The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag...The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extr...Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extract accurate governing equations under noisy conditions without prior knowledge.Specifically,the proposed method combines gene expression programming,one type of evolutionary algorithm capable of generating unseen terms based solely on basic operators and functional terms,with symbolic regression neural networks.These networks are designed to represent explicit functional expressions and optimize them with data gradients.In particular,the specifically designed neural networks can be easily transformed to physical constraints for the training data,embedding the discovered PDEs to further optimize the metadata used for iterative PDE identification.The proposed method has been tested in four canonical PDE cases,validating its effectiveness without preliminary information and confirming its suitability for practical applications across various noise levels.展开更多
Objective To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods We predicted and characterized HQD patte...Objective To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine.展开更多
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en...Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.展开更多
Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instr...Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instruction-brief and instruction-category, and constructing test suite. Consequently, this approach is adopted to test oven embedded system, and detail process is deeply discussed. As a result, the factual result indicates that the “instruction-category” approach can be effectively applied in embedded system testing as a black-box method for conformity testing.展开更多
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W...This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications.展开更多
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo...The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.展开更多
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t...In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ...This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.展开更多
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio...Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.展开更多
A 59-year-old woman was admitted to our hospital because of recurrent follicular lymphoma(FL).Colonoscopic examination revealed a rectal submucosal tumor(SMT)without any erosions and ulcers.In this patient,it was diff...A 59-year-old woman was admitted to our hospital because of recurrent follicular lymphoma(FL).Colonoscopic examination revealed a rectal submucosal tumor(SMT)without any erosions and ulcers.In this patient,it was difficult to distinguish non-Hodgkin's lymphoma(NHL)invasion from other disorders of the colon including carcinoid tumor merely based on endoscopic findings.Histopathologic and immunohistochemical studies on biopsy specimens showed an infiltration of atypical lymphocytes that were positive for CD20 and BCL2 but negative for UCHL-1.Fluorescence in situ hybridization on paraffin-embedded tissue sections (T-FISH)identified a translocation of BCL2 with IGHgene. Based on these findings,the tumor was defined as an invasion of FL.T-FISH method is useful for the detection of a monoclonality of atypical lymphocytes in an SMT of the gastrointestinal tract,and particularly for the detection of chromosomal translocations specific to lymphoma subtypes.展开更多
In order to mimic the natural heterogeneity of native tissue and provide a better microenvironment for cell culturing,multi-material bioprinting has become a common solution to construct tissue models in vitro.With th...In order to mimic the natural heterogeneity of native tissue and provide a better microenvironment for cell culturing,multi-material bioprinting has become a common solution to construct tissue models in vitro.With the embedded printing method,complex 3D structure can be printed using soft biomaterials with reasonable shape fidelity.However,the current sequential multi-material embedded printing method faces a major challenge,which is the inevitable trade-off between the printed structural integrity and printing precision.Here,we propose a simultaneous multi-material embedded printing method.With this method,we can easily print firmly attached and high-precision multilayer structures.With multiple individually controlled nozzles,different biomaterials can be precisely deposited into a single crevasse,minimizing uncontrolled squeezing and guarantees no contamination of embedding medium within the structure.We analyse the dynamics of the extruded bioink in the embedding medium both analytically and experimentally,and quantitatively evaluate the effects of printing parameters including printing speed and rheology of embedding medium,on the 3D morphology of the printed filament.We demonstrate the printing of double-layer thin-walled structures,each layer less than 200μm,as well as intestine and liver models with 5%gelatin methacryloyl that are crosslinked and extracted from the embedding medium without significant impairment or delamination.The peeling test further proves that the proposed method offers better structural integrity than conventional sequential printing methods.The proposed simultaneous multi-material embedded printing method can serve as a powerful tool to support the complex heterogeneous structure fabrication and open unique prospects for personalized medicine.展开更多
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C...Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.展开更多
Label-sensor is an essential component of the label printer which is becoming a most significant tool for the development of Internet of Things(IoT).However,some drawbacks of the traditional infrared label-sensor make...Label-sensor is an essential component of the label printer which is becoming a most significant tool for the development of Internet of Things(IoT).However,some drawbacks of the traditional infrared label-sensor make the printer fail to realize the high-speed recognition of labels as well as stable printing.Herein,we propose a selfpowered and highly sensitive tribo-label-sensor(TLS)for accurate label identification,positioning and counting by embedding triboelectric nanogenerator into the indispensable roller structure of a label printer.The sensing mechanism,device parameters and deep comparison with infrared sensor are systematically studied both in theory and experiment.As the results,TLS delivers 6 times higher signal magnitude than traditional one.Moreover,TLS is immune to label jitter and temperature variation during fast printing and can also be used for transparent label directly and shows long-term robustness.This work may provide an alternative toolkit with outstanding advantages to improve current label printer and further promote the development of IoT.展开更多
Accurate prediction of future events brings great benefits and reduces losses for society in many domains,such as civil unrest,pandemics,and crimes.Knowledge graph is a general language for describing and modeling com...Accurate prediction of future events brings great benefits and reduces losses for society in many domains,such as civil unrest,pandemics,and crimes.Knowledge graph is a general language for describing and modeling complex systems.Different types of events continually occur,which are often related to historical and concurrent events.In this paper,we formalize the future event prediction as a temporal knowledge graph reasoning problem.Most existing studies either conduct reasoning on static knowledge graphs or assume knowledges graphs of all timestamps are available during the training process.As a result,they cannot effectively reason over temporal knowledge graphs and predict events happening in the future.To address this problem,some recent works learn to infer future events based on historical eventbased temporal knowledge graphs.However,these methods do not comprehensively consider the latent patterns and influences behind historical events and concurrent events simultaneously.This paper proposes a new graph representation learning model,namely Recurrent Event Graph ATtention Network(RE-GAT),based on a novel historical and concurrent events attention-aware mechanism by modeling the event knowledge graph sequence recurrently.More specifically,our RE-GAT uses an attention-based historical events embedding module to encode past events,and employs an attention-based concurrent events embedding module to model the associations of events at the same timestamp.A translation-based decoder module and a learning objective are developed to optimize the embeddings of entities and relations.We evaluate our proposed method on four benchmark datasets.Extensive experimental results demonstrate the superiority of our RE-GAT model comparing to various base-lines,which proves that our method can more accurately predict what events are going to happen.展开更多
Predicting potential facts in the future,Temporal Knowledge Graph(TKG)extrapolation remains challenging because of the deep dependence between the temporal association and semantic patterns of facts.Intuitively,facts(...Predicting potential facts in the future,Temporal Knowledge Graph(TKG)extrapolation remains challenging because of the deep dependence between the temporal association and semantic patterns of facts.Intuitively,facts(events)that happened at different timestamps have different influences on future events,which can be attributed to a hierarchy among not only facts but also relevant entities.Therefore,it is crucial to pay more attention to important entities and events when forecasting the future.However,most existing methods focus on reasoning over temporally evolving facts or mining evolutional patterns from known facts,which may be affected by the diversity and variability of the evolution,and they might fail to attach importance to facts that matter.Hyperbolic geometry was proved to be effective in capturing hierarchical patterns among data,which is considered to be a solution for modelling hierarchical relations among facts.To this end,we propose ReTIN,a novel model integrating real-time influence of historical facts for TKG reasoning based on hyperbolic geometry,which provides low-dimensional embeddings to capture latent hierarchical structures and other rich semantic patterns of the existing TKG.Considering both real-time and global features of TKG boosts the adaptation of ReTIN to the ever-changing dynamics and inherent constraints.Extensive experiments on benchmarks demonstrate the superiority of ReTIN over various baselines.The ablation study further supports the value of exploiting temporal information.展开更多
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(2021R1A4A2000934).
文摘The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-Baidu Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金supported by the National Natural Science Foundation of China(Grant Nos.92152102 and 92152202)the Advanced Jet Propulsion Innovation Center/AEAC(Grant No.HKCX2022-01-010)。
文摘Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extract accurate governing equations under noisy conditions without prior knowledge.Specifically,the proposed method combines gene expression programming,one type of evolutionary algorithm capable of generating unseen terms based solely on basic operators and functional terms,with symbolic regression neural networks.These networks are designed to represent explicit functional expressions and optimize them with data gradients.In particular,the specifically designed neural networks can be easily transformed to physical constraints for the training data,embedding the discovered PDEs to further optimize the metadata used for iterative PDE identification.The proposed method has been tested in four canonical PDE cases,validating its effectiveness without preliminary information and confirming its suitability for practical applications across various noise levels.
基金supported by the National Natural Science Foundation of China(32088101)National key Research and Development Program of China(2017YFC1700105,2021YFA1301603).
文摘Objective To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine.
基金supported by the Key-Area Research and Development Program of Guangdong Province(Grant No.2021B0909060002)National Natural Science Foundation of China(Grant Nos.62204219,62204140)+1 种基金Major Program of Natural Science Foundation of Zhejiang Province(Grant No.LDT23F0401)Thanks to Professor Zhang Yishu from Zhejiang University,Professor Gao Xu from Soochow University,and Professor Zhong Shuai from Guangdong Institute of Intelligence Science and Technology for their support。
文摘Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.
文摘Being different from testing for popular GUI software, the “instruction-category” approach is proposed for testing embedded system. This approach is constructed by three steps including refining items, drawing instruction-brief and instruction-category, and constructing test suite. Consequently, this approach is adopted to test oven embedded system, and detail process is deeply discussed. As a result, the factual result indicates that the “instruction-category” approach can be effectively applied in embedded system testing as a black-box method for conformity testing.
基金supported in part by Major Science and Technology Demonstration Project of Jiangsu Provincial Key R&D Program under Grant No.BE2023025in part by the National Natural Science Foundation of China under Grant No.62302238+2 种基金in part by the Natural Science Foundation of Jiangsu Province under Grant No.BK20220388in part by the Natural Science Research Project of Colleges and Universities in Jiangsu Province under Grant No.22KJB520004in part by the China Postdoctoral Science Foundation under Grant No.2022M711689.
文摘This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications.
文摘The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
基金Supported by the National Natural Science Foundation of China(No.62203390)the Science and Technology Project of China TobaccoZhejiang Industrial Co.,Ltd(No.ZJZY2022E004)。
文摘In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.
文摘This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.
基金This paper is one of the phased achievements of the Education and Teaching Reform Project of Guangdong University of Petrochemical Engineering in 2022(71013413080)the Research and Practice Project of Teaching and Teaching Reform of University-Level Higher Vocational Education in 2023(JY202353).
文摘Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality.
文摘A 59-year-old woman was admitted to our hospital because of recurrent follicular lymphoma(FL).Colonoscopic examination revealed a rectal submucosal tumor(SMT)without any erosions and ulcers.In this patient,it was difficult to distinguish non-Hodgkin's lymphoma(NHL)invasion from other disorders of the colon including carcinoid tumor merely based on endoscopic findings.Histopathologic and immunohistochemical studies on biopsy specimens showed an infiltration of atypical lymphocytes that were positive for CD20 and BCL2 but negative for UCHL-1.Fluorescence in situ hybridization on paraffin-embedded tissue sections (T-FISH)identified a translocation of BCL2 with IGHgene. Based on these findings,the tumor was defined as an invasion of FL.T-FISH method is useful for the detection of a monoclonality of atypical lymphocytes in an SMT of the gastrointestinal tract,and particularly for the detection of chromosomal translocations specific to lymphoma subtypes.
基金the support by National Key Research and Development Program of China(2018YFA0703000)National Natural Science Foundation of China(Grant No.52105310)+1 种基金Natural Science Foundation of Zhejiang Province(Grant No.LDQ23E050001)the Starry Night Science Fund of Zhejiang University Shanghai Institute for Advanced Study(Grant No.SN-ZJU-SIAS-004)。
文摘In order to mimic the natural heterogeneity of native tissue and provide a better microenvironment for cell culturing,multi-material bioprinting has become a common solution to construct tissue models in vitro.With the embedded printing method,complex 3D structure can be printed using soft biomaterials with reasonable shape fidelity.However,the current sequential multi-material embedded printing method faces a major challenge,which is the inevitable trade-off between the printed structural integrity and printing precision.Here,we propose a simultaneous multi-material embedded printing method.With this method,we can easily print firmly attached and high-precision multilayer structures.With multiple individually controlled nozzles,different biomaterials can be precisely deposited into a single crevasse,minimizing uncontrolled squeezing and guarantees no contamination of embedding medium within the structure.We analyse the dynamics of the extruded bioink in the embedding medium both analytically and experimentally,and quantitatively evaluate the effects of printing parameters including printing speed and rheology of embedding medium,on the 3D morphology of the printed filament.We demonstrate the printing of double-layer thin-walled structures,each layer less than 200μm,as well as intestine and liver models with 5%gelatin methacryloyl that are crosslinked and extracted from the embedding medium without significant impairment or delamination.The peeling test further proves that the proposed method offers better structural integrity than conventional sequential printing methods.The proposed simultaneous multi-material embedded printing method can serve as a powerful tool to support the complex heterogeneous structure fabrication and open unique prospects for personalized medicine.
基金supported in part by the National Natural Science Foundation of China (62272078)the CAAI-Huawei MindSpore Open Fund (CAAIXSJLJJ-2021-035A)the Doctoral Student Talent Training Program of Chongqing University of Posts and Telecommunications (BYJS202009)。
文摘Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.
基金supported by the National Key Research and Development Program(2021YFA1201602)the NSFC(62004017)+2 种基金the Fundamental Research Funds for the Central Universities(2021CDJQY-019)J.C.also want to acknowledge the supporting from the Natural Science Foundation of Chongqing(Grant No.cstc2021jcyjmsxmX0746)the Scientific Research Project of Chongqing Education Committee(Grant No.KJQN202100522).
文摘Label-sensor is an essential component of the label printer which is becoming a most significant tool for the development of Internet of Things(IoT).However,some drawbacks of the traditional infrared label-sensor make the printer fail to realize the high-speed recognition of labels as well as stable printing.Herein,we propose a selfpowered and highly sensitive tribo-label-sensor(TLS)for accurate label identification,positioning and counting by embedding triboelectric nanogenerator into the indispensable roller structure of a label printer.The sensing mechanism,device parameters and deep comparison with infrared sensor are systematically studied both in theory and experiment.As the results,TLS delivers 6 times higher signal magnitude than traditional one.Moreover,TLS is immune to label jitter and temperature variation during fast printing and can also be used for transparent label directly and shows long-term robustness.This work may provide an alternative toolkit with outstanding advantages to improve current label printer and further promote the development of IoT.
基金supported by the National Natural Science Foundation of China under grants U19B2044National Key Research and Development Program of China(2021YFC3300500).
文摘Accurate prediction of future events brings great benefits and reduces losses for society in many domains,such as civil unrest,pandemics,and crimes.Knowledge graph is a general language for describing and modeling complex systems.Different types of events continually occur,which are often related to historical and concurrent events.In this paper,we formalize the future event prediction as a temporal knowledge graph reasoning problem.Most existing studies either conduct reasoning on static knowledge graphs or assume knowledges graphs of all timestamps are available during the training process.As a result,they cannot effectively reason over temporal knowledge graphs and predict events happening in the future.To address this problem,some recent works learn to infer future events based on historical eventbased temporal knowledge graphs.However,these methods do not comprehensively consider the latent patterns and influences behind historical events and concurrent events simultaneously.This paper proposes a new graph representation learning model,namely Recurrent Event Graph ATtention Network(RE-GAT),based on a novel historical and concurrent events attention-aware mechanism by modeling the event knowledge graph sequence recurrently.More specifically,our RE-GAT uses an attention-based historical events embedding module to encode past events,and employs an attention-based concurrent events embedding module to model the associations of events at the same timestamp.A translation-based decoder module and a learning objective are developed to optimize the embeddings of entities and relations.We evaluate our proposed method on four benchmark datasets.Extensive experimental results demonstrate the superiority of our RE-GAT model comparing to various base-lines,which proves that our method can more accurately predict what events are going to happen.
基金Major Key Project of Pengcheng Laboratory,Grant/Award Number:PCL2022A03。
文摘Predicting potential facts in the future,Temporal Knowledge Graph(TKG)extrapolation remains challenging because of the deep dependence between the temporal association and semantic patterns of facts.Intuitively,facts(events)that happened at different timestamps have different influences on future events,which can be attributed to a hierarchy among not only facts but also relevant entities.Therefore,it is crucial to pay more attention to important entities and events when forecasting the future.However,most existing methods focus on reasoning over temporally evolving facts or mining evolutional patterns from known facts,which may be affected by the diversity and variability of the evolution,and they might fail to attach importance to facts that matter.Hyperbolic geometry was proved to be effective in capturing hierarchical patterns among data,which is considered to be a solution for modelling hierarchical relations among facts.To this end,we propose ReTIN,a novel model integrating real-time influence of historical facts for TKG reasoning based on hyperbolic geometry,which provides low-dimensional embeddings to capture latent hierarchical structures and other rich semantic patterns of the existing TKG.Considering both real-time and global features of TKG boosts the adaptation of ReTIN to the ever-changing dynamics and inherent constraints.Extensive experiments on benchmarks demonstrate the superiority of ReTIN over various baselines.The ablation study further supports the value of exploiting temporal information.