期刊文献+
共找到18,335篇文章
< 1 2 250 >
每页显示 20 50 100
Geographical origin identification of winter jujube(Ziziphus jujuba Dongzao')by using multi-element fingerprinting with chemometrics
1
作者 Xiabing Kong Qiusheng Chen +8 位作者 Min Xu Yihui Liu Xiaoming Li Lingxi Han Qiang Zhang Haoliang Wan Lu Liu Xubo Zhao Jiyun Nie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第5期1749-1762,共14页
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16... Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits. 展开更多
关键词 winter jujube multi-element fingerprint analysis CHEMOMETRICS origin traceability
下载PDF
An Image Fingerprint and Attention Mechanism Based Load Estimation Algorithm for Electric Power System
2
作者 Qing Zhu Linlin Gu Huijie Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期577-591,共15页
With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-base... With the rapid development of electric power systems,load estimation plays an important role in system operation and planning.Usually,load estimation techniques contain traditional,time series,regression analysis-based,and machine learning-based estimation.Since the machine learning-based method can lead to better performance,in this paper,a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed.First,an image fingerprint construction is proposed for training data.After the data preprocessing,the training data matrix is constructed by the cyclic shift and cubic spline interpolation.Then,the linear mapping and the gray-color transformation method are proposed to form the color image fingerprint.Second,a convolutional neural network(CNN)combined with an attentionmechanism is proposed for training performance improvement.At last,an experiment is carried out to evaluate the estimation performance.Compared with the support vector machine method,CNN method and long short-term memory method,the proposed algorithm has the best load estimation performance. 展开更多
关键词 Load estimation deep learning attention mechanism image fingerprint construction
下载PDF
A UWB/IMU-Assisted Fingerprinting Localization Framework with Low Human Efforts
3
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第6期40-52,共13页
With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication... With the rapid development of smart phone,the location-based services(LBS)have received great attention in the past decades.Owing to the widespread use of WiFi and Bluetooth devices,Received Signal Strength Indication(RSSI)fingerprintbased localization method has obtained much development in both academia and industries.In this work,we introduce an efficient way to reduce the labor-intensive site survey process,which uses an UWB/IMU-assisted fingerprint construction(UAFC)and localization framework based on the principle of Automatic radio map generation scheme(ARMGS)is proposed to replace the traditional manual measurement.To be specific,UWB devices are employed to estimate the coordinates when the collector is moved in a reference point(RP).An anchor self-localization method is investigated to further reduce manual measurement work in a wide and complex environment,which is also a grueling,time-consuming process that is lead to artificial errors.Moreover,the measurements of IMU are incorporated into the UWB localization algorithm and improve the label accuracy in fingerprint.In addition,the weighted k-nearest neighbor(WKNN)algorithm is applied to online localization phase.Finally,filed experiments are carried out and the results confirm the effectiveness of the proposed approach. 展开更多
关键词 indoor localization machine learning ultra wideband WiFi fingerprint
下载PDF
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
4
作者 Di Wang Yuefei Zhu +1 位作者 Jinlong Fei Maohua Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2253-2276,共24页
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de... Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent. 展开更多
关键词 Traffic analysis deep neural network adversarial sample TOR website fingerprinting
下载PDF
BLS-identification:A device fingerprint classification mechanism based on broad learning for Internet of Things
5
作者 Yu Zhang Bei Gong Qian Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第3期728-739,共12页
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin... The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods. 展开更多
关键词 Device fingerprint Traffic analysis Class imbalance Broad learning system Access authentication
下载PDF
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
6
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Analysis of GC×GC fingerprints from medicinal materials using a novel contour detection algorithm:A case of Curcuma wenyujin
7
作者 Xinyue Yang Yingyu Sima +2 位作者 Xuhuai Luo Yaping Li Min He 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第4期542-551,共10页
This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).... This study introduces an innovative contour detection algorithm,PeakCET,designed for rapid and efficient analysis of natural product image fingerprints using comprehensive two-dimensional gas chromatogram(GC×GC).This method innovatively combines contour edge tracking with affinity propagation(AP)clustering for peak detection in GC×GC fingerprints,the first in this field.Contour edge tracking signif-icantly reduces false positives caused by“burr”signals,while AP clustering enhances detection accuracy in the face of false negatives.The efficacy of this approach is demonstrated using three medicinal products derived from Curcuma wenyujin.PeakCET not only performs contour detection but also employs inter-group peak matching and peak-volume percentage calculations to assess the compositional similarities and differences among various samples.Furthermore,this algorithm compares the GC×GC fingerprints of Radix/Rhizoma Curcumae Wenyujin with those of products from different botanical origins.The findings reveal that genetic and geographical factors influence the accumulation of secondary metabolites in various plant tissues.Each sample exhibits unique characteristic components alongside common ones,and vari-ations in content may influence their therapeutic effectiveness.This research establishes a foundational data-set for the quality assessment of Curcuma products and paves the way for the application of computer vision techniques in two-dimensional(2D)fingerprint analysis of GC×GC data. 展开更多
关键词 GC×GC Image fingerprints Contour detection Clustering of mass spectra Curcuma products
下载PDF
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
8
作者 Kumardwij Bhatnagar Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期474-486,共13页
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma... This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats. 展开更多
关键词 Certis SSL Certificate Parsing JARM fingerprinting Anomaly Detection Proactive Defense
下载PDF
AWeb Application Fingerprint Recognition Method Based on Machine Learning
9
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 Web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
Fingerprint Study of Polygonati Rhizoma with Steaming and Exposing to the Sun Alternatively for Different Times
10
作者 Min WANG Chenying YE +3 位作者 Qian WANG Ting HE Shenggao YIN Gailian ZHOU 《Medicinal Plant》 2024年第2期18-20,共3页
[Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with diffe... [Objectives]To explore the influence of different times of steaming and exposing to the sun on the fingerprint of Polygonati Rhizoma by studying the HPLC fingerprint of Polygonati Rhizoma processed products with different times of steaming and exposing to the sun,and to provide a basis for the determination of the best processing technology of Polygonati Rhizoma.[Methods]SETSAIL II AQ-C 18(5μm×250 mm×4.6 mm)was used as the column,the column temperature was 30℃,pure water(A)and acetonitrile(B)were eluted gradually,0-10 min,B(5%-10%),10-30 min,B(10%-35%),30-40 min,B(35%-60%),40-45 min,B(60%-100%),flow rate 1 mL/min,absorption wavelength 200 nm.[Results]The relative retained peak area RSDs of the common peaks in the precision,reproducibility and stability tests were all less than 5%.There were 17 common peaks in the fingerprint of nine batches of samples,and the retention time of Peak 2 was basically the same as that of the reference peak of 5-HMF.Peak 4 mainly existed in the chromatogram of Sample 3 to Sample 5,peaks 5 and 11 mainly existed after Sample 3,peaks 9,14 and 16 mainly existed after Sample 6,and peaks 12 and 17 mainly existed after Sample 4.[Conclusions]A total of 17 common peaks were obtained,and the Peak 2 was the designated peak,and the chemical components of each processed product were different. 展开更多
关键词 Polygonati Rhizoma PROCESSING HPLC fingerprint
下载PDF
UV,five wavelengths fusion and electrochemical fingerprints combined with antioxidant activity for quality control of antiviral mixture
11
作者 Kaining Zhou Zini Tang +2 位作者 Guoxiang Sun Ping Guo Lili Lan 《Asian Journal of Traditional Medicines》 2024年第3期119-136,151,共19页
Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this ... Aiming to ensure the consistency of quality control of Traditional Chinese Medicines(TCMs),a combination method of high-performance liquid chromatography(HPLC),ultraviolet(UV),electrochemical(EC)was developed in this study to comprehensively evaluate the quality of Antiviral Mixture(AM),and Comprehensive Linear Quantification Fingerprint Method(CLQFM)was used to process the data.Quantitative analysis of three active substances in TCM was conducted.A fivewavelength fusion fingerprint(FWFF)was developed,using second-order derivatives of UV spectral data to differentiate sample levels effectively.The combination of HPLC and UV spectrophotometry,along with electrochemical fingerprinting(ECFP),successfully evaluated total active substances.Ultimately,a multidimensional profiling analytical system for TCM was developed. 展开更多
关键词 TCM antiviral mixture five-wavelength fusion fingerprint(FWFF) Comprehensive Linear Quantification fingerprint Method(CLQFM) quantization fingerprint antioxidant activity profilling
下载PDF
Rational and Continuous Measurement of Emotional-Fingerprint, Emotional-Quotient and Categorical vs Proportional Recognition of Facial Emotions with M.A.R.I.E., Second Half
12
作者 Philippe Granato Shreekumar Vinekar +1 位作者 Jean-Pierre Van Gansberghe Raymond Bruyer 《Open Journal of Psychiatry》 2024年第4期400-450,共51页
Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the i... Context: The advent of Artificial Intelligence (AI) requires modeling prior to its implementation in algorithms for most human skills. This observation requires us to have a detailed and precise understanding of the interfaces of verbal and emotional communications. The progress of AI is significant on the verbal level but modest in terms of the recognition of facial emotions even if this functionality is one of the oldest in humans and is omnipresent in our daily lives. Dysfunction in the ability for facial emotional expressions is present in many brain pathologies encountered by psychiatrists, neurologists, psychotherapists, mental health professionals including social workers. It cannot be objectively verified and measured due to a lack of reliable tools that are valid and consistently sensitive. Indeed, the articles in the scientific literature dealing with Visual-Facial-Emotions-Recognition (ViFaEmRe), suffer from the absence of 1) consensual and rational tools for continuous quantified measurement, 2) operational concepts. We have invented a software that can use computer-morphing attempting to respond to these two obstacles. It is identified as the Method of Analysis and Research of the Integration of Emotions (M.A.R.I.E.). Our primary goal is to use M.A.R.I.E. to understand the physiology of ViFaEmRe in normal healthy subjects by standardizing the measurements. Then, it will allow us to focus on subjects manifesting abnormalities in this ability. Our second goal is to make our contribution to the progress of AI hoping to add the dimension of recognition of facial emotional expressions. Objective: To study: 1) categorical vs dimensional aspects of recognition of ViFaEmRe, 2) universality vs idiosyncrasy, 3) immediate vs ambivalent Emotional-Decision-Making, 4) the Emotional-Fingerprint of a face and 5) creation of population references data. Methods: M.A.R.I.E. enables the rational, quantified measurement of Emotional Visual Acuity (EVA) in an individual observer and a population aged 20 to 70 years. Meanwhile, it can measure the range and intensity of expressed emotions through three Face- Tests, quantify the performance of a sample of 204 observers with hypernormal measures of cognition, “thymia” (defined elsewhere), and low levels of anxiety, and perform analysis of the six primary emotions. Results: We have individualized the following continuous parameters: 1) “Emotional-Visual- Acuity”, 2) “Visual-Emotional-Feeling”, 3) “Emotional-Quotient”, 4) “Emotional-Decision-Making”, 5) “Emotional-Decision-Making Graph” or “Individual-Gun-Trigger”, 6) “Emotional-Fingerprint” or “Key-graph”, 7) “Emotional-Fingerprint-Graph”, 8) detecting “misunderstanding” and 9) detecting “error”. This allowed us a taxonomy with coding of the face-emotion pair. Each face has specific measurements and graphics. The EVA improves from ages of 20 to 55 years, then decreases. It does not depend on the sex of the observer, nor the face studied. In addition, 1% of people endowed with normal intelligence do not recognize emotions. The categorical dimension is a variable for everyone. The range and intensity of ViFaEmRe is idiosyncratic and not universally uniform. The recognition of emotions is purely categorical for a single individual. It is dimensional for a population sample. Conclusions: Firstly, M.A.R.I.E. has made possible to bring out new concepts and new continuous measurements variables. The comparison between healthy and abnormal individuals makes it possible to take into consideration the significance of this line of study. From now on, these new functional parameters will allow us to identify and name “emotional” disorders or illnesses which can give additional dimension to behavioral disorders in all pathologies that affect the brain. Secondly, the ViFaEmRe is idiosyncratic, categorical, and a function of the identity of the observer and of the observed face. These findings stack up against Artificial Intelligence, which cannot have a globalist or regionalist algorithm that can be programmed into a robot, nor can AI compete with human abilities and judgment in this domain. *Here “Emotional disorders” refers to disorders of emotional expressions and recognition. 展开更多
关键词 M.A.R.I.E. Universality Idiosyncrasy Measurement of Emotional Quotient Emotional fingerprint Emotional Decision-Making Limbic Lobe
下载PDF
The significance of metabolic fingerprinting in carcinogenesis
13
作者 Ayodele Ademola Adelakun Princess Adekunbi Owokalade 《Cancer Advances》 2024年第1期1-6,共6页
Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)w... Carcinogenesis describes the process through which normal cells transform into malignant cells(cancer).There were an estimated 18.1 million new cases of cancer(all cancers combined excluding non-melanoma skin cancer)worldwide in 2020:8.8 million(48%)in females and 9.3 million(52%)in males,giving a male:female ratio of 10:9.5.It may be initiated by the action of biological,physical,or chemical agents that cause a non-lethal,permanent,DNA error on the cell with a consequence of altered cell metabolism.This altered cell metabolism include the Warburg effect,altered lipid and amino acid metabolism and production of various metabolites.It also results in unique metabolic dependencies that,in some cases,can be targeted with precision medicine and nutrition,including drugs that selectively target metabolic enzymes.Metabolic fingerprinting has been applied to the study of carcinogenesis and is particularly helpful in early diagnosis,staging and choice of treatment,thus improving health outcomes.This technology could therefore be harnessed effectively while combining with other omics technologies. 展开更多
关键词 CANCER metabolomics PROGNOSIS DIAGNOSIS fingerprint
下载PDF
Rapid metabolic fingerprinting with the aid of chemometric models to identify authenticity of natural medicines: Turmeric, Ocimum, and Withania somnifera study 被引量:1
14
作者 Samreen Khan Abhishek Kumar Rai +8 位作者 Anjali Singh Saudan Singh Basant Kumar Dubey Raj Kishori Lal Arvind Singh Negi Nicholas Birse Prabodh Kumar Trivedi Christopher T.Elliott Ratnasekhar Ch 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2023年第9期1041-1057,共17页
Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessme... Herbal medicines are popular natural medicines that have been used for decades.The use of alternative medicines continues to expand rapidly across the world.The World Health Organization suggests that quality assessment of natural medicines is essential for any therapeutic or health care applications,as their therapeutic potential varies between different geographic origins,plant species,and varieties.Classification of herbal medicines based on a limited number of secondary metabolites is not an ideal approach.Their quality should be considered based on a complete metabolic profile,as their pharmacological activity is not due to a few specific secondary metabolites but rather a larger group of bioactive compounds.A holistic and integrative approach using rapid and nondestructive analytical strategies for the screening of herbal medicines is required for robust characterization.In this study,a rapid and effective quality assessment system for geographical traceability,species,and variety-specific authenticity of the widely used natural medicines turmeric,Ocimum,and Withania somnifera was investigated using Fourier transform near-infrared(FT-NIR)spectroscopy-based metabolic fingerprinting.Four different geographical origins of turmeric,five different Ocimum species,and three different varieties of roots and leaves of Withania somnifera were studied with the aid of machine learning approaches.Extremely good discrimination(R^(2)>0.98,Q^(2)>0.97,and accuracy=1.0)with sensitivity and specificity of 100%was achieved using this metabolic fingerprinting strategy.Our study demonstrated that FT-NIR-based rapid metabolic fingerprinting can be used as a robust analytical method to authenticate several important medicinal herbs. 展开更多
关键词 Rapid metabolic fingerprinting Natural medicines FT-NIR Chemometric models
下载PDF
5G Ultra-Dense Network Fingerprint Positioning Method Based on Matrix Completion 被引量:1
15
作者 Yuexia Zhang Chong Liu 《China Communications》 SCIE CSCD 2023年第3期105-118,共14页
The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome t... The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome the high costs of traditional fingerprint database construction and matching algorithms.First,a partial fingerprint database constructed and the accelerated proximal gradient algorithm is used to fill the partial fingerprint database to construct a full fingerprint database.Second,a fingerprint database division method based on the strongest received signal strength indicator is proposed,which divides the original fingerprint database into several sub-fingerprint databases.Finally,a classification weighted K-nearest neighbor fingerprint matching algorithm is proposed.The estimated coordinates of the point to be located can be obtained by fingerprint matching in a sub-fingerprint database.The simulation results show that the MC-FPL algorithm can reduce the complexity of database construction and fingerprint matching and has higher positioning accuracy compared with the traditional fingerprint algorithm. 展开更多
关键词 indoor positioning fingerprint matching matrix completion 5G UDN RSSI
下载PDF
Radio Frequency Fingerprinting Identification Using Semi-Supervised Learning with Meta Labels 被引量:1
16
作者 Tiantian Zhang Pinyi Ren +1 位作者 Dongyang Xu Zhanyi Ren 《China Communications》 SCIE CSCD 2023年第12期78-95,共18页
Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF ide... Radio frequency fingerprinting(RFF)is a remarkable lightweight authentication scheme to support rapid and scalable identification in the internet of things(IoT)systems.Deep learning(DL)is a critical enabler of RFF identification by leveraging the hardware-level features.However,traditional supervised learning methods require huge labeled training samples.Therefore,how to establish a highperformance supervised learning model with few labels under practical application is still challenging.To address this issue,we in this paper propose a novel RFF semi-supervised learning(RFFSSL)model which can obtain a better performance with few meta labels.Specifically,the proposed RFFSSL model is constituted by a teacher-student network,in which the student network learns from the pseudo label predicted by the teacher.Then,the output of the student model will be exploited to improve the performance of teacher among the labeled data.Furthermore,a comprehensive evaluation on the accuracy is conducted.We derive about 50 GB real long-term evolution(LTE)mobile phone’s raw signal datasets,which is used to evaluate various models.Experimental results demonstrate that the proposed RFFSSL scheme can achieve up to 97%experimental testing accuracy over a noisy environment only with 10%labeled samples when training samples equal to 2700. 展开更多
关键词 meta labels parameters optimization physical-layer security radio frequency fingerprinting semi-supervised learning
下载PDF
HUID:DBN-Based Fingerprint Localization and Tracking System with Hybrid UWB and IMU 被引量:3
17
作者 Junchang Sun Rongyan Gu +4 位作者 Shiyin Li Shuai Ma Hongmei Wang Zongyan Li Weizhou Feng 《China Communications》 SCIE CSCD 2023年第2期139-154,共16页
High-precision localization technology is attracting widespread attention in harsh indoor environments.In this paper,we present a fingerprint localization and tracking system to estimate the locations of the tag based... High-precision localization technology is attracting widespread attention in harsh indoor environments.In this paper,we present a fingerprint localization and tracking system to estimate the locations of the tag based on a deep belief network(DBN).In this system,we propose using coefficients as fingerprints to combine the ultra-wideband(UWB)and inertial measurement unit(IMU)estimation linearly,termed as a HUID system.In particular,the fingerprints are trained by a DBN and estimated by a radial basis function(RBF).However,UWB-based estimation via a trilateral method is severely affected by the non-line-of-sight(NLoS)problem,which limits the localization precision.To tackle this problem,we adopt the random forest classifier to identify line-of-sight(LoS)and NLoS conditions.Then,we adopt the random forest regressor to mitigate ranging errors based on the identification results for improving UWB localization precision.The experimental results show that the mean square error(MSE)of the localization error for the proposed HUID system reduces by 12.96%,50.16%,and 64.92%compared with that of the existing extended Kalman filter(EKF),single UWB,and single IMU estimation methods,respectively. 展开更多
关键词 Ultra-wideband(UWB) inertial measurement unit(IMU) fingerprints positioning NLoS identification estimated errors mitigation deep belief network(DBN) radial basis function(RBF)
下载PDF
Payload Symbol-Based Nonlinear RF Fingerprint for Wireless QPSK-OFDM Devices
18
作者 Honglin Yuan Yan Yan +1 位作者 Guoan Zhang Zhihua Bao 《China Communications》 SCIE CSCD 2023年第6期240-248,共9页
Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the ... Radio Frequency(RF) fingerprinting is one physical-layer authentication method for wireless communication, which uses the unique hardware characteristic of the transmitter to identify its true identity.To improve the performance of RF Fingerprint(RFF)based on preamble with fixed duration, a nonlinear RF fingerprinting method based on payload symbols is proposed for the wireless OFDM communication with the bit mapping scheme of QPSK. The wireless communication system is modeled as a Hammerstein system containing the nonlinear transmitter and multipath fading channel. A parameter separation technique based on orthogonal polynomial is presented for the estimation of the parameters of the Hammerstein system. The Hammerstein system parameter separation technique is firstly used to estimate the linear parameter with the training signal, which is used to compensate the adverse effect of the linear channel for the demodulation of the successive payload symbols. The demodulated payload symbols are further used to estimate the nonlinear coefficients of the transmitter with the Hammerstein system parameter separation technique again, which is used as the novel RFF for the authentication of the QPSK-OFDM device. Numerical simulations have verified the proposed method, which can also be extended to the OFDM signals with other bit mapping schemes. 展开更多
关键词 physical-layer authentication RF fingerprint RF fingerprinting Hammerstein system parameter separation NONLINEARITY RFF spectrum sharing
下载PDF
Robust Fingerprint Construction Based on Multiple Path Loss Model (M-PLM) for Indoor Localization
19
作者 Yun Fen Yong Chee Keong Tan +1 位作者 Ian Kim Teck Tan Su Wei Tan 《Computers, Materials & Continua》 SCIE EI 2023年第1期1801-1818,共18页
A robust radio map is essential in implementing a fingerprint-based indoor positioning system(IPS).However,the offline site survey to manually construct the radio map is time-consuming and labour-intensive.Various int... A robust radio map is essential in implementing a fingerprint-based indoor positioning system(IPS).However,the offline site survey to manually construct the radio map is time-consuming and labour-intensive.Various interpolation techniques have been proposed to infer the virtual fingerprints to reduce the time and effort required for offline site surveys.This paper presents a novel fingerprint interpolator using a multi-path loss model(MPLM)to create the virtual fingerprints from the collected sample data based on different signal paths from different access points(APs).Based on the historical signal data,the poor signal paths are identified using their standard deviations.The proposed method reduces the positioning errors by smoothing out the wireless signal fluctuations and stabilizing the signals for those poor signal paths.By consideringmultipath signal propagations from different APs,the inherent noise from these signal paths can be alleviated.Firstly,locations of the signal data with standard deviations higher than the threshold are identified.The new fingerprints are then generated at these locations based on the proposed M-PLM interpolation function to replace the old fingerprints.The proposed technique interpolates virtual fingerprints based on good signal paths with more stable signals to improve the positioning performance.Experimental results show that the proposed scheme enhances the positioning accuracy by up to 44%compared to the conventional interpolation techniques such as the Inverse DistanceWeighting,Kriging,and single Path LossModel.As a result,we can overcome the site survey problems for IPS by building an accurate radio map with more reliable signals to improve indoor positioning performance. 展开更多
关键词 Path loss model radio map indoor positioning system INTERPOLATION fingerprinting
下载PDF
A Personalized Digital Code from Unique Genome Fingerprinting Pattern for Use in Identification and Application on Blockchain
20
作者 Isaac Kise Lee 《Computational Molecular Bioscience》 CAS 2023年第1期1-20,共20页
With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each ... With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before. 展开更多
关键词 Genomic fingerprint Digital Code SNP’s Auxiliary Code Marker Selection Blockchain WEB3.0 Decentralized Identification (DID)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部