期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Advancement in Science and Technology Enhanced the Growth of China's Electric Power Industry
1
《Electricity》 1996年第2期19-22,共4页
Within the seven years’ period from 1987 to 1994. the total installed capacity of China’s electric power industry doubled from 100 GW to 200 GW. This high rate of growth has imposed new and more stringent requiremen... Within the seven years’ period from 1987 to 1994. the total installed capacity of China’s electric power industry doubled from 100 GW to 200 GW. This high rate of growth has imposed new and more stringent requirements on all the branches in the 展开更多
关键词 In Advancement in Science and technology enhanced the Growth of China’s Electric Power Industry THAN
下载PDF
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
2
作者 Siddharth M. Madikeri Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期378-395,共18页
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin... Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices. 展开更多
关键词 Privacy Enhancing technology (PET) Personally Identifiable Information (PII) OpenWPM Web Privacy
下载PDF
Biological Permeability Enhancement Technology for Coal Reservoir 被引量:1
3
作者 GUO Hongyu LIU Xile +2 位作者 XIA Daping BAI Yang FU Chaoyong 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第5期1938-1939,共2页
Objective Despite the adoption of various permeability enhancement technologies,the low permeability of coal reservoir has not been fundamentally improved for the development of coalbed methane(CBM)on the ground or ... Objective Despite the adoption of various permeability enhancement technologies,the low permeability of coal reservoir has not been fundamentally improved for the development of coalbed methane(CBM)on the ground or the control of gas underground. 展开更多
关键词 Biological Permeability Enhancement technology for Coal Reservoir
下载PDF
Quest for the best endoscopic imaging modality for computer-assisted colonic polyp staging 被引量:2
4
作者 Georg Wimmer Michael Gadermayr +8 位作者 Gernot Wolkersdorfer Roland Kwitt Toru Tamaki Jens Tischendorf Michael Hafner Shigeto Yoshida Shinji Tanaka Dorit Merhof Andreas Uhl 《World Journal of Gastroenterology》 SCIE CAS 2019年第10期1197-1209,共13页
BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI... BACKGROUND It was shown in previous studies that high definition endoscopy, high magnification endoscopy and image enhancement technologies, such as chromoendoscopy and digital chromoendoscopy [narrow-band imaging(NBI), iScan] facilitate the detection and classification of colonic polyps during endoscopic sessions. However, there are no comprehensive studies so far that analyze which endoscopic imaging modalities facilitate the automated classification of colonic polyps. In this work, we investigate the impact of endoscopic imaging modalities on the results of computer-assisted diagnosis systems for colonic polyp staging.AIM To assess which endoscopic imaging modalities are best suited for the computerassisted staging of colonic polyps.METHODS In our experiments, we apply twelve state-of-the-art feature extraction methods for the classification of colonic polyps to five endoscopic image databases of colonic lesions. For this purpose, we employ a specifically designed experimental setup to avoid biases in the outcomes caused by differing numbers of images per image database. The image databases were obtained using different imaging modalities. Two databases were obtained by high-definition endoscopy in combination with i-Scan technology(one with chromoendoscopy and one without chromoendoscopy). Three databases were obtained by highmagnification endoscopy(two databases using narrow band imaging and one using chromoendoscopy). The lesions are categorized into non-neoplastic and neoplastic according to the histological diagnosis.RESULTS Generally, it is feature-dependent which imaging modalities achieve high results and which do not. For the high-definition image databases, we achieved overall classification rates of up to 79.2% with chromoendoscopy and 88.9% without chromoendoscopy. In the case of the database obtained by high-magnification chromoendoscopy, the classification rates were up to 81.4%. For the combination of high-magnification endoscopy with NBI, results of up to 97.4% for one database and up to 84% for the other were achieved. Non-neoplastic lesions were classified more accurately in general than non-neoplastic lesions. It was shown that the image recording conditions highly affect the performance of automated diagnosis systems and partly contribute to a stronger effect on the staging results than the used imaging modality.CONCLUSION Chromoendoscopy has a negative impact on the results of the methods. NBI is better suited than chromoendoscopy. High-definition and high-magnification endoscopy are equally suited. 展开更多
关键词 ENDOSCOPY Colonic polyps Automated diagnosis system Narrow-band imaging CHROMOENDOSCOPY Imaging modalities Image enhancement technologies
下载PDF
Numerical Simulation Study on the Effect of Horizontal Well Reservoir Stimulation for Gas Hydrate Production 被引量:1
5
作者 LI Xiaoyang TIAN Yingying +5 位作者 ZHANG Xin SONG Gang ZHAO Ming LIANG Jinqiang HUANG Wei MENG Fanle 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2022年第2期701-712,共12页
A new gas hydrate reservoir stimulation method of in-situ fracturing with transient heating is proposed, in line with analysis of the technological bottlenecks faced by marine gas hydrate production. This method injec... A new gas hydrate reservoir stimulation method of in-situ fracturing with transient heating is proposed, in line with analysis of the technological bottlenecks faced by marine gas hydrate production. This method injects the developed chemical reagents into a hydrate reservoir through hydraulic fracturing, releasing heat during the chemical reaction to increase the hydrate decomposition rate. The chemical reaction product furthermore has a honeycomb structure to support fractures and increase reservoir permeability. Based on the geological model of natural gas hydrate in the South China Sea, three development methods are simulated to evaluate hydrate production capacity, consisting of horizontal well, fractured horizontal well and in-situ fracturing with transient heating well. Compared with the horizontal well, the simulation results show that the cumulative gas production of the fractured horizontal well in one year is 7 times that of the horizontal well, while the cumulative gas production of in-situ fracturing with transient heating well is 12 times that of the horizontal well, which significantly improves daily efficiency and cumulative gas production. In addition, the variation patterns of hydrate saturation and temperature-pressure fields with production time for the three exploitation plans are presented, it being found that three sensitive parameters of fracture conductivity, fracture half-length and fracture number are positively correlated with hydrate production enhancement. Through the simulations, basic data and theoretical support for the optimization of gas hydrate reservoir stimulation scheme has been provided. 展开更多
关键词 natural gas hydrate horizontal well reservoir stimulation transient heating seepage channel hydraulic fracturing production enhancement technology
下载PDF
Private membership test protocol with low communication complexity
6
作者 Sara Ramezanian Tommi Meskanen +2 位作者 Masoud Naderpour Ville Junnil Valtteri Niemi 《Digital Communications and Networks》 SCIE 2020年第3期321-332,共12页
We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After e... We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol. 展开更多
关键词 Privacy enhancing technologies Applied cryptography Private information retrieval Private membership test Homomorphic encryption
下载PDF
科技辅助第二语言教学研究趋势及其对国际中文教育的启示
7
作者 李守纪 《国际中文教育(中英文)》 2021年第2期91-110,共20页
In recent years,the enabling role of technology has been widely recognized in second language teaching and learning.Using a co-word analysis approach,this study aims to present the state-ofthe-art current literature i... In recent years,the enabling role of technology has been widely recognized in second language teaching and learning.Using a co-word analysis approach,this study aims to present the state-ofthe-art current literature in technology enhanced language learning.The analysis results show that most popular research themes from 2010 to 2020 are CMC,L2 writing,teacher education,L2 motivation,students’attitudes,SLA,L2 vocabulary learning,L2 reading,EFL,and L2 learners.Compared with these key themes,publications on technology enhanced teaching Chinese as a foreign language focus more on the investigation of the effectiveness of the use of latest technologies such as smart phones,virtual reality,intelligent tools,and gamification.Based on the findings of these investigations,the latest developments in these areas are synthesized and presented accordingly.In addition,newly-emerged key themes about the co-word analysis are also reported and their contributions to future investigations is briefly discussed.The implications for future research in technology enhanced teaching Chinese as a foreign language is also discussed. 展开更多
关键词 co-word analysis second language learning technology enhanced language learning Teaching Chinese as a Second/Foreign Language(TCSL/TCFL)
下载PDF
Efficient Privacy Enhanced Software Registration with ID-Based Blind Signatures 被引量:1
8
作者 CHEN Wuping QIN Bo +1 位作者 WU Qianhong ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期733-738,共6页
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce una... In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications. 展开更多
关键词 information security privacy enhanced technology software registration ID-based cryptography blind signature
原文传递
Developments and challenges in human performance enhancement technology
9
作者 Shuyu Shao Jintao Wu Qianxiang Zhou 《Medicine in Novel Technology and Devices》 2021年第4期1-7,共7页
As emerging technologies have advanced,some countries have issued reports on human performance enhancement efforts in recent years.Human performance enhancement is a prominent theme in the military field.As a type of ... As emerging technologies have advanced,some countries have issued reports on human performance enhancement efforts in recent years.Human performance enhancement is a prominent theme in the military field.As a type of potentially disruptive technology,human performance enhancement technology(HPET)is of vital importance in promoting military combat effectiveness,developing national defense science and technology,and transforming military medicine.This paper analyzes the current development status of critical HPETs,examines challenges facing such development,and points out existing problems in the field.Finally,future development directions of HPET are suggested.We hope this review will be of interest to scientists and engineers,who should carefully develop this technology to maximize human potential and focus on our social security. 展开更多
关键词 Human performance enhancement technology Cognitive enhancement Perceptive enhancement Physical enhancement
原文传递
Privacy and security federated reference architecture for Internet of Things 被引量:2
10
作者 Musab KAMAL Imran RASHID +3 位作者 Waseem IQBAL Muhammad Haroon SIDDIQUI Sohaib KHAN Ijaz AHMAD 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第4期481-508,共28页
Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care syst... Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care systems,wearables,connected vehicles,and industries.This has given rise to risks associated with the privacy and security of systems.Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture.To counter these issues,we need to implement privacy and security right from the building blocks of IoT.The IoT architecture has evolved over the years,improving the stack of architecture with new solutions such as scalability,management,interoperability,and extensibility.This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns.In this study,we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards.We propose an architecture,the privacy-federated IoT security reference architecture(PF-IoT-SRA),which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment.It is a step toward the standardization of the domain architecture.We effectively validate our proposed reference architecture using the architecture trade-off analysis method(ATAM),an industry-recognized scenario-based approach. 展开更多
关键词 Architecturally significant requirement(ASR) Architecture trade-off analysis method(ATAM) Internet architecture board Internet of Things(IoT) Privacy enhancing technologies Privacy validation chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部