene:Efficient accessibility of active sites and suitable acidity
17
作者 Ke Yu Wei-Min Kong +3 位作者 Zhen Zhao Ai-Jun Duan Lian Kong Xi-Long Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期654-666,共13页
Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proporti... Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proportion)were prepared and dibenzothiophene(DBT)and 4,6-dimethyl-dibenzothiophene(4,6-DMDBT)were employed as the probes to evaluate the hydrodesulfurization(HDS)catalytic performance.The as-prepared AYP-x carriers and corresponding catalysts were characterized by some advanced characterizations to obtain deeper correlations between physicochemical properties and the HDS performance.The average pore sizes of series AYP-x supports are above 6.0 nm,which favors the mass transfer of organic sulfides.The cavity between the yolk and the shell is beneficial for the enrichment of S-containing compounds and the accessibility between reactants and active metals.Aluminum embedded into the silica framework could facilitate the formation of Lewis(L)and Brønsted(B)acid sites and adjust the metal-support interaction(MSI).Among all the as-synthesized catalysts,NiMo/AYP-20 catalyst shows the highest HDS activities.The improved HDS activity of NiMo/AYP-20 catalyst is attributed to the perfect combination of excellent structural properties of the yolk-shell mesoporous silica,enhanced acidity,moderate MSI,and good accessibility/dispersion of active components. 展开更多
关键词 Al-containing yolk-shell silica particles accessIBILITY ACIDITY Metal-support interaction Hydrodesulfurization
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
18
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
The study of lithographic variation in resistive random access memory
19
作者 Yuhang Zhang Guanghui He +2 位作者 Feng Zhang Yongfu Li Guoxing Wang 《Journal of Semiconductors》 EI CAS CSCD 2024年第5期69-79,共11页
Reducing the process variation is a significant concern for resistive random access memory(RRAM).Due to its ultrahigh integration density,RRAM arrays are prone to lithographic variation during the lithography process,... Reducing the process variation is a significant concern for resistive random access memory(RRAM).Due to its ultrahigh integration density,RRAM arrays are prone to lithographic variation during the lithography process,introducing electrical variation among different RRAM devices.In this work,an optical physical verification methodology for the RRAM array is developed,and the effects of different layout parameters on important electrical characteristics are systematically investigated.The results indicate that the RRAM devices can be categorized into three clusters according to their locations and lithography environments.The read resistance is more sensitive to the locations in the array(~30%)than SET/RESET voltage(<10%).The increase in the RRAM device length and the application of the optical proximity correction technique can help to reduce the variation to less than 10%,whereas it reduces RRAM read resistance by 4×,resulting in a higher power and area consumption.As such,we provide design guidelines to minimize the electrical variation of RRAM arrays due to the lithography process. 展开更多
关键词 layout LITHOGRAPHY process variation resistive random access memory
下载PDF
Cluster-Based Massive Access for Massive MIMO Systems
20
作者 Shiyu Liang Wei Chen +2 位作者 Zhongwen Sun Ao Chen Bo Ai 《China Communications》 SCIE CSCD 2024年第1期24-33,共10页
Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multipl... Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multiple input multiple output systems.By exploiting the angular domain characteristics,devices are separated into multiple clusters with a learned cluster-specific dictionary,which enhances the identification of active devices.For detected active devices whose data recovery fails,power domain nonorthogonal multiple access with successive interference cancellation is employed to recover their data via re-transmission.Simulation results show that the proposed scheme and algorithm achieve improved performance on active user detection and data recovery. 展开更多
关键词 compressive sensing dictionary learning multiuser detection random access
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部