期刊文献+
共找到1,063篇文章
< 1 2 54 >
每页显示 20 50 100
Laboratory or Department?Exploration and Creation in Computer Science and Technology
1
作者 Ann Copestake 《计算机教育》 2024年第3期13-16,共4页
In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in it... In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem. 展开更多
关键词 Laboratory or department University of Cambridge Boundaries Exploration and creativity
下载PDF
Panel Discussion on“Development Trends of Computer Science in the New Era”
2
作者 Andrew Yao Nancy M.Amato +3 位作者 Ann Copestake Sukyoung Ryu Yike Guo Yaqin Zhang 《计算机教育》 2024年第3期26-29,共4页
At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in t... At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in the field.6 heads of university computer science departments participated in the discussions,including the moderator,Professor Andrew Yao.The first issue was how universities are managing the growing number of applicants in addition to swelling class sizes.Several approaches were suggested,including increasing faculty hiring,implementing scalable teaching tools,and working closer with other departments through degree programs that integrate computer science with other fields.The second issue was about the position and role of computer science within broader science.Participants generally agreed that all fields are increasingly relying on computer science techniques,and that effectively disseminating these techniques to others is a key to unlocking broader scientific progress. 展开更多
关键词 Development trends Computer science
下载PDF
Design and Analysis of Power and Transmission System of Downhole Pure Electric Command Vehicle
3
作者 Md Jahangir Alam Md Shahriar Sujan +1 位作者 Md. Al Imran Tapu Joy Howlader 《Journal of Transportation Technologies》 2024年第1期31-52,共22页
Electric vehicles use electric motors, which turn electrical energy into mechanical energy. As electric motors are conventionally used in all the industry, it is an established development site. It’s a mature technol... Electric vehicles use electric motors, which turn electrical energy into mechanical energy. As electric motors are conventionally used in all the industry, it is an established development site. It’s a mature technology with ideal power and torque curves for vehicular operation. Conventional vehicles use oil and gas as fuel or energy storage. Although they also have an excellent economic impact, the continuous use of oil and gas threatened the world’s reservation of total oil and gas. Also, they emit carbon dioxide and some toxic ingredients through the vehicle’s tailpipe, which causes the greenhouse effect and seriously impacts the environment. So, as an alternative, electric car refers to a green technology of decarbonization with zero emission of greenhouse gases through the tailpipe. So, they can remove the problem of greenhouse gas emissions and solve the world’s remaining non-renewable energy storage problem. Pure electric vehicles (PEV) can be applied in all spheres, but their special implementation can only be seen in downhole operations. They are used for low noise and less pollution in the downhole process. In this study, the basic structure of the pure electric command vehicle is studied, the main components of the command vehicle power system, namely the selection of the drive motor and the power battery, are analyzed, and the main parameters of the drive motor and the power battery are designed and calculated. The checking calculation results show that the power and transmission system developed in this paper meets the design requirements, and the design scheme is feasible and reasonable. 展开更多
关键词 Pure Electric Vehicles TRANSMISSION GEARS Electronic Differential Control Algorithms
下载PDF
Neurological rehabilitation of stroke patients via motor imaginary-based brain-computer interface technology
4
作者 Hongyu Sun Yang Xiang Mingdao Yang 《Neural Regeneration Research》 SCIE CAS CSCD 2011年第28期2198-2202,共5页
The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients.Results from the Berg Balance Scale and the Holden Walking Classificatio... The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients.Results from the Berg Balance Scale and the Holden Walking Classification were significantly greater at 4 weeks after treatment (P < 0.01),which suggested that motor imaginary-based brain-computer interface technology improved balance and walking in stroke patients. 展开更多
关键词 接口技术 电机 患者 中风 神经康复 康复训练 平衡
下载PDF
Analysis and Research for the Technology of Remote Transaction Mirror Image
5
作者 高建华 朱小骏 《Journal of Donghua University(English Edition)》 EI CAS 2004年第5期51-54,共4页
The technology of remote transaction mirror image is a feasible, low-investment and well-effect disaster backup scheme in finance business system. The basic idea, construction, working principles and characteristic of... The technology of remote transaction mirror image is a feasible, low-investment and well-effect disaster backup scheme in finance business system. The basic idea, construction, working principles and characteristic of remote transaction mirror image are presented in this paper. We analyze and compare similarities and differences among this disaster backup scheme and others usually used. The technology of remote transaction mirror image have the advantages such as less requiring of software and hardware system platform, low-investment, being able to control and restore lost data, insuring the data consistency and integrity. 展开更多
关键词 灾难备分 数据安全 生产系统 恢复系统
下载PDF
Insight into the liver dysfunction in COVID-19 patients: Molecular mechanisms and possible therapeutic strategies 被引量:1
6
作者 Naina Khullar Jasvinder Singh Bhatti +3 位作者 Satwinder Singh Bhawana Thukral P Hemachandra Reddy Gurjit Kaur Bhatti 《World Journal of Gastroenterology》 SCIE CAS 2023年第14期2064-2077,共14页
As of June 2022,more than 530 million people worldwide have become ill with coronavirus disease 2019(COVID-19).Although COVID-19 is most commonly associated with respiratory distress(severe acute respiratory syndrome)... As of June 2022,more than 530 million people worldwide have become ill with coronavirus disease 2019(COVID-19).Although COVID-19 is most commonly associated with respiratory distress(severe acute respiratory syndrome),metaanalysis have indicated that liver dysfunction also occurs in patients with severe symptoms.Current studies revealed distinctive patterning in the receptors on the hepatic cells that helps in viral invasion through the expression of angiotensinconverting enzyme receptors.It has also been reported that in some patients with COVID-19,therapeutic strategies,including repurposed drugs(mitifovir,lopinavir/ritonavir,tocilizumab,etc.)triggered liver injury and cholestatic toxicity.Several proven indicators support cytokine storm-induced hepatic damage.Because there are 1.5 billion patients with chronic liver disease worldwide,it becomes imperative to critically evaluate the molecular mechanisms concerning hepatotropism of COVID-19 and identify new potential therapeutics.This review also designated a comprehensive outlook of comorbidities and the impact of lifestyle and genetics in managing patients with COVID-19. 展开更多
关键词 COVID-19 Liver damage PHARMACOTHERAPY Cytokine storm Molecular mechanisms
下载PDF
Optimization and Deployment of Memory-Intensive Operations in Deep Learning Model on Edge
7
作者 Peng XU Jianxin ZHAO Chi Harold LIU 《计算机科学》 CSCD 北大核心 2023年第2期3-12,共10页
As a large amount of data is increasingly generated from edge devices,such as smart homes,mobile phones,and wearable devices,it becomes crucial for many applications to deploy machine learning modes across edge device... As a large amount of data is increasingly generated from edge devices,such as smart homes,mobile phones,and wearable devices,it becomes crucial for many applications to deploy machine learning modes across edge devices.The execution speed of the deployed model is a key element to ensure service quality.Considering a highly heterogeneous edge deployment scenario,deep learning compiling is a novel approach that aims to solve this problem.It defines models using certain DSLs and generates efficient code implementations on different hardware devices.However,there are still two aspects that are not yet thoroughly investigated yet.The first is the optimization of memory-intensive operations,and the second problem is the heterogeneity of the deployment target.To that end,in this work,we propose a system solution that optimizes memory-intensive operation,optimizes the subgraph distribution,and enables the compiling and deployment of DNN models on multiple targets.The evaluation results show the performance of our proposed system. 展开更多
关键词 Memory optimization Deep compiler Computation optimization Model deployment Edge computing
下载PDF
Multi-head attention graph convolutional network model:End-to-end entity and relation joint extraction based on multi-head attention graph convolutional network
8
作者 Zhihua Tao Chunping Ouyang +2 位作者 Yongbin Liu Tonglee Chung Yixin Cao 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期468-477,共10页
At present,the entity and relation joint extraction task has attracted more and more scholars'attention in the field of natural language processing(NLP).However,most of their methods rely on NLP tools to construct... At present,the entity and relation joint extraction task has attracted more and more scholars'attention in the field of natural language processing(NLP).However,most of their methods rely on NLP tools to construct dependency trees to obtain sentence structure information.The adjacency matrix constructed by the dependency tree can convey syntactic information.Dependency trees obtained through NLP tools are too dependent on the tools and may not be very accurate in contextual semantic description.At the same time,a large amount of irrelevant information will cause redundancy.This paper presents a novel end-to-end entity and relation joint extraction based on the multihead attention graph convolutional network model(MAGCN),which does not rely on external tools.MAGCN generates an adjacency matrix through a multi-head attention mechanism to form an attention graph convolutional network model,uses head selection to identify multiple relations,and effectively improve the prediction result of overlapping relations.The authors extensively experiment and prove the method's effectiveness on three public datasets:NYT,WebNLG,and CoNLL04.The results show that the authors’method outperforms the state-of-the-art research results for the task of entities and relation extraction. 展开更多
关键词 information retrieval natural language processing
下载PDF
LSTDA: Link Stability and Transmission Delay Aware Routing Mechanism for Flying Ad-Hoc Network (FANET)
9
作者 Farman Ali Khalid Zaman +4 位作者 Babar Shah Tariq Hussain Habib Ullah Altaf Hussain Daehan Kwak 《Computers, Materials & Continua》 SCIE EI 2023年第10期963-981,共19页
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face... The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL. 展开更多
关键词 LSTDA routing protocol Flying Ad-hoc Network link stability unmanned aerial vehicles maxim priority channel
下载PDF
Special Topic on Reinforcement Learning and Intelligent Decision
10
作者 GAO Yang 《ZTE Communications》 2023年第3期1-2,共2页
Over the past few years,deep reinforcement learning(RL)has made remarkable progress in a range of applications,including Go games,vision-based control,and generative dialogue systems.Via error-and-trial mechanisms,dee... Over the past few years,deep reinforcement learning(RL)has made remarkable progress in a range of applications,including Go games,vision-based control,and generative dialogue systems.Via error-and-trial mechanisms,deep RL enables data-driven optimization and sequential decision-making in uncertain environments.Compared to traditional programming or heuristic optimization methods,deep RL can elegantly balance exploration and exploitation and handle environmental uncertainties.As a result,this learning paradigm has attracted increasing attention from both academia and industry and is paving a new path for largescale complex decision-making applications. 展开更多
关键词 HANDLE OPTIMIZATION PROGRAMMING
下载PDF
Wireless channel estimation for high-speed rail communications:Challenges,solutions and future directions
11
作者 Xuying Chen Wei Chen +2 位作者 Xiao Gong Bo Ai Ian Wassell 《High-Speed Railway》 2023年第1期18-22,共5页
With the development of High-Speed Rail(HSR),countries and individual passengers alike have enjoyed far ranging benefits as a result-economic,social,environment and in added convenience.One of the important parts of H... With the development of High-Speed Rail(HSR),countries and individual passengers alike have enjoyed far ranging benefits as a result-economic,social,environment and in added convenience.One of the important parts of HSR construction is the signaling system,where wireless communications play a key role in the transmission of train control data.Channel estimation has a significant impact on the quality of the wireless communication,however,whose performance is degraded due to the fast mobility of HSR.This paper focuses on the channel estimation technology in HSR.We first summarize the key challenges for HSR channel estimation,especially the Inter-Carrier Interference(ICI)faced by Orthogonal Frequency Division Multiplexing(OFDM)systems.Then we provide a comprehensive review of existing pilot-aided channel estimation schemes from three points:channel model,estimation algorithm,joint channel estimation and ICI mitigation schemes.Lastly,we present the challenges of channel estimation for the Orthogonal Time Frequency Space(OTFS)system and Reconfigurable Intelligent Surface(RIS),which are promising techniques for HSR systems in the future sixth Generation(6G)wireless communication. 展开更多
关键词 Channel estimation High-speed rail Inter carrier interference
下载PDF
Design and Optimization of Actuator for HT-25 Multifunctional Loader
12
作者 Md. Al Imran Tapu Joy Howlader +2 位作者 Md. Shahriar Sujan Md. Jahangir Alam Md. Mehedi Hassan 《World Journal of Engineering and Technology》 2023年第4期874-892,共19页
To break down the development interaction of the working gadget of the multi-practical wheel loader and to compute the heap of each part, the Denavit-Hartenberg strategy was applied to build up the kinematics of the i... To break down the development interaction of the working gadget of the multi-practical wheel loader and to compute the heap of each part, the Denavit-Hartenberg strategy was applied to build up the kinematics of the instrument model. Also, all the while, set up the elements model of dynamic framework. A multi-body element programming MSC, ADAMS and its active module were applied to assemble component power through a pressure framework reenactment model. An entirety working cycle interaction of the functioning gadget of the wheel loader was mimicked, and the investigation results thoroughly show the development interaction of the functional device and the stacked state of each part, and check the mechanical properties of the working gadget and dynamic execution water-driven framework effectively. 展开更多
关键词 Multifunctional Loader Hydraulic Circuit CAD Power System Hydraulic Actuator and Pump
下载PDF
Workout Action Recognition in Video Streams Using an Attention Driven Residual DC-GRU Network
13
作者 Arnab Dey Samit Biswas Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2024年第5期3067-3087,共21页
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i... Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in videostreams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enableinstant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing actiondatasets often lack diversity and specificity for workout actions, hindering the development of accurate recognitionmodels. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significantcontribution. WAVd comprises a diverse collection of labeled workout action videos, meticulously curated toencompass various exercises performed by numerous individuals in different settings. This research proposes aninnovative framework based on the Attention driven Residual Deep Convolutional-Gated Recurrent Unit (ResDCGRU)network for workout action recognition in video streams. Unlike image-based action recognition, videoscontain spatio-temporal information, making the task more complex and challenging. While substantial progresshas been made in this area, challenges persist in detecting subtle and complex actions, handling occlusions,and managing the computational demands of deep learning approaches. The proposed ResDC-GRU Attentionmodel demonstrated exceptional classification performance with 95.81% accuracy in classifying workout actionvideos and also outperformed various state-of-the-art models. The method also yielded 81.6%, 97.2%, 95.6%, and93.2% accuracy on established benchmark datasets, namely HMDB51, Youtube Actions, UCF50, and UCF101,respectively, showcasing its superiority and robustness in action recognition. The findings suggest practicalimplications in real-world scenarios where precise video action recognition is paramount, addressing the persistingchallenges in the field. TheWAVd dataset serves as a catalyst for the development ofmore robust and effective fitnesstracking systems and ultimately promotes healthier lifestyles through improved exercise monitoring and analysis. 展开更多
关键词 Workout action recognition video stream action recognition residual network GRU ATTENTION
下载PDF
Mastering air combat game with deep reinforcement learning
14
作者 Jingyu Zhu Minchi Kuang +3 位作者 Wenqing Zhou Heng Shi Jihong Zhu Xu Han 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期295-312,共18页
Reinforcement learning has been applied to air combat problems in recent years,and the idea of curriculum learning is often used for reinforcement learning,but traditional curriculum learning suffers from the problem ... Reinforcement learning has been applied to air combat problems in recent years,and the idea of curriculum learning is often used for reinforcement learning,but traditional curriculum learning suffers from the problem of plasticity loss in neural networks.Plasticity loss is the difficulty of learning new knowledge after the network has converged.To this end,we propose a motivational curriculum learning distributed proximal policy optimization(MCLDPPO)algorithm,through which trained agents can significantly outperform the predictive game tree and mainstream reinforcement learning methods.The motivational curriculum learning is designed to help the agent gradually improve its combat ability by observing the agent's unsatisfactory performance and providing appropriate rewards as a guide.Furthermore,a complete tactical maneuver is encapsulated based on the existing air combat knowledge,and through the flexible use of these maneuvers,some tactics beyond human knowledge can be realized.In addition,we designed an interruption mechanism for the agent to increase the frequency of decisionmaking when the agent faces an emergency.When the number of threats received by the agent changes,the current action is interrupted in order to reacquire observations and make decisions again.Using the interruption mechanism can significantly improve the performance of the agent.To simulate actual air combat better,we use digital twin technology to simulate real air battles and propose a parallel battlefield mechanism that can run multiple simulation environments simultaneously,effectively improving data throughput.The experimental results demonstrate that the agent can fully utilize the situational information to make reasonable decisions and provide tactical adaptation in the air combat,verifying the effectiveness of the algorithmic framework proposed in this paper. 展开更多
关键词 Air combat MCLDPPO Interruption mechanism Digital twin Distributed system
下载PDF
Developing Lexicons for Enhanced Sentiment Analysis in Software Engineering:An Innovative Multilingual Approach for Social Media Reviews
15
作者 Zohaib Ahmad Khan Yuanqing Xia +4 位作者 Ahmed Khan Muhammad Sadiq Mahmood Alam Fuad AAwwad Emad A.A.Ismail 《Computers, Materials & Continua》 SCIE EI 2024年第5期2771-2793,共23页
Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significantsource of user-generated content. The development of sentiment lexicons that can support languages ot... Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significantsource of user-generated content. The development of sentiment lexicons that can support languages other thanEnglish is a challenging task, especially for analyzing sentiment analysis in social media reviews. Most existingsentiment analysis systems focus on English, leaving a significant research gap in other languages due to limitedresources and tools. This research aims to address this gap by building a sentiment lexicon for local languages,which is then used with a machine learning algorithm for efficient sentiment analysis. In the first step, a lexiconis developed that includes five languages: Urdu, Roman Urdu, Pashto, Roman Pashto, and English. The sentimentscores from SentiWordNet are associated with each word in the lexicon to produce an effective sentiment score. Inthe second step, a naive Bayesian algorithm is applied to the developed lexicon for efficient sentiment analysis ofRoman Pashto. Both the sentiment lexicon and sentiment analysis steps were evaluated using information retrievalmetrics, with an accuracy score of 0.89 for the sentiment lexicon and 0.83 for the sentiment analysis. The resultsshowcase the potential for improving software engineering tasks related to user feedback analysis and productdevelopment. 展开更多
关键词 Emotional assessment regional dialects SentiWordNet naive bayesian technique lexicons software engineering user feedback
下载PDF
Generative adversarial networks based motion learning towards robotic calligraphy synthesis
16
作者 Xiaoming Wang Yilong Yang +3 位作者 Weiru Wang Yuanhua Zhou Yongfeng Yin Zhiguo Gong 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期452-466,共15页
Robot calligraphy visually reflects the motion capability of robotic manipulators.While traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article... Robot calligraphy visually reflects the motion capability of robotic manipulators.While traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a generative adversarial network(GAN)-based motion learning method for robotic calligraphy synthesis(Gan2CS)that can enhance the efficiency in writing complex calligraphy words and reproducing classic calligraphy works.The key technologies in the proposed approach include:(1)adopting the GAN to learn the motion parameters from the robot writing operation;(2)converting the learnt motion data into the style font and realising the transition from static calligraphy images to dynamic writing demonstration;(3)reproducing high-precision calligraphy works by synthesising the writing motion data hierarchically.In this study,the motion trajectories of sample calligraphy images are firstly extracted and converted into the robot module.The robot performs the writing with motion planning,and the writing motion parameters of calligraphy strokes are learnt with GANs.Then the motion data of basic strokes is synthesised based on the hierarchical process of‘stroke-radicalpart-character’.And the robot re-writes the synthesised characters whose similarity with the original calligraphy characters is evaluated.Regular calligraphy characters have been tested in the experiments for method validation and the results validated that the robot can actualise the robotic calligraphy synthesis of writing motion data with GAN. 展开更多
关键词 calligraphy synthesis generative adversarial networks Motion learning robot writing
下载PDF
Rule acquisition of three-way semi-concept lattices in formal decision context
17
作者 Jie Zhao Renxia Wan +1 位作者 Duoqian Miao Boyang Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期333-347,共15页
Three-way concept analysis is an important tool for information processing,and rule acquisition is one of the research hotspots of three-way concept analysis.However,compared with three-way concept lattices,three-way ... Three-way concept analysis is an important tool for information processing,and rule acquisition is one of the research hotspots of three-way concept analysis.However,compared with three-way concept lattices,three-way semi-concept lattices have three-way operators with weaker constraints,which can generate more concepts.In this article,the problem of rule acquisition for three-way semi-concept lattices is discussed in general.The authors construct the finer relation of three-way semi-concept lattices,and propose a method of rule acquisition for three-way semi-concept lattices.The authors also discuss the set of decision rules and the relationships of decision rules among object-induced three-way semi-concept lattices,object-induced three-way concept lattices,classical concept lattices and semi-concept lattices.Finally,examples are provided to illustrate the validity of our conclusions. 展开更多
关键词 finer relation rule acquisition three-way concept analysis three-way semi-concept lattices
下载PDF
Overview of the Third Global Forum
18
作者 Andrew Yao Xia Yin +1 位作者 Jia Jia Guoliang Li 《计算机教育》 2024年第3期5-9,共5页
Computer science continues to grow at a rapid pace,raising the issue of how universities can best adapt to this trend.At the third Global Forum on the Development of Computer Science(GFDCS),five heads of departments o... Computer science continues to grow at a rapid pace,raising the issue of how universities can best adapt to this trend.At the third Global Forum on the Development of Computer Science(GFDCS),five heads of departments of computer science from Asia,Europe,and North America came together to exchange ideas under the theme Challenges and Opportunities of Computer Science in the New Era.Through the discussions,a number of new challenges were explored,including how to meet the growing demand for computer science education,how to manage increased teaching loads,how to foster collaboration between computer science and other disciplines,how to raise ethical awareness,and how to support new“transdisciplinary”modes of education and research.At the same time,there was a consensus on the need to strengthen the role of computer science in other departments,the importance of industrial collaboration,and the need for more scalable approaches to teaching.The evolving role of computer science within the context of broader science was also discussed. 展开更多
关键词 Global Forum on the Development of Computer Science Challenges and Opportunities of Computer Science TRANSDISCIPLINARY Computer Science education and research
下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
19
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Enhanced Fourier Transform Using Wavelet Packet Decomposition
20
作者 Wouladje Cabrel Golden Tendekai Mumanikidzwa +1 位作者 Jianguo Shen Yutong Yan 《Journal of Sensor Technology》 2024年第1期1-15,共15页
Many domains, including communication, signal processing, and image processing, use the Fourier Transform as a mathematical tool for signal analysis. Although it can analyze signals with steady and transitory properti... Many domains, including communication, signal processing, and image processing, use the Fourier Transform as a mathematical tool for signal analysis. Although it can analyze signals with steady and transitory properties, it has limits. The Wavelet Packet Decomposition (WPD) is a novel technique that we suggest in this study as a way to improve the Fourier Transform and get beyond these drawbacks. In this experiment, we specifically considered the utilization of Daubechies level 4 for the wavelet transformation. The choice of Daubechies level 4 was motivated by several reasons. Daubechies wavelets are known for their compact support, orthogonality, and good time-frequency localization. By choosing Daubechies level 4, we aimed to strike a balance between preserving important transient information and avoiding excessive noise or oversmoothing in the transformed signal. Then we compared the outcomes of our suggested approach to the conventional Fourier Transform using a non-stationary signal. The findings demonstrated that the suggested method offered a more accurate representation of non-stationary and transient signals in the frequency domain. Our method precisely showed a 12% reduction in MSE and a 3% rise in PSNR for the standard Fourier transform, as well as a 35% decrease in MSE and an 8% increase in PSNR for voice signals when compared to the traditional wavelet packet decomposition method. 展开更多
关键词 Fourier Transform Wavelet Packet Decomposition Time-Frequency Analysis Non-Stationary Signals
下载PDF
上一页 1 2 54 下一页 到第
使用帮助 返回顶部