期刊文献+
共找到280篇文章
< 1 2 14 >
每页显示 20 50 100
Unsupervised Color Segmentation with Reconstructed Spatial Weighted Gaussian Mixture Model and Random Color Histogram
1
作者 Umer Sadiq Khan Zhen Liu +5 位作者 Fang Xu Muhib Ullah Khan Lerui Chen Touseef Ahmed Khan Muhammad Kashif Khattak Yuquan Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第3期3323-3348,共26页
Image classification and unsupervised image segmentation can be achieved using the Gaussian mixture model.Although the Gaussian mixture model enhances the flexibility of image segmentation,it does not reflect spatial ... Image classification and unsupervised image segmentation can be achieved using the Gaussian mixture model.Although the Gaussian mixture model enhances the flexibility of image segmentation,it does not reflect spatial information and is sensitive to the segmentation parameter.In this study,we first present an efficient algorithm that incorporates spatial information into the Gaussian mixture model(GMM)without parameter estimation.The proposed model highlights the residual region with considerable information and constructs color saliency.Second,we incorporate the content-based color saliency as spatial information in the Gaussian mixture model.The segmentation is performed by clustering each pixel into an appropriate component according to the expectation maximization and maximum criteria.Finally,the random color histogram assigns a unique color to each cluster and creates an attractive color by default for segmentation.A random color histogram serves as an effective tool for data visualization and is instrumental in the creation of generative art,facilitating both analytical and aesthetic objectives.For experiments,we have used the Berkeley segmentation dataset BSDS-500 and Microsoft Research in Cambridge dataset.In the study,the proposed model showcases notable advancements in unsupervised image segmentation,with probabilistic rand index(PRI)values reaching 0.80,BDE scores as low as 12.25 and 12.02,compactness variations at 0.59 and 0.7,and variation of information(VI)reduced to 2.0 and 1.49 for the BSDS-500 and MSRC datasets,respectively,outperforming current leading-edge methods and yielding more precise segmentations. 展开更多
关键词 Unsupervised segmentation color saliency spatial weighted GMM random color histogram
下载PDF
Selective and Adaptive Incremental Transfer Learning with Multiple Datasets for Machine Fault Diagnosis
2
作者 Kwok Tai Chui Brij B.Gupta +1 位作者 Varsha Arya Miguel Torres-Ruiz 《Computers, Materials & Continua》 SCIE EI 2024年第1期1363-1379,共17页
The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation fo... The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure,and thus timely maintenance can ensure safe operations.Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model,which typically involves two datasets.In response to the availability of multiple datasets,this paper proposes using selective and adaptive incremental transfer learning(SA-ITL),which fuses three algorithms,namely,the hybrid selective algorithm,the transferability enhancement algorithm,and the incremental transfer learning algorithm.It is a selective algorithm that enables selecting and ordering appropriate datasets for transfer learning and selecting useful knowledge to avoid negative transfer.The algorithm also adaptively adjusts the portion of training data to balance the learning rate and training time.The proposed algorithm is evaluated and analyzed using ten benchmark datasets.Compared with other algorithms from existing works,SA-ITL improves the accuracy of all datasets.Ablation studies present the accuracy enhancements of the SA-ITL,including the hybrid selective algorithm(1.22%-3.82%),transferability enhancement algorithm(1.91%-4.15%),and incremental transfer learning algorithm(0.605%-2.68%).These also show the benefits of enhancing the target model with heterogeneous image datasets that widen the range of domain selection between source and target domains. 展开更多
关键词 Deep learning incremental learning machine fault diagnosis negative transfer transfer learning
下载PDF
A HybridManufacturing ProcessMonitoringMethod Using Stacked Gated Recurrent Unit and Random Forest
3
作者 Chao-Lung Yang Atinkut Atinafu Yilma +2 位作者 Bereket Haile Woldegiorgis Hendrik Tampubolon Hendri Sutrisno 《Intelligent Automation & Soft Computing》 2024年第2期233-254,共22页
This study proposed a new real-time manufacturing process monitoring method to monitor and detect process shifts in manufacturing operations.Since real-time production process monitoring is critical in today’s smart ... This study proposed a new real-time manufacturing process monitoring method to monitor and detect process shifts in manufacturing operations.Since real-time production process monitoring is critical in today’s smart manufacturing.The more robust the monitoring model,the more reliable a process is to be under control.In the past,many researchers have developed real-time monitoring methods to detect process shifts early.However,thesemethods have limitations in detecting process shifts as quickly as possible and handling various data volumes and varieties.In this paper,a robust monitoring model combining Gated Recurrent Unit(GRU)and Random Forest(RF)with Real-Time Contrast(RTC)called GRU-RF-RTC was proposed to detect process shifts rapidly.The effectiveness of the proposed GRU-RF-RTC model is first evaluated using multivariate normal and nonnormal distribution datasets.Then,to prove the applicability of the proposed model in a realmanufacturing setting,the model was evaluated using real-world normal and non-normal problems.The results demonstrate that the proposed GRU-RF-RTC outperforms other methods in detecting process shifts quickly with the lowest average out-of-control run length(ARL1)in all synthesis and real-world problems under normal and non-normal cases.The experiment results on real-world problems highlight the significance of the proposed GRU-RF-RTC model in modern manufacturing process monitoring applications.The result reveals that the proposed method improves the shift detection capability by 42.14%in normal and 43.64%in gamma distribution problems. 展开更多
关键词 Smart manufacturing process monitoring quality control gated recurrent unit neural network random forest
下载PDF
Design and platform testing of the compact torus central fueling device for the EAST tokamak 被引量:1
4
作者 孔德峰 庄革 +15 位作者 兰涛 张寿彪 叶扬 董期龙 陈晨 吴捷 张森 赵志豪 孟凡卫 张小辉 黄艳清 文斐 訾鹏飞 李磊 胡广海 宋云涛 《Plasma Science and Technology》 SCIE EI CAS CSCD 2023年第6期95-102,共8页
Compact torus(CT)injection is a highly promising technique for the central fueling of future reactor-grade fusion devices since it features extremely high injection velocity and relatively high plasma mass.Recently,a ... Compact torus(CT)injection is a highly promising technique for the central fueling of future reactor-grade fusion devices since it features extremely high injection velocity and relatively high plasma mass.Recently,a CT injector for the EAST tokamak,EAST-CTI,was developed and platform-tested.In the first round of experiments conducted with low parameter settings,the maximum velocity and mass of the CT plasma were 150 km·s^(-1)and 90μg,respectively.However,the parameters obtained by EAST-CTI were still very low and were far from the requirements of a device such as EAST that has a strong magnetic field.In future,we plan to solve the spark problem that EAST-CTI currently encounters(that mainly hinders the further development of experiments)through engineering methods,and use greater power to obtain a more stable and suitable CT plasma for EAST. 展开更多
关键词 compact torus(CT) central fueling EAST-CTI EAST tokamak
下载PDF
A Preoperative 3D Computer-Aided Segmentation and Reconstruction System for Lung Tumor
5
作者 Chii-Jen Chen You-Wei Wang 《通讯和计算机(中英文版)》 2012年第4期422-425,共4页
关键词 计算机辅助诊断 CAD系统 区域分割 肺肿瘤 三维 计算机断层扫描 医疗成像 临床治疗
下载PDF
Optimizing Big Data Retrieval and Job Scheduling Using Deep Learning Approaches
6
作者 Bao Rong Chang Hsiu-Fen Tsai Yu-Chieh Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第2期783-815,共33页
Big data analytics in business intelligence do not provide effective data retrieval methods and job scheduling that will cause execution inefficiency and low system throughput.This paper aims to enhance the capability... Big data analytics in business intelligence do not provide effective data retrieval methods and job scheduling that will cause execution inefficiency and low system throughput.This paper aims to enhance the capability of data retrieval and job scheduling to speed up the operation of big data analytics to overcome inefficiency and low throughput problems.First,integrating stacked sparse autoencoder and Elasticsearch indexing explored fast data searching and distributed indexing,which reduces the search scope of the database and dramatically speeds up data searching.Next,exploiting a deep neural network to predict the approximate execution time of a job gives prioritized job scheduling based on the shortest job first,which reduces the average waiting time of job execution.As a result,the proposed data retrieval approach outperforms the previous method using a deep autoencoder and Solr indexing,significantly improving the speed of data retrieval up to 53%and increasing system throughput by 53%.On the other hand,the proposed job scheduling algorithmdefeats both first-in-first-out andmemory-sensitive heterogeneous early finish time scheduling algorithms,effectively shortening the average waiting time up to 5%and average weighted turnaround time by 19%,respectively. 展开更多
关键词 Stacked sparse autoencoder Elasticsearch distributed indexing data retrieval deep neural network job scheduling
下载PDF
A Processor Performance Prediction Method Based on Interpretable Hierarchical Belief Rule Base and Sensitivity Analysis
7
作者 Chen Wei-wei He Wei +3 位作者 Zhu Hai-long Zhou Guo-hui Mu Quan-qi Han Peng 《Computers, Materials & Continua》 SCIE EI 2023年第3期6119-6143,共25页
The prediction of processor performance has important referencesignificance for future processors. Both the accuracy and rationality of theprediction results are required. The hierarchical belief rule base (HBRB)can i... The prediction of processor performance has important referencesignificance for future processors. Both the accuracy and rationality of theprediction results are required. The hierarchical belief rule base (HBRB)can initially provide a solution to low prediction accuracy. However, theinterpretability of the model and the traceability of the results still warrantfurther investigation. Therefore, a processor performance prediction methodbased on interpretable hierarchical belief rule base (HBRB-I) and globalsensitivity analysis (GSA) is proposed. The method can yield more reliableprediction results. Evidence reasoning (ER) is firstly used to evaluate thehistorical data of the processor, followed by a performance prediction modelwith interpretability constraints that is constructed based on HBRB-I. Then,the whale optimization algorithm (WOA) is used to optimize the parameters.Furthermore, to test the interpretability of the performance predictionprocess, GSA is used to analyze the relationship between the input and thepredicted output indicators. Finally, based on the UCI database processordataset, the effectiveness and superiority of the method are verified. Accordingto our experiments, our prediction method generates more reliable andaccurate estimations than traditional models. 展开更多
关键词 Hierarchical belief rule base(HBRB) evidence reasoning(ER) INTERPRETABILITY global sensitivity analysis(GSA) whale optimization algorithm(WOA)
下载PDF
Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base
8
作者 Xiaoyu Cheng Mingxian Long +1 位作者 Wei He Hailong Zhu 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2821-2844,共24页
Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the mil... Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets. 展开更多
关键词 Fault detection milling system belief rule base fault tree analysis evidence reasoning
下载PDF
Age and Gender Classification Using Backpropagation and Bagging Algorithms
9
作者 Ammar Almomani Mohammed Alweshah +6 位作者 Waleed Alomoush Mohammad Alauthman Aseel Jabai Anwar Abbass Ghufran Hamad Meral Abdalla Brij B.Gupta 《Computers, Materials & Continua》 SCIE EI 2023年第2期3045-3062,共18页
Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and ... Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and classify gender,age,and accent.So,a newsystem calledClassifyingVoice Gender,Age,and Accent(CVGAA)is proposed.Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories.It has high precision compared to other algorithms used in this problem,as the adaptive backpropagation algorithm had an accuracy of 98%and the Bagging algorithm had an accuracy of 98.10%in the gender identification data.Bagging has the best accuracy among all algorithms,with 55.39%accuracy in the voice common dataset and age classification and accent accuracy in a speech accent of 78.94%. 展开更多
关键词 Classify voice gender ACCENT age bagging algorithms back propagation algorithms AI classifiers
下载PDF
Traffic Flow Prediction with Heterogeneous Spatiotemporal Data Based on a Hybrid Deep Learning Model Using Attention-Mechanism
10
作者 Jing-Doo Wang Chayadi Oktomy Noto Susanto 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1711-1728,共18页
A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow acc... A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately.However,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors.This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention mechanisms.Prior studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast outcomes.In addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast outcomes.The experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature. 展开更多
关键词 Traffic flow prediction sptiotemporal data heterogeneous data Conv-BiLSTM DATA-CENTRIC intra-data
下载PDF
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
11
作者 Fang Xu Songhao Jiang +3 位作者 Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1095-1113,共19页
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ... Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context. 展开更多
关键词 SIoT data forwarding social attributes social relations COMMUNITY
下载PDF
Computing Resource Allocation for Blockchain-Based Mobile Edge Computing
12
作者 Wanbo Zhang Yuqi Fan +2 位作者 Jun Zhang Xu Ding Jung Yoon Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期863-885,共23页
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a... Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC. 展开更多
关键词 Mobile edge computing blockchain resource allocation
下载PDF
Audio2AB:Audio-driven collaborative generation of virtual character animation
13
作者 Lichao NIU Wenjun XIE +2 位作者 Dong WANG Zhongrui CAO Xiaoping LIU 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期56-70,共15页
Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of success.However,few methods exist for generating full-body animation... Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of success.However,few methods exist for generating full-body animations,and the portability of virtual character gestures and facial animations has not received sufficient attention.Methods Therefore,we propose a deep-learning-based audio-to-animation-and-blendshape(Audio2AB)network that generates gesture animations and ARK it's 52 facial expression parameter blendshape weights based on audio,audio-corresponding text,emotion labels,and semantic relevance labels to generate parametric data for full-body animations.This parameterization method can be used to drive full-body animations of virtual characters and improve their portability.In the experiment,we first downsampled the gesture and facial data to achieve the same temporal resolution for the input,output,and facial data.The Audio2AB network then encoded the audio,audio-corresponding text,emotion labels,and semantic relevance labels,and then fused the text,emotion labels,and semantic relevance labels into the audio to obtain better audio features.Finally,we established links between the body,gestures,and facial decoders and generated the corresponding animation sequences through our proposed GAN-GF loss function.Results By using audio,audio-corresponding text,and emotional and semantic relevance labels as input,the trained Audio2AB network could generate gesture animation data containing blendshape weights.Therefore,different 3D virtual character animations could be created through parameterization.Conclusions The experimental results showed that the proposed method could generate significant gestures and facial animations. 展开更多
关键词 Audio-driven Virtual character Full-body animation Audio2AB Blendshape GAN-GF
下载PDF
A correlative classifiers approach based on particle filter and sample set for tracking occluded target 被引量:6
14
作者 LI Kang HE Fa-zhi +1 位作者 YU Hai-ping CHEN Xiao 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2017年第3期294-312,共19页
Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single... Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single classifier learn much of occluding background information which results in the decrease of tracking performance, and eventually lead to the failure of the tracking algorithm. This paper presents a new correlative classifiers approach to address the above problem. Our idea is to derive a group of correlative classifiers based on sample set method. Then we propose strategy to establish the classifiers and to query the suitable classifiers for the next frame tracking. In order to deal with nonlinear problem, particle filter is adopted and integrated with sample set method. For choosing the target from candidate particles, we define a similarity measurement between particles and sample set. The proposed sample set method includes the following steps. First, we cropped positive samples set around the target and negative samples set far away from the target. Second, we extracted average Haar-like feature from these samples and calculate their statistical characteristic which represents the target model. Third, we define the similarity measurement based on the statistical characteristic of these two sets to judge the similarity between candidate particles and target model. Finally, we choose the largest similarity score particle as the target in the new frame. A number of experiments show the robustness and efficiency of the proposed approach when compared with other state-of-the-art trackers. 展开更多
关键词 visual tracking sample set method online learning particle filter
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
15
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 分组密码算法 安全性分析 改进设计 安全问题 密码设计 动态分组 变换矩阵 内部结构
下载PDF
Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT 被引量:3
16
作者 Wugedele Bao Celimuge Wu +3 位作者 Siri Guleng Jiefang Zhang Kok-Lim Alvin Yau Yusheng Ji 《China Communications》 SCIE CSCD 2021年第6期39-52,共14页
In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in ... In order to support advanced vehicular Internet-of-Things(IoT)applications,information exchanges among different vehicles are required to find efficient solutions for catering to different application requirements in complex and dynamic vehicular environments.Federated learning(FL),which is a type of distributed learning technology,has been attracting great interest in recent years as it performs knowledge exchange among different network entities without a violation of user privacy.However,client selection and networking scheme for enabling FL in dynamic vehicular environments,which determines the communication delay between FL clients and the central server that aggregates the models received from the clients,is still under-explored.In this paper,we propose an edge computing-based joint client selection and networking scheme for vehicular IoT.The proposed scheme assigns some vehicles as edge vehicles by employing a distributed approach,and uses the edge vehicles as FL clients to conduct the training of local models,which learns optimal behaviors based on the interaction with environments.The clients also work as forwarder nodes in information sharing among network entities.The client selection takes into account the vehicle velocity,vehicle distribution,and the wireless link connectivity between vehicles using a fuzzy logic algorithm,resulting in an efficient learning and networking architecture.We use computer simulations to evaluate the proposed scheme in terms of the communication overhead and the information covered in learning. 展开更多
关键词 vehicular IoT federated learning client selection networking scheme
下载PDF
Cryptanalysis and improvement of controlled secure direct communication 被引量:2
17
作者 Kao Shih-Hung Hwang Tzonelih 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期203-205,共3页
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal ... This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw. 展开更多
关键词 quantum cryptography quantum communication
下载PDF
MHD Maxwell Fluid with Heat Transfer Analysis under Ramp Velocity and Ramp Temperature Subject to Non-Integer Differentiable Operators 被引量:2
18
作者 Thabet Abdeljawad Muhammad Bilal Riaz +1 位作者 Syed Tauseef Saeed Nazish Iftikhar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第2期821-841,共21页
The main focus of this study is to investigate the impact of heat generation/absorption with ramp velocity and ramp temperature on magnetohydrodynamic(MHD)time-dependent Maxwell fluid over an unbounded plate embedded ... The main focus of this study is to investigate the impact of heat generation/absorption with ramp velocity and ramp temperature on magnetohydrodynamic(MHD)time-dependent Maxwell fluid over an unbounded plate embedded in a permeable medium.Non-dimensional parameters along with Laplace transformation and inversion algorithms are used to find the solution of shear stress,energy,and velocity profile.Recently,new fractional differential operators are used to define ramped temperature and ramped velocity.The obtained analytical solutions are plotted for different values of emerging parameters.Fractional time derivatives are used to analyze the impact of fractional parameters(memory effect)on the dynamics of the fluid.While making a comparison,it is observed that the fractional-order model is best to explain the memory effect as compared to classical models.Our results suggest that the velocity profile decrease by increasing the effective Prandtl number.The existence of an effective Prandtl number may reflect the control of the thickness of momentum and enlargement of thermal conductivity.The incremental value of the M is observed for a decrease in the velocity field,which reflects to control resistive force.Further,it is noted that the Atangana-Baleanu derivative in Caputo sense(ABC)is the best to highlight the dynamics of the fluid.The influence of pertinent parameters is analyzed graphically for velocity and energy profile.Expressions for skin friction and Nusselt number are also derived for fractional differential operators. 展开更多
关键词 MHD Maxwell fluid fractional differential operator heat generation absorption thermal effect non-singular kernels
下载PDF
ACOUSTICAL TRANSMISSION LINE MODEL FOR ULTRASONIC TRANSDUCERS FOR WIDE-BANDWIDTH APPLICATION 被引量:1
19
作者 Yeongchin Chen 《Acta Mechanica Solida Sinica》 SCIE EI 2010年第2期124-134,共11页
An improved model for ultrasonic transducers is proposed. By considering only the first symmetric mode, each layer is represented as an acoustical transmission line in modeling of bulk wave transducers. In imaging app... An improved model for ultrasonic transducers is proposed. By considering only the first symmetric mode, each layer is represented as an acoustical transmission line in modeling of bulk wave transducers. In imaging applications, wide bandwidth and short time duration are required. The approach we have used consists of impedance matching the front face of the piezoelectric transducer to the propagating medium with a quarter wavelength impedance matching layer and inserting an nnmatching quarter wavelength acoustical layer between the rear face and backing material. A heavy backing would degrade the wide-band phenomena, but show a time duration shorter than 0.5 μs for imaging applications. PSPICE code of the controlled source model is implemented to precisely predict the performance of the matched transducers such as impedance, insertion loss, bandwidth and duration of the impulse response. Good agreement between the simulation and experimental results has been achieved. 展开更多
关键词 acoustical transmission line ultrasonic transducer wide-bandwidth PSPICE controlled source
下载PDF
Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction 被引量:1
20
作者 Jiin-Chiou Cheng Wen-Chung Kuo Bo-Rong Su 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第2期123-128,共6页
Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median ... Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median of nine pixels in each block of cover-image, it will give a hint for the attacker to hack the stego-image. In the paper, we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image. It will mix up the pixels in each image block and prevent the secret information from being extracted. The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding. 展开更多
关键词 Cover-image division arithmetic and generalized exploiting modification direction(DAGEMD) STEGO-IMAGE SUDOKU
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部