Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech dat...Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval requirements.This study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of retrieval.The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original speech.In addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted speech.External B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time retrieval.The experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing methods.The retrieval efficiency is greatly improved.Compared to the method of using hash index tables,and the speech data’s security is effectively guaranteed.展开更多
Roadside trees are effective natural solutions for mitigating climate change. Despite the usefulness of trees to carbon sequestration, there is a dearth of information on the estimation of biomass and carbon stock for...Roadside trees are effective natural solutions for mitigating climate change. Despite the usefulness of trees to carbon sequestration, there is a dearth of information on the estimation of biomass and carbon stock for roadside trees in the study area. This study aimed to estimate the carbon stock and carbon dioxide equivalent of roadside trees. A complete enumeration of trees was carried out in Kétou, Pobè and Sakété within the communes of the Plateau Department, Bénin Republic. Total height and diameter at breast height were measured from trees along the roads while individual wood density value was obtained from wood density database. The allometric method of biomass estimation was adopted for the research. The results showed that the total estimations for above-ground biomass, carbon stock and carbon equivalent from all the enumerated roadside trees were 154.53 mt, 72.63 mt and 266.55 mt, respectively. The results imply that the roadside trees contain a substantial amount of carbon stock that can contribute to climate change mitigation through carbon sequestration.展开更多
Antarctic sea ice is an important part of the Earth’s atmospheric system,and satellite remote sensing is an important technology for observing Antarctic sea ice.Whether Chinese Haiyang-2B(HY-2B)satellite altimeter da...Antarctic sea ice is an important part of the Earth’s atmospheric system,and satellite remote sensing is an important technology for observing Antarctic sea ice.Whether Chinese Haiyang-2B(HY-2B)satellite altimeter data could be used to estimate sea ice freeboard and provide alternative Antarctic sea ice thickness information with a high precision and long time series,as other radar altimetry satellites can,needs further investigation.This paper proposed an algorithm to discriminate leads and then retrieve sea ice freeboard and thickness from HY-2B radar altimeter data.We first collected the Moderate-resolution Imaging Spectroradiometer ice surface temperature(IST)product from the National Aeronautics and Space Administration to extract leads from the Antarctic waters and verified their accuracy through Sentinel-1 Synthetic Aperture Radar images.Second,a surface classification decision tree was generated for HY-2B satellite altimeter measurements of the Antarctic waters to extract leads and calculate local sea surface heights.We then estimated the Antarctic sea ice freeboard and thickness based on local sea surface heights and the static equilibrium equation.Finally,the retrieved HY-2B Antarctic sea ice thickness was compared with the CryoSat-2 sea ice thickness and the Antarctic Sea Ice Processes and Climate(ASPeCt)ship-based observed sea ice thickness.The results indicate that our classification decision tree constructed for HY-2B satellite altimeter measurements was reasonable,and the root mean square error of the obtained sea ice thickness compared to the ship measurements was 0.62 m.The proposed sea ice thickness algorithm for the HY-2B radar satellite fills a gap in this application domain for the HY-series satellites and can be a complement to existing Antarctic sea ice thickness products;this algorithm could provide long-time-series and large-scale sea ice thickness data that contribute to research on global climate change.展开更多
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ...Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.展开更多
The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certifi...The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.展开更多
Due to their special phylogenetic position in the Euarchontoglires and close affinity to primates,tree shrews have been proposed as an alternative experimental animal to primates in biomedical research.However,the pop...Due to their special phylogenetic position in the Euarchontoglires and close affinity to primates,tree shrews have been proposed as an alternative experimental animal to primates in biomedical research.However,the population genetic structure of tree shrews has largely remained unknown and this has hindered the development of tree shrew breeding and selection.Here we sampled 80 Chinese tree shrews(Tupaia belangeri chinensis) in Kunming,China,and analyzed partial mtDNA control region sequence variation.Based on our samples and two published sequences from northern tree shrews(T.belangeri),we identified 29 substitutions in the mtDNA control region fragment(~ 604 bp) across 82 individuals and defined 13 haplotypes.Seventeen samples were selected for sequencing of the cytochrome b(Cyt b;1134 bp) gene based on control region sequence variation and were analyzed in combination with 34 published sequences to solidify the phylogenetic pattern obtained from control region data.Overall,tree shrews from Kunming have high genetic diversity and present a remarkable long genetic distance to the two reported northern tree shrews outside China.Our results provide some caution when using tree shrews to establish animal models because of this apparent genetic difference.In addition,the high genetic diversity of Chinese tree shrews inhabiting Kunming suggests that systematic genetic investigations should be conducted before establishing an inbred strain for medical and biological research.展开更多
在Cross-Product算法的基础上,结合哈希树(HashTree)数据结构,综合二者的优点,提出了一种新的IP分类算法CPHTIT(Cross-Product and HashTree with index table)。仿真结果表明CPHTIT在时间和空间上都达到了高速IP分类的要求,与现有经典...在Cross-Product算法的基础上,结合哈希树(HashTree)数据结构,综合二者的优点,提出了一种新的IP分类算法CPHTIT(Cross-Product and HashTree with index table)。仿真结果表明CPHTIT在时间和空间上都达到了高速IP分类的要求,与现有经典算法Grid of Tries和Modular比较,其综合性能有所改进。展开更多
基金supported by the NationalNatural Science Foundation of China(No.61862041).
文摘Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval requirements.This study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of retrieval.The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original speech.In addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted speech.External B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time retrieval.The experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing methods.The retrieval efficiency is greatly improved.Compared to the method of using hash index tables,and the speech data’s security is effectively guaranteed.
文摘Roadside trees are effective natural solutions for mitigating climate change. Despite the usefulness of trees to carbon sequestration, there is a dearth of information on the estimation of biomass and carbon stock for roadside trees in the study area. This study aimed to estimate the carbon stock and carbon dioxide equivalent of roadside trees. A complete enumeration of trees was carried out in Kétou, Pobè and Sakété within the communes of the Plateau Department, Bénin Republic. Total height and diameter at breast height were measured from trees along the roads while individual wood density value was obtained from wood density database. The allometric method of biomass estimation was adopted for the research. The results showed that the total estimations for above-ground biomass, carbon stock and carbon equivalent from all the enumerated roadside trees were 154.53 mt, 72.63 mt and 266.55 mt, respectively. The results imply that the roadside trees contain a substantial amount of carbon stock that can contribute to climate change mitigation through carbon sequestration.
基金The National Natural Science Foundation of China under contract No.42076235.
文摘Antarctic sea ice is an important part of the Earth’s atmospheric system,and satellite remote sensing is an important technology for observing Antarctic sea ice.Whether Chinese Haiyang-2B(HY-2B)satellite altimeter data could be used to estimate sea ice freeboard and provide alternative Antarctic sea ice thickness information with a high precision and long time series,as other radar altimetry satellites can,needs further investigation.This paper proposed an algorithm to discriminate leads and then retrieve sea ice freeboard and thickness from HY-2B radar altimeter data.We first collected the Moderate-resolution Imaging Spectroradiometer ice surface temperature(IST)product from the National Aeronautics and Space Administration to extract leads from the Antarctic waters and verified their accuracy through Sentinel-1 Synthetic Aperture Radar images.Second,a surface classification decision tree was generated for HY-2B satellite altimeter measurements of the Antarctic waters to extract leads and calculate local sea surface heights.We then estimated the Antarctic sea ice freeboard and thickness based on local sea surface heights and the static equilibrium equation.Finally,the retrieved HY-2B Antarctic sea ice thickness was compared with the CryoSat-2 sea ice thickness and the Antarctic Sea Ice Processes and Climate(ASPeCt)ship-based observed sea ice thickness.The results indicate that our classification decision tree constructed for HY-2B satellite altimeter measurements was reasonable,and the root mean square error of the obtained sea ice thickness compared to the ship measurements was 0.62 m.The proposed sea ice thickness algorithm for the HY-2B radar satellite fills a gap in this application domain for the HY-series satellites and can be a complement to existing Antarctic sea ice thickness products;this algorithm could provide long-time-series and large-scale sea ice thickness data that contribute to research on global climate change.
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme FRGS/1/2020/ICT03/UKM/02/6 and GGPM-2020-028 funded this research.
文摘Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.
基金supported by the National Natural Science Foundation of China(No.6127249261572521)+1 种基金Natural Science Foundation of Shaanxi Provence(No.2013JM8012)Fundamental Research Project of CAPF(No.WJY201520)
文摘The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.
基金supported by grants from Yunnan Province (2009CI119)the Chinese Academy of Sciences (KSCX2-EW-R-11 and KSCX2-EW-J-23)the Key Laboratory of Animal Models and Human Disease Mechanisms of the Chinese Academy of Sciences & Yunnan Province
文摘Due to their special phylogenetic position in the Euarchontoglires and close affinity to primates,tree shrews have been proposed as an alternative experimental animal to primates in biomedical research.However,the population genetic structure of tree shrews has largely remained unknown and this has hindered the development of tree shrew breeding and selection.Here we sampled 80 Chinese tree shrews(Tupaia belangeri chinensis) in Kunming,China,and analyzed partial mtDNA control region sequence variation.Based on our samples and two published sequences from northern tree shrews(T.belangeri),we identified 29 substitutions in the mtDNA control region fragment(~ 604 bp) across 82 individuals and defined 13 haplotypes.Seventeen samples were selected for sequencing of the cytochrome b(Cyt b;1134 bp) gene based on control region sequence variation and were analyzed in combination with 34 published sequences to solidify the phylogenetic pattern obtained from control region data.Overall,tree shrews from Kunming have high genetic diversity and present a remarkable long genetic distance to the two reported northern tree shrews outside China.Our results provide some caution when using tree shrews to establish animal models because of this apparent genetic difference.In addition,the high genetic diversity of Chinese tree shrews inhabiting Kunming suggests that systematic genetic investigations should be conducted before establishing an inbred strain for medical and biological research.
文摘在Cross-Product算法的基础上,结合哈希树(HashTree)数据结构,综合二者的优点,提出了一种新的IP分类算法CPHTIT(Cross-Product and HashTree with index table)。仿真结果表明CPHTIT在时间和空间上都达到了高速IP分类的要求,与现有经典算法Grid of Tries和Modular比较,其综合性能有所改进。