期刊文献+
共找到82,551篇文章
< 1 2 250 >
每页显示 20 50 100
Satisfaction of Patients Examined with Mobile X-Ray vs. X-Ray at the Hospital—A Randomized Controlled Trial
1
作者 Maria Dietz Toppenberg Camilla Palmhøj Nielsen Else Marie Skjøde Damsgaard 《Open Journal of Nursing》 2022年第3期244-255,共12页
Background: In the Municipality of Aarhus, Denmark, mobile X-ray is offered to selected patients when a transfer to the Department of Radiology may be an obstacle. To our knowledge, no studies have examined patient’s... Background: In the Municipality of Aarhus, Denmark, mobile X-ray is offered to selected patients when a transfer to the Department of Radiology may be an obstacle. To our knowledge, no studies have examined patient’s satisfaction with mobile X-ray in a randomized controlled trial, but international qualitative and quantitative studies report a high level of patient satisfaction with mobile X-ray. Purpose: The purpose of the study was to investigate whether patients in aged care facilities who were offered mobile X-ray were more satisfied with the X-ray examination compared to patients examined with X-ray at the Department of Radiology, Aarhus University Hospital. Design: A part of a randomized controlled trial. Methods: Satisfaction was measured using a self-developed questionnaire, containing 13 questions measuring satisfaction from different perspectives. Participants: Due to patient’s fragility, healthcare staff members answered questions concerning satisfaction on behalf of the patients, who had been examined with mobile X-ray (n = 66) or X-ray at the hospital (n = 63). The patients were living in nursing homes and homes for the elderly in Aarhus Municipality. Data: Data were collected and stored using the computer program REDCap. Data were statistically analyzed using Fisher’s exact test. Results: Patients examined with mobile X-ray had a significantly higher satisfaction rate than those examined with X-ray at the hospital. Conclusion: Satisfaction of patients examined with X-ray was reported by healthcare staff to be in favor of mobile X-ray. 展开更多
关键词 mobile x-ray Patient Care SATISFACTION QUESTIONNAIRE Patient Perspective
下载PDF
基于MobileNetV3Small-ECA的水稻病害轻量级识别研究 被引量:5
2
作者 袁培森 欧阳柳江 +1 位作者 翟肇裕 田永超 《农业机械学报》 EI CAS CSCD 北大核心 2024年第1期253-262,共10页
为实现水稻病害的轻量化识别与检测,使用ECA注意力机制改进MobileNetV3Small模型,并使用共享参数迁移学习对水稻病害进行智能化轻量级识别和检测。在PlantVillage数据集上进行预训练,将预训练得到的共享参数迁移到对水稻病害识别模型上... 为实现水稻病害的轻量化识别与检测,使用ECA注意力机制改进MobileNetV3Small模型,并使用共享参数迁移学习对水稻病害进行智能化轻量级识别和检测。在PlantVillage数据集上进行预训练,将预训练得到的共享参数迁移到对水稻病害识别模型上微调优化。在开源水稻病害数据集上进行试验测试,试验结果表明,在非迁移学习下,识别准确率达到97.47%,在迁移学习下识别准确率达到99.92%,同时参数量减少26.69%。其次,通过Grad-CAM进行可视化,本文方法与其他注意力机制CBAM和SENET相比,ECA模块生成的结果与图像中病斑的位置和颜色更加一致,表明网络可以更好地聚焦水稻病害的特征,并且通过可视化和各水稻病害分析了误分类原因。本文方法实现了水稻病害识别模型的轻量化,使其能够在移动设备等资源受限的场景中部署,达到快速、高效、便携的目的。同时开发了基于Android的水稻病害识别系统,方便于在边缘端进行水稻病害识别分析。 展开更多
关键词 水稻病害识别 迁移学习 高效通道注意力机制 mobileNetV3Small 移动端部署
下载PDF
Air-Ground Collaborative Mobile Edge Computing:Architecture,Challenges,and Opportunities 被引量:1
3
作者 Qin Zhen He Shoushuai +5 位作者 Wang Hai Qu Yuben Dai Haipeng Xiong Fei Wei Zhenhua Li Hailong 《China Communications》 SCIE CSCD 2024年第5期1-16,共16页
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow... By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC. 展开更多
关键词 air-ground ARCHITECTURE COLLABORATIVE mobile edge computing
下载PDF
Adaptive Trajectory Tracking Control for Nonholonomic Wheeled Mobile Robots:A Barrier Function Sliding Mode Approach 被引量:1
4
作者 Yunjun Zheng Jinchuan Zheng +3 位作者 Ke Shao Han Zhao Hao Xie Hai Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1007-1021,共15页
The trajectory tracking control performance of nonholonomic wheeled mobile robots(NWMRs)is subject to nonholonomic constraints,system uncertainties,and external disturbances.This paper proposes a barrier function-base... The trajectory tracking control performance of nonholonomic wheeled mobile robots(NWMRs)is subject to nonholonomic constraints,system uncertainties,and external disturbances.This paper proposes a barrier function-based adaptive sliding mode control(BFASMC)method to provide high-precision,fast-response performance and robustness for NWMRs.Compared with the conventional adaptive sliding mode control,the proposed control strategy can guarantee that the sliding mode variables converge to a predefined neighborhood of origin with a predefined reaching time independent of the prior knowledge of the uncertainties and disturbances bounds.Another advantage of the proposed algorithm is that the control gains can be adaptively adjusted to follow the disturbances amplitudes thanks to the barrier function.The benefit is that the overestimation of control gain can be eliminated,resulting in chattering reduction.Moreover,a modified barrier function-like control gain is employed to prevent the input saturation problem due to the physical limit of the actuator.The stability analysis and comparative experiments demonstrate that the proposed BFASMC can ensure the prespecified convergence performance of the NWMR system output variables and strong robustness against uncertainties/disturbances. 展开更多
关键词 Adaptive sliding mode barrier function nonholonomic wheeled mobile robot(NWMR) trajectory tracking control
下载PDF
IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks 被引量:1
5
作者 Ying Zhang Weiming Niu Leibing Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期885-902,共18页
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ... In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes. 展开更多
关键词 mobile edge computing(MEC) unmanned aerial vehicle(UAV) intelligent reflecting surface(IRS) zero forcing(ZF)
下载PDF
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
6
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 mobile application security AES data encryption time parameter mobile device
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
7
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
Detection and Prevention of Malware in Android Mobile Devices: A Literature Review
8
作者 Joseph Keteku George Owusu Dameh +3 位作者 Samuel Ameka Mante Thomas Kwashie Mensah Schneider Laryea Amartey John-Bosco Diekuu 《International Journal of Intelligence Science》 2024年第4期71-93,共23页
Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party app... Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party apps, it has become an increasingly important issue for end-users and service providers to ensure that both the devices and the underlying network are secure. People will become more reliant on applications such as SMS, MMS, Internet Access, Online Transactions, and so on due to such features and capabilities. Thousands of devices ranging from low-cost phones to high-end luxury phones are powered by the Android operating system, which has dominated the smartphone marketplace. It is about making it possible for people from all socioeconomic backgrounds to get and use mobile devices in their daily activities. In response to this growing popularity, the number of new applications introduced to the Android market has skyrocketed. The recent appearance of a wide range of mobile malware has caught the attention of security professionals and scholars alike. In light of the ongoing expansion of the mobile phone industry, the likelihood of it being used in criminal activities will only continue to rise in the future. This article reviews the literature on malware detection and prevention in Android mobile devices, analyzes the existing literature on major studies and tasks, and covers articles, journals, and digital resources such as Internet security publications, scientific studies, and conferences. 展开更多
关键词 Android Malware Android mobile Application Security Malware Detection mobile Security
下载PDF
A Problem Not to Be Ignored: The Influencing Factors of Mobile Phone Addiction and Its Influence on Sleep Quality
9
作者 Zihan Ji Lian Zhou 《Health》 2024年第5期459-469,共11页
Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attentio... Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attention. The present study aims to analyze the current state of mobile phone addiction and its impact on sleep quality within the population, while also exploring the influence of related factors on sleep quality. Ultimately, this research will provide a scientific foundation for targeted intervention measures and strategies. Methods: A total of 253 permanent residents in Nanjing were randomly selected as study subjects. The Mobile Phone Addiction Index (MPAI) and Pittsburgh Sleep Quality Index (PSQI) were used to evaluate the degree of smartphone addiction and sleep quality of the study subjects. Body mass index (BMI) was measured according to standardized procedures. Independent sample t-test, Chi-square test, rank sum test and multiple linear regression were used to analyze the correlation between mobile phone addiction and sleep quality, and P Results: 117 people (46.2%) were addicted to mobile phones. Chi-square test showed that the rate of mobile phone addiction in drinking group was significantly higher than that in non-drinking group (P P P P P P P P P P Conclusion: Mobile phone addiction may lead to shorter sleep duration and reduce sleep efficiency. The withdrawal of mobile phone addiction may have a negative impact on sleep quality. According to the characteristics of the population, appropriate comprehensive intervention measures should be taken to build an effective evaluation system, so as to reduce the impact of mobile phone addiction and withdrawal problems on sleep and improve sleep quality. 展开更多
关键词 mobile Phone Addiction Influencing Factors WITHDRAWAL Sleep Quality
下载PDF
SAC-Based Computation Offloading for Reconfigurable Intelligent Surface-Aided Mobile Edge Networks
10
作者 Li Bin Qian Zhen Fei Zesong 《China Communications》 SCIE CSCD 2024年第6期261-270,共10页
In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consump... In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consumption of all UEs by jointly optimizing the discrete phase shift of RIS,UEs’transmitting power,computing resources allocation,and the UEs’task offloading strategies for local computing and offloading.The formulated problem is a sequential decision making across multiple coherent time slots.Furthermore,the mobility of UEs brings uncertainties into the decision-making process.To cope with this challenging problem,the deep reinforcement learning-based Soft Actor-Critic(SAC)algorithm is first proposed to effectively optimize the discrete phase of RIS and the UEs’task offloading strategies.Then,the transmitting power and computing resource allocation can be determined based on the action.Numerical results demonstrate that the proposed algorithm can be trained more stably and perform approximately 14%lower than the deep deterministic policy gradient benchmark in terms of energy consumption. 展开更多
关键词 MEC RIS soft actor-critic user mobility
下载PDF
Computing Resource Allocation for Blockchain-Based Mobile Edge Computing
11
作者 Wanbo Zhang Yuqi Fan +2 位作者 Jun Zhang Xu Ding Jung Yoon Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期863-885,共23页
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a... Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC. 展开更多
关键词 mobile edge computing blockchain resource allocation
下载PDF
The Contribution of AI-Powered Mobile Apps to Smart City Ecosystems
12
作者 Zaki Ali Bayashot 《Journal of Software Engineering and Applications》 2024年第3期143-154,共12页
In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is metic... In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is meticulously examined. This comprehensive research delineates the multifaceted ways in which AI-powered mobile applications can significantly enhance the efficiency, sustainability, and livability of urban environments, marking a pivotal step towards the realization of smart cities globally. Bayashot meticulously outlines the critical areas where AI-powered apps offer unprecedented advantages, including urban mobility, public safety, energy management, and environmental monitoring. By leveraging AI’s capabilities, these applications not only streamline city operations but also foster a more sustainable interaction between city dwellers and their environment. The paper emphasizes the importance of data-driven decision-making in urban planning, showcasing how AI analytics can predict and mitigate traffic congestion, optimize energy consumption, and enhance emergency response strategies. The author also explores the social implications of AI in urban settings, highlighting the potential for these technologies to bridge the gap between government entities and citizens. Through engaging case studies, Bayashot demonstrates how participatory governance models, enabled by AI apps, can promote transparency, accountability, and citizen engagement in urban management. A significant contribution of this research is its focus on the challenges and opportunities presented by the integration of AI into smart city ecosystems. Bayashot discusses the technical, ethical, and privacy concerns associated with AI applications, advocating for a balanced approach that ensures technological advancements do not come at the expense of civil liberties. The study calls for robust regulatory frameworks to govern the use of AI in public spaces, emphasizing the need for ethical AI practices that respect privacy and promote inclusivity. Furthermore, Bayashot’s research underscores the necessity of cross-disciplinary collaboration in the development and implementation of AI technologies in urban contexts. By bringing together experts from information technology, urban planning, environmental science, and social sciences, the author argues for a holistic approach to smart city development. This interdisciplinary strategy ensures that AI applications are not only technologically sound but also socially and environmentally responsible. The paper concludes with a visionary outlook on the future of smart cities, posited on the seamless integration of AI technologies. Bayashot envisions a world where AI-powered mobile apps not only facilitate smoother urban operations but also empower citizens to actively participate in the shaping of their urban environments. This research serves as a critical call to action for policymakers, technologists, and urban planners to embrace AI as a tool for creating more sustainable, efficient, and inclusive cities. By presenting a detailed analysis of the current state of AI in urban development, coupled with practical insights and forward-looking recommendations, “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems” stands as a seminal work that is poised to inspire and guide the evolution of urban landscapes worldwide. Its comprehensive exploration of the subject matter, combined with its impactful conclusions, make it a must-read for anyone involved in the field of smart city development, AI technology, or urban policy-making. 展开更多
关键词 mobile Applications Smart Cities Artificial Intelligence IOT
下载PDF
RPL-Based IoT Networks under Decreased Rank Attack:Performance Analysis in Static and Mobile Environments
13
作者 Amal Hkiri Mouna Karmani +3 位作者 Omar Ben Bahri Ahmed Mohammed Murayr Fawaz Hassan Alasmari Mohsen Machhout 《Computers, Materials & Continua》 SCIE EI 2024年第1期227-247,共21页
The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks r... The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks remains a concern.This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static andmobilenetwork environments.We employ the Random Direction Mobility Model(RDM)for mobile scenarios within the Cooja simulator.Our systematic evaluation focuses on critical performance metrics,including Packet Delivery Ratio(PDR),Average End to End Delay(AE2ED),throughput,Expected Transmission Count(ETX),and Average Power Consumption(APC).Our findings illuminate the disruptive impact of this attack on the routing hierarchy,resulting in decreased PDR and throughput,increased AE2ED,ETX,and APC.These results underscore the urgent need for robust security measures to protect RPL-based IoT networks.Furthermore,our study emphasizes the exacerbated impact of the attack in mobile scenarios,highlighting the evolving security requirements of IoT networks. 展开更多
关键词 RPL decreased rank attacks mobilITY random direction model
下载PDF
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
14
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
下载PDF
Mobile Crowdsourcing Task Allocation Based on Dynamic Self-Attention GANs
15
作者 Kai Wei Song Yu Qingxian Pan 《Computers, Materials & Continua》 SCIE EI 2024年第4期607-622,共16页
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encoun... Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation. 展开更多
关键词 mobile crowdsourcing task allocation anomaly detection GAN attention mechanisms
下载PDF
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
16
作者 Chunlin Xiong Zhengqiu Weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
下载PDF
Heuristic Expanding Disconnected Graph:A Rapid Path Planning Method for Mobile Robots
17
作者 Yong Tao Lian Duan +3 位作者 He Gao Yufan Zhang Yian Song Tianmiao Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第2期68-82,共15页
Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of th... Existing mobile robots mostly use graph search algorithms for path planning,which suffer from relatively low planning efficiency owing to high redundancy and large computational complexity.Due to the limitations of the neighborhood search strategy,the robots could hardly obtain the most optimal global path.A global path planning algorithm,denoted as EDG*,is proposed by expanding nodes using a well-designed expanding disconnected graph operator(EDG)in this paper.Firstly,all obstacles are marked and their corners are located through the map pre-processing.Then,the EDG operator is designed to find points in non-obstruction areas to complete the rapid expansion of disconnected nodes.Finally,the EDG*heuristic iterative algorithm is proposed.It selects the candidate node through a specific valuation function and realizes the node expansion while avoiding collision with a minimum offset.Path planning experiments were conducted in a typical indoor environment and on the public dataset CSM.The result shows that the proposed EDG*reduced the planning time by more than 90%and total length of paths reduced by more than 4.6%.Compared to A*,Dijkstra and JPS,EDG*does not show an exponential explosion effect in map size.The EDG*showed better performance in terms of path smoothness,and collision avoidance.This shows that the EDG*algorithm proposed in this paper can improve the efficiency of path planning and enhance path quality. 展开更多
关键词 Global path planning mobile robot Expanding disconnected graph Edge node OFFSET
下载PDF
Characteristics of long-distance mobile mRNAs from shoot to root in grafted plant species
18
作者 Mengmeng Fu Zhen Xu +7 位作者 Huaying Ma Yifan Hao Ji Tian Yi Wang Xinzhong Zhang Xuefeng Xu Zhenhai Han Ting Wu 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第1期25-37,共13页
Thousands of long-distance mobile mRNAs were identified from different grafting systems,based on high-throughput sequencing technology.Moreover,the long-distance delivery of RNAs was proved to involve multiple mechani... Thousands of long-distance mobile mRNAs were identified from different grafting systems,based on high-throughput sequencing technology.Moreover,the long-distance delivery of RNAs was proved to involve multiple mechanisms.Here,we analyzed the homology,motif,and tRNA-like structure(TLS)of long-distance mobile mRNAs identified by RNA-seq as well as the RNA-binding protein(RBP)in nine grafting combinations including Arabidopsis thaliana,Vitis vinifera,Cucumis sativus,Citrullus lanatus,Nicotiana benthamiana,Malus domestica,Pyrus spp.,Glycine max and Phaseolus vulgaris.Although several mRNAs were found to be shared in herbaceous,woody,and related species,the vast majority of long-distance mobile mRNAs were species-specific.Four non-specific movement-related motifs were identified,while the TLS was not necessary for mRNA long distance mobility.In addition,we found that RBPs were conserved among herbaceous and woody plants as well as related species.This paper reports a further in-depth analysis of the endogenous mechanisms by which the species-specific transportable m RNAs were selected by bioinformatics,in order to provide insights for future research on long-distance mobile mRNAs. 展开更多
关键词 Grafting combination Long-distance mobile mRNA TLS RNA binding proteins
下载PDF
Deep Reinforcement Learning-Based Task Offloading and Service Migrating Policies in Service Caching-Assisted Mobile Edge Computing
19
作者 Ke Hongchang Wang Hui +1 位作者 Sun Hongbin Halvin Yang 《China Communications》 SCIE CSCD 2024年第4期88-103,共16页
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.... Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms. 展开更多
关键词 deep reinforcement learning mobile edge computing service caching service migrating
下载PDF
Engineering and Physical Bases of Development and Creation of Plasmochemical Reactors for Mobile Facilities for Medical Waste Disposal
20
作者 Volodymyr Vashchenko Iryna Korduba +2 位作者 Nancy Mahmoud Al Saeed Hafez Nazarii Nehoda Serhii Tsybytovskyi 《Open Journal of Ecology》 2024年第9期651-662,共12页
This paper presents the results of the development and creation of plasma-chemical reactors for mobile and stationary installations for the destruction and disposal of solid, liquid, gaseous and mixed medical waste ba... This paper presents the results of the development and creation of plasma-chemical reactors for mobile and stationary installations for the destruction and disposal of solid, liquid, gaseous and mixed medical waste based on the domestic plasma generator PUN-1, with air as the plasma-forming gas. The design and principle of operation of plasma-chemical reactors installed on mobile experimental and industrial plants “Plazmon-1,2,3”, as well as the main features of the plasma waste disposal process are described. 展开更多
关键词 Medical Waste INCINERATION Plasma Chemical Reactor Plasma Generator mobile Installations
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部