期刊文献+
共找到3,787篇文章
< 1 2 190 >
每页显示 20 50 100
Effects of cross-Kerr coupling on transmission spectrum of double-cavity optomechanical system
1
作者 陈立滕 秦立国 +3 位作者 田立君 黄接辉 周南润 龚尚庆 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期390-396,共7页
We theoretically study the transmission spectrum of the cavity field in a double-cavity optomechanical system with cross-Kerr(CK) effect. The system consists of two tunneling coupling optomechanical cavities with a me... We theoretically study the transmission spectrum of the cavity field in a double-cavity optomechanical system with cross-Kerr(CK) effect. The system consists of two tunneling coupling optomechanical cavities with a mechanical resonator as a coupling interface. By doping CK medium into the mechanical resonator, CK couplings between the cavity fields and the mechanical resonator are introduced. We investigate the effects of CK coupling strength on the transmission spectrum of the cavity field, including the transmission rate, nonreciprocity and four-wave mixing(FWM). We find that the transmission spectrum of the probe field can show two obvious transparent windows, which can be widened by increasing the CK coupling strength. For the transmission between the two cavity fields, the perfect nonreciprocity and reciprocity are present and modulated by CK coupling and phase difference between two effective optomechanical couplings. In addition, the effects of the optomechanical and CK couplings on FWM show that the single peak of FWM is split into three symmetrical peaks due to the introduction of the CK effect. 展开更多
关键词 cross-Kerr transmission rate NONRECIPROCITY four-wave mixing
下载PDF
Inferring Mycobacterium Tuberculosis Drug Resistance and Transmission using Whole-genome Sequencing in a High TB-burden Setting in China
2
作者 FAN Yu Feng LIU Dong Xin +11 位作者 CHEN Yi Wang OU Xi Chao MAO Qi Zhi YANG Ting Ting WANG Xi Jiang HE Wen Cong ZHAO Bing LIU Zhen Jiang ABULIMITI Maiweilanjiang AIHEMUTI Maimaitiaili GAO Qian ZHAO Yan Lin 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第2期157-169,共13页
Objective China is among the 30 countries with a high burden of tuberculosis(TB)worldwide,and TB remains a public health concern.Kashgar Prefecture in the southern Xinjiang Autonomous Region is considered as one of th... Objective China is among the 30 countries with a high burden of tuberculosis(TB)worldwide,and TB remains a public health concern.Kashgar Prefecture in the southern Xinjiang Autonomous Region is considered as one of the highest TB burden regions in China.However,molecular epidemiological studies of Kashgar are lacking.Methods A population-based retrospective study was conducted using whole-genome sequencing(WGS)to determine the characteristics of drug resistance and the transmission patterns.Results A total of 1,668 isolates collected in 2020 were classified into lineages 2(46.0%),3(27.5%),and 4(26.5%).The drug resistance rates revealed by WGS showed that the top three drugs in terms of the resistance rate were isoniazid(7.4%,124/1,668),streptomycin(6.0%,100/1,668),and rifampicin(3.3%,55/1,668).The rate of rifampicin resistance was 1.8%(23/1,290)in the new cases and 9.4%(32/340)in the previously treated cases.Known resistance mutations were detected more frequently in lineage 2 strains than in lineage 3 or 4 strains,respectively:18.6%vs.8.7 or 9%,P<0.001.The estimated proportion of recent transmissions was 25.9%(432/1,668).Multivariate logistic analyses indicated that sex,age,occupation,lineage,and drug resistance were the risk factors for recent transmission.Despite the low rate of drug resistance,drug-resistant strains had a higher risk of recent transmission than the susceptible strains(adjusted odds ratio,1.414;95%CI,1.023–1.954;P=0.036).Among all patients with drug-resistant tuberculosis(DR-TB),78.4%(171/218)were attributed to the transmission of DR-TB strains.Conclusion Our results suggest that drug-resistant strains are more transmissible than susceptible strains and that transmission is the major driving force of the current DR-TB epidemic in Kashgar. 展开更多
关键词 Mycobacterium tuberculosis Whole-genome sequencing(WGS) transmission Drug resistance XINJIANG
下载PDF
A Novel Fractional Dengue Transmission Model in the Presence of Wolbachia Using Stochastic Based Artificial Neural Network
3
作者 Zeshan Faiz Iftikhar Ahmed +1 位作者 Dumitru Baleanu Shumaila Javeed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1217-1238,共22页
The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(L... The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model(FDTM)in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network(LM-NN)technique.The fractional dengue transmission model(FDTM)consists of 12 compartments.The human population is divided into four compartments;susceptible humans(S_(h)),exposed humans(E_(h)),infectious humans(I_(h)),and recovered humans(R_(h)).Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments:aquatic(eggs,larvae,pupae),susceptible,exposed,and infectious.We investigated three different cases of vertical transmission probability(η),namely when Wolbachia-free mosquitoes persist only(η=0.6),when both types of mosquitoes persist(η=0.8),and when Wolbachia-carrying mosquitoes persist only(η=1).The objective of this study is to investigate the effectiveness of Wolbachia in reducing dengue and presenting the numerical results by using the stochastic structure LM-NN approach with 10 hidden layers of neurons for three different cases of the fractional order derivatives(α=0.4,0.6,0.8).LM-NN approach includes a training,validation,and testing procedure to minimize the mean square error(MSE)values using the reference dataset(obtained by solving the model using the Adams-Bashforth-Moulton method(ABM).The distribution of data is 80% data for training,10% for validation,and,10% for testing purpose)results.A comprehensive investigation is accessible to observe the competence,precision,capacity,and efficiency of the suggested LM-NN approach by executing the MSE,state transitions findings,and regression analysis.The effectiveness of the LM-NN approach for solving the FDTM is demonstrated by the overlap of the findings with trustworthy measures,which achieves a precision of up to 10^(-4). 展开更多
关键词 WOLBACHIA DENGUE neural network vertical transmission mean square error LEVENBERG-MARQUARDT
下载PDF
Atmospheric transmission algorithm for pulsed X-rays from high-altitude nuclear detonations based on scattering correction
4
作者 Ding-Han Zhu Xiong Zhang +3 位作者 Xiao-Qiang Li Peng Li Yan-Bin Wang Shuang Zhang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第3期40-52,共13页
In high-altitude nuclear detonations,the proportion of pulsed X-ray energy can exceed 70%,making it a specific monitoring signal for such events.These pulsed X-rays can be captured using a satellite-borne X-ray detect... In high-altitude nuclear detonations,the proportion of pulsed X-ray energy can exceed 70%,making it a specific monitoring signal for such events.These pulsed X-rays can be captured using a satellite-borne X-ray detector following atmospheric transmission.To quantitatively analyze the effects of different satellite detection altitudes,burst heights,and transmission angles on the physical processes of X-ray transport and energy fluence,we developed an atmospheric transmission algorithm for pulsed X-rays from high-altitude nuclear detonations based on scattering correction.The proposed method is an improvement over the traditional analytical method that only computes direct-transmission X-rays.The traditional analytical method exhibits a maximum relative error of 67.79% compared with the Monte Carlo method.Our improved method reduces this error to within 10% under the same conditions,even reaching 1% in certain scenarios.Moreover,its computation time is 48,000 times faster than that of the Monte Carlo method.These results have important theoretical significance and engineering application value for designing satellite-borne nuclear detonation pulsed X-ray detectors,inverting nuclear detonation source terms,and assessing ionospheric effects. 展开更多
关键词 High-altitude nuclear detonation Atmospheric transmission Pulsed X-rays Scattering correction Analytical method Monte Carlo method
下载PDF
Studying the co-evolution of information diffusion,vaccination behavior and disease transmission in multilayer networks with local and global effects
5
作者 霍良安 武兵杰 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期677-689,共13页
Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between inf... Today,with the rapid development of the internet,a large amount of information often accompanies the rapid transmission of disease outbreaks,and increasing numbers of scholars are studying the relationship between information and the disease transmission process using complex networks.In fact,the disease transmission process is very complex.Besides this information,there will often be individual behavioral measures and other factors to consider.Most of the previous research has aimed to establish a two-layer network model to consider the impact of information on the transmission process of disease,rarely divided into information and behavior,respectively.To carry out a more in-depth analysis of the disease transmission process and the intrinsic influencing mechanism,this paper divides information and behavior into two layers and proposes the establishment of a complex network to study the dynamic co-evolution of information diffusion,vaccination behavior,and disease transmission.This is achieved by considering four influential relationships between adjacent layers in multilayer networks.In the information layer,the diffusion process of negative information is described,and the feedback effects of local and global vaccination are considered.In the behavioral layer,an individual's vaccination behavior is described,and the probability of an individual receiving a vaccination is influenced by two factors:the influence of negative information,and the influence of local and global disease severity.In the disease layer,individual susceptibility is considered to be influenced by vaccination behavior.The state transition equations are derived using the micro Markov chain approach(MMCA),and disease prevalence thresholds are obtained.It is demonstrated through simulation experiments that the negative information diffusion is less influenced by local vaccination behavior,and is mainly influenced by global vaccination behavior;vaccination behavior is mainly influenced by local disease conditions,and is less influenced by global disease conditions;the disease transmission threshold increases with the increasing vaccination rate;and the scale of disease transmission increases with the increasing negative information diffusion rate and decreases with the increasing vaccination rate.Finally,it is found that when individual vaccination behavior considers both the influence of negative information and disease,it can increase the disease transmission threshold and reduce the scale of disease transmission.Therefore,we should resist the diffusion of negative information,increase vaccination proportions,and take appropriate protective measures in time. 展开更多
关键词 information diffusion vaccination behavior disease transmission multilayer networks local and global effect
下载PDF
Dynamics of information diffusion and disease transmission in time-varying multiplex networks with asymmetric activity levels
6
作者 谢笑笑 霍良安 +1 位作者 董雅芳 程英英 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期690-699,共10页
While the interaction between information and disease in static networks has been extensively investigated,many studies have ignored the characteristics of network evolution.In this study,we construct a new two-layer ... While the interaction between information and disease in static networks has been extensively investigated,many studies have ignored the characteristics of network evolution.In this study,we construct a new two-layer coupling model to explore the interactions between information and disease.The upper layer describes the diffusion of disease-related information,and the lower layer represents the disease transmission.We then use power-law distributions to examine the influence of asymmetric activity levels on dynamic propagation,revealing a mapping relationship characterizing the interconnected propagation of information and diseases among partial nodes within the network.Subsequently,we derive the disease outbreak threshold by using the microscopic Markov-chain approach(MMCA).Finally,we perform extensive Monte Carlo(MC)numerical simulations to verify the accuracy of our theoretical results.Our findings indicate that the activity levels of individuals in the disease transmission layer have a more significant influence on disease transmission compared with the individual activity levels in the information diffusion layer.Moreover,reducing the damping factor can delay disease outbreaks and suppress disease transmission,while improving individual quarantine measures can contribute positively to disease control.This study provides valuable insights into policymakers for developing outbreak prevention and control strategies. 展开更多
关键词 information diffusion disease transmission asymmetric activity levels quarantine strength
下载PDF
THE INTERIOR TRANSMISSION EIGENVALUE PROBLEM FOR AN ANISOTROPIC MEDIUM BY A PARTIALLY COATED BOUNDARY
7
作者 向建立 严国政 《Acta Mathematica Scientia》 SCIE CSCD 2024年第1期339-354,共16页
We consider the interior transmission eigenvalue problem corresponding to the scattering for an anisotropic medium of the scalar Helmholtz equation in the case where the boundary?Ωis split into two disjoint parts and... We consider the interior transmission eigenvalue problem corresponding to the scattering for an anisotropic medium of the scalar Helmholtz equation in the case where the boundary?Ωis split into two disjoint parts and possesses different transmission conditions.Using the variational method,we obtain the well posedness of the interior transmission problem,which plays an important role in the proof of the discreteness of eigenvalues.Then we achieve the existence of an infinite discrete set of transmission eigenvalues provided that n≡1,where a fourth order differential operator is applied.In the case of n■1,we show the discreteness of the transmission eigenvalues under restrictive assumptions by the analytic Fredholm theory and the T-coercive method. 展开更多
关键词 interior transmission eigenvalue anisotropic medium partially coated boundary the analytic Fredholm theory T-coercive method
下载PDF
Characterization of local chemical ordering and deformation behavior in high entropy alloys by transmission electron microscopy
8
作者 Qiuhong Liu Qing Du +7 位作者 Xiaobin Zhang Yuan Wu Andrey A.Rempel Xiangyang Peng Xiongjun Liu Hui Wang Wenli Song Zhaoping Lü 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2024年第5期877-886,共10页
Short-range ordering(SRO)is one of the most important structural features of high entropy alloys(HEAs).However,the chemical and structural analyses of SROs are very difficult due to their small size,complexed composit... Short-range ordering(SRO)is one of the most important structural features of high entropy alloys(HEAs).However,the chemical and structural analyses of SROs are very difficult due to their small size,complexed compositions,and varied locations.Transmission electron microscopy(TEM)as well as its aberration correction techniques are powerful for characterizing SROs in these compositionally complex alloys.In this short communication,we summarized recent progresses regarding characterization of SROs using TEM in the field of HEAs.By using advanced TEM techniques,not only the existence of SROs was confirmed,but also the effect of SROs on the deformation mechanism was clarified.Moreover,the perspective related to application of TEM techniques in HEAs are also discussed. 展开更多
关键词 high entropy alloys transmission electron microscopy short-range ordering deformation mechanisms
下载PDF
Variational Learned Talking-Head Semantic Coded Transmission System
9
作者 Yue Weijie Si Zhongwei 《China Communications》 SCIE CSCD 2024年第7期37-49,共13页
Video transmission requires considerable bandwidth,and current widely employed schemes prove inadequate when confronted with scenes featuring prominently.Motivated by the strides in talkinghead generative technology,t... Video transmission requires considerable bandwidth,and current widely employed schemes prove inadequate when confronted with scenes featuring prominently.Motivated by the strides in talkinghead generative technology,the paper introduces a semantic transmission system tailored for talking-head videos.The system captures semantic information from talking-head video and faithfully reconstructs source video at the receiver,only one-shot reference frame and compact semantic features are required for the entire transmission.Specifically,we analyze video semantics in the pixel domain frame-by-frame and jointly process multi-frame semantic information to seamlessly incorporate spatial and temporal information.Variational modeling is utilized to evaluate the diversity of importance among group semantics,thereby guiding bandwidth resource allocation for semantics to enhance system efficiency.The whole endto-end system is modeled as an optimization problem and equivalent to acquiring optimal rate-distortion performance.We evaluate our system on both reference frame and video transmission,experimental results demonstrate that our system can improve the efficiency and robustness of communications.Compared to the classical approaches,our system can save over 90%of bandwidth when user perception is close. 展开更多
关键词 semantic communications source-channel coding talking-head transmission variational modeling
下载PDF
Probing the Nucleation and Growth Kinetics of Bismuth Nanoparticles via In-situ Transmission Electron Microscopy
10
作者 王浪 李超凡 +3 位作者 RAN Maojin YUAN Manman 胡执一 LI Yu 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第4期877-887,共11页
The nucleation and growth mechanism of nanoparticles is an important theory,which can guide the preparation of nanomaterials.However,it is still lacking in direct observation on the details of the evolution of interme... The nucleation and growth mechanism of nanoparticles is an important theory,which can guide the preparation of nanomaterials.However,it is still lacking in direct observation on the details of the evolution of intermediate state structure during nucleation and growth.In this work,the evolution process of bismuth nanoparticles induced by electron beam was revealed by in-situ transmission electron microscopy(TEM)at atomic scale.The experimental results demonstrate that the size,stable surface and crystallographic defect have important influences on the growth of Bi nanoparticles.Two non-classical growth paths including single crystal growth and polycrystalline combined growth,as well as,corresponding layer-by-layer growth mechanism along{012}stable crystal plane of Bi nanoparticles with dodecahedron structure were revealed by in-situ TEM directly.These results provide important guidance and a new approach for in-depth understanding of the nucleation and growth kinetics of nanoparticles. 展开更多
关键词 bismuth nanoparticles crystal growth transmission electron microscopy in-situ electron microscopy
下载PDF
An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain
11
作者 Qianqi Sun Fenhua Bai 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1733-1754,共22页
Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened com... Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%. 展开更多
关键词 Blockchain network coding block compression transmission optimization
下载PDF
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models
12
作者 Naglaa F.Soliman Fatma E.Fadl-Allah +3 位作者 Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
下载PDF
Intellicise Model Transmission for Semantic Communication in Intelligence-Native 6G Networks
13
作者 Wang Yining Han Shujun +4 位作者 Xu Xiaodong Meng Rui Liang Haotai Dong Chen Zhang Ping 《China Communications》 SCIE CSCD 2024年第7期95-112,共18页
To facilitate emerging applications and demands of edge intelligence(EI)-empowered 6G networks,model-driven semantic communications have been proposed to reduce transmission volume by deploying artificial intelligence... To facilitate emerging applications and demands of edge intelligence(EI)-empowered 6G networks,model-driven semantic communications have been proposed to reduce transmission volume by deploying artificial intelligence(AI)models that provide abilities of semantic extraction and recovery.Nevertheless,it is not feasible to preload all AI models on resource-constrained terminals.Thus,in-time model transmission becomes a crucial problem.This paper proposes an intellicise model transmission architecture to guarantee the reliable transmission of models for semantic communication.The mathematical relationship between model size and performance is formulated by employing a recognition error function supported with experimental data.We consider the characteristics of wireless channels and derive the closed-form expression of model transmission outage probability(MTOP)over the Rayleigh channel.Besides,we define the effective model accuracy(EMA)to evaluate the model transmission performance of both communication and intelligence.Then we propose a joint model selection and resource allocation(JMSRA)algorithm to maximize the average EMA of all users.Simulation results demonstrate that the average EMA of the JMSRA algorithm outperforms baseline algorithms by about 22%. 展开更多
关键词 edge intelligence(EI) model transmission outage probability and accuracy resource allocation semantic communication
下载PDF
Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory
14
作者 Ahmed H.Alhadethi Ikram Smaoui +1 位作者 Ahmed Fakhfakh Saad M.Darwish 《Computers, Materials & Continua》 SCIE EI 2024年第6期4825-4844,共20页
The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that c... The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%. 展开更多
关键词 Image transmission image compression text hiding Bezier curve Histogram of Oriented Gradients(HOG) LSTM image enhancement Gaussian noise ROTATION
下载PDF
Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks
15
作者 Haosong Gou Gaoyi Zhang +2 位作者 RenêRipardo Calixto Senthil Kumar Jagatheesaperumal Victor Hugo C.de Albuquerque 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1077-1102,共26页
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ... Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs. 展开更多
关键词 Wireless sensor networks reliable data transmission medical emergencies CLUSTER data collection routing scheme
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
16
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
Digital Twin Modeling and Simulation Optimization of Transmission Front and Middle Case Assembly Line
17
作者 Xianfeng Cao Meihua Yao +2 位作者 Yahui Zhang Xiaofeng Hu Chuanxun Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3233-3253,共21页
As the take-off of China’s macro economy,as well as the rapid development of infrastructure construction,real estate industry,and highway logistics transportation industry,the demand for heavy vehicles is increasing ... As the take-off of China’s macro economy,as well as the rapid development of infrastructure construction,real estate industry,and highway logistics transportation industry,the demand for heavy vehicles is increasing rapidly,the competition is becoming increasingly fierce,and the digital transformation of the production line is imminent.As one of themost important components of heavy vehicles,the transmission front andmiddle case assembly lines have a high degree of automation,which can be used as a pilot for the digital transformation of production.To ensure the visualization of digital twins(DT),consistent control logic,and real-time data interaction,this paper proposes an experimental digital twin modeling method for the transmission front and middle case assembly line.Firstly,theDT-based systemarchitecture is designed,and theDT model is created by constructing the visualization model,logic model,and data model of the assembly line.Then,a simulation experiment is carried out in a virtual space to analyze the existing problems in the current assembly line.Eventually,some improvement strategies are proposed and the effectiveness is verified by a new simulation experiment. 展开更多
关键词 transmission front and middle case assembly line digital twin(DT) simulating optimization intelligent manufacturing
下载PDF
Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things
18
作者 Bin Li Linghui Kong +3 位作者 Xiangyi Zhang Bochuo Kou Hui Yu Bowen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期3267-3282,共16页
The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power g... The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent security transmission strategy with sensor-transmission-computing linkage is proposed in this paper. The primary objective of this strategy is to maximize the confidentiality capacity of the system. To tackle this, an optimization problem is formulated, taking into consideration interruption probability and interception probability as constraints. To efficiently solve this optimization problem, a low-complexity algorithm rooted in deep reinforcement learning is designed, which aims to derive a suboptimal solution for the problem at hand. Ultimately, through simulation results, the validity of the proposed strategy in guaranteed communication security, stability, and timeliness is substantiated. The results confirm that the proposed intelligent security transmission strategy significantly contributes to the safeguarding of communication integrity, system stability, and timely data delivery. 展开更多
关键词 Secure transmission deep learning power Internet of Things sensor-transmission-computing
下载PDF
Capturing the non-equilibrium state in light–matter–free-electron interactions through ultrafast transmission electron microscopy
19
作者 汪文韬 孙帅帅 +5 位作者 李俊 郑丁国 黄思远 田焕芳 杨槐馨 李建奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期88-101,共14页
Ultrafast transmission electron microscope(UTEM) with the multimodality of time-resolved diffraction, imaging,and spectroscopy provides a unique platform to reveal the fundamental features associated with the interact... Ultrafast transmission electron microscope(UTEM) with the multimodality of time-resolved diffraction, imaging,and spectroscopy provides a unique platform to reveal the fundamental features associated with the interaction between free electrons and matter. In this review, we summarize the principles, instrumentation, and recent developments of the UTEM and its applications in capturing dynamic processes and non-equilibrium transient states. The combination of the transmission electron microscope with a femtosecond laser via the pump–probe method guarantees the high spatiotemporal resolution, allowing the investigation of the transient process in real, reciprocal and energy spaces. Ultrafast structural dynamics can be studied by diffraction and imaging methods, revealing the coherent acoustic phonon generation and photoinduced phase transition process. In the energy dimension, time-resolved electron energy-loss spectroscopy enables the examination of the intrinsic electronic dynamics of materials, while the photon-induced near-field electron microscopy extends the application of the UTEM to the imaging of optical near fields with high real-space resolution. It is noted that light–free-electron interactions have the ability to shape electron wave packets in both longitudinal and transverse directions, showing the potential application in the generation of attosecond electron pulses and vortex electron beams. 展开更多
关键词 ultrafast transmission electron microscopy non-equilibrium structural dynamics photo-induced phase transition free-electron–photon interactions
下载PDF
A semantic segmentation-based underwater acoustic image transmission framework for cooperative SLAM
20
作者 Jiaxu Li Guangyao Han +1 位作者 Shuai Chang Xiaomei Fu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期339-351,共13页
With the development of underwater sonar detection technology,simultaneous localization and mapping(SLAM)approach has attracted much attention in underwater navigation field in recent years.But the weak detection abil... With the development of underwater sonar detection technology,simultaneous localization and mapping(SLAM)approach has attracted much attention in underwater navigation field in recent years.But the weak detection ability of a single vehicle limits the SLAM performance in wide areas.Thereby,cooperative SLAM using multiple vehicles has become an important research direction.The key factor of cooperative SLAM is timely and efficient sonar image transmission among underwater vehicles.However,the limited bandwidth of underwater acoustic channels contradicts a large amount of sonar image data.It is essential to compress the images before transmission.Recently,deep neural networks have great value in image compression by virtue of the powerful learning ability of neural networks,but the existing sonar image compression methods based on neural network usually focus on the pixel-level information without the semantic-level information.In this paper,we propose a novel underwater acoustic transmission scheme called UAT-SSIC that includes semantic segmentation-based sonar image compression(SSIC)framework and the joint source-channel codec,to improve the accuracy of the semantic information of the reconstructed sonar image at the receiver.The SSIC framework consists of Auto-Encoder structure-based sonar image compression network,which is measured by a semantic segmentation network's residual.Considering that sonar images have the characteristics of blurred target edges,the semantic segmentation network used a special dilated convolution neural network(DiCNN)to enhance segmentation accuracy by expanding the range of receptive fields.The joint source-channel codec with unequal error protection is proposed that adjusts the power level of the transmitted data,which deal with sonar image transmission error caused by the serious underwater acoustic channel.Experiment results demonstrate that our method preserves more semantic information,with advantages over existing methods at the same compression ratio.It also improves the error tolerance and packet loss resistance of transmission. 展开更多
关键词 Semantic segmentation Sonar image transmission Learning-based compression
下载PDF
上一页 1 2 190 下一页 到第
使用帮助 返回顶部