期刊文献+
共找到12,636篇文章
< 1 2 250 >
每页显示 20 50 100
Data Component:An Innovative Framework for Information Value Metrics in the Digital Economy
1
作者 Tao Xiaoming Wang Yu +5 位作者 Peng Jieyang Zhao Yuelin Wang Yue Wang Youzheng Hu Chengsheng Lu Zhipeng 《China Communications》 SCIE CSCD 2024年第5期17-35,共19页
The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive st... The increasing dependence on data highlights the need for a detailed understanding of its behavior,encompassing the challenges involved in processing and evaluating it.However,current research lacks a comprehensive structure for measuring the worth of data elements,hindering effective navigation of the changing digital environment.This paper aims to fill this research gap by introducing the innovative concept of“data components.”It proposes a graphtheoretic representation model that presents a clear mathematical definition and demonstrates the superiority of data components over traditional processing methods.Additionally,the paper introduces an information measurement model that provides a way to calculate the information entropy of data components and establish their increased informational value.The paper also assesses the value of information,suggesting a pricing mechanism based on its significance.In conclusion,this paper establishes a robust framework for understanding and quantifying the value of implicit information in data,laying the groundwork for future research and practical applications. 展开更多
关键词 data component data element data governance data science information theory
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
2
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
3
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Necessary prerequisites for evidence-based practice:results of investigating nurses'informatics competency and information literacy skills
4
作者 Jamileh Farokhzadian Somayeh Jouparinejad +3 位作者 Mahdieh Montazeri Elham Bakhshipour Amirreza Sabzi Fatemeh Falahati-Marvast 《Frontiers of Nursing》 2024年第1期67-76,共10页
This study aimed to evaluate the correlation between nursing informatics(NI)competency and information literacy skills for evidencebased practice(EBP)among intensive care nurses.This cross-sectional study was conducte... This study aimed to evaluate the correlation between nursing informatics(NI)competency and information literacy skills for evidencebased practice(EBP)among intensive care nurses.This cross-sectional study was conducted on 184 nurses working in intensive care units(ICUs).The study data were collected through demographic information,Nursing Informatics Competency Assessment Tool(NICAT),and information literacy skills for EBP questionnaires.The intensive care nurses received competent and low-moderate levels for the total scores of NI competency and information literacy skills,respectively.They received a moderate score for the use of different information resources but a low score for information searching skills,different search features,and knowledge about search operators,and only 31.5%of the nurses selected the most appropriate statement.NI competency and related subscales had a significant direct bidirectional correlation with information literacy skills for EBP and its subscales(P<0.05).Nurses require a high level of NI competency and information literacy for EBP to obtain up-to-date information and provide better care and decision-making.Health planners and policymakers should develop interventions to enhance NI competency and information literacy skills among nurses and motivate them to use EBP in clinical settings. 展开更多
关键词 evidence-based practice nursing informatics nursing informatics competency information literacy critical care nursing
下载PDF
Matching while Learning: Wireless Scheduling for Age of Information Optimization at the Edge 被引量:1
5
作者 Kun Guo Hao Yang +2 位作者 Peng Yang Wei Feng Tony Q.S.Quek 《China Communications》 SCIE CSCD 2023年第3期347-360,共14页
In this paper,we investigate the minimization of age of information(AoI),a metric that measures the information freshness,at the network edge with unreliable wireless communications.Particularly,we consider a set of u... In this paper,we investigate the minimization of age of information(AoI),a metric that measures the information freshness,at the network edge with unreliable wireless communications.Particularly,we consider a set of users transmitting status updates,which are collected by the user randomly over time,to an edge server through unreliable orthogonal channels.It begs a natural question:with random status update arrivals and obscure channel conditions,can we devise an intelligent scheduling policy that matches the users and channels to stabilize the queues of all users while minimizing the average AoI?To give an adequate answer,we define a bipartite graph and formulate a dynamic edge activation problem with stability constraints.Then,we propose an online matching while learning algorithm(MatL)and discuss its implementation for wireless scheduling.Finally,simulation results demonstrate that the MatL is reliable to learn the channel states and manage the users’buffers for fresher information at the edge. 展开更多
关键词 information freshness Lyapunov opti-mization multi-armed bandit wireless scheduling
下载PDF
An Analysis Model of Learners’ Online Learning Status Based on Deep Neural Network and Multi-Dimensional Information Fusion
6
作者 Mingyong Li Lirong Tang +3 位作者 Longfei Ma Honggang Zhao Jinyu Hu Yan Wei 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2349-2371,共23页
The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even ... The learning status of learners directly affects the quality of learning.Compared with offline teachers,it is difficult for online teachers to capture the learning status of students in the whole class,and it is even more difficult to continue to pay attention to studentswhile teaching.Therefore,this paper proposes an online learning state analysis model based on a convolutional neural network and multi-dimensional information fusion.Specifically,a facial expression recognition model and an eye state recognition model are constructed to detect students’emotions and fatigue,respectively.By integrating the detected data with the homework test score data after online learning,an analysis model of students’online learning status is constructed.According to the PAD model,the learning state is expressed as three dimensions of students’understanding,engagement and interest,and then analyzed from multiple perspectives.Finally,the proposed model is applied to actual teaching,and procedural analysis of 5 different types of online classroom learners is carried out,and the validity of the model is verified by comparing with the results of the manual analysis. 展开更多
关键词 Deep learning fatigue detection facial expression recognition sentiment analysis information fusion
下载PDF
Geographical Information Visualization on a Panoramic Sphere in an Immersive Environment
7
作者 MA Ying TIAN Fenglin +3 位作者 LIU Wen TANG Moran LI Jinyu CHEN Ge 《Journal of Ocean University of China》 SCIE CAS CSCD 2023年第4期961-974,共14页
In this paper,we propose a novel approach to visualizing global geographical information:a panoramic sphere in an immersive environment.The whole geographical surface can be observed through the rotating of heads as t... In this paper,we propose a novel approach to visualizing global geographical information:a panoramic sphere in an immersive environment.The whole geographical surface can be observed through the rotating of heads as the viewpoint of the panoramic sphere is inside the sphere.We compared three approaches to visualizing the earth for rendering the geographical information in a virtual reality environment.On the tasks of terrestrial and marine geographical information,we compare the visualization effects on a)a globe,b)a flat map and c)a panoramic sphere.Terrestrial geographical information tasks include the area comparison and direction determination.Marine geographical information tasks contain the visualization of sea surface temperature and sea surface currents.For terrestrial geographical information tasks,the experimental results show that the panoramic sphere outperforms the globe and the flat map,with a higher average accuracy and a shorter time.On marine geographical information task,the panoramic sphere visualization is also superior to the flat map and the globe in an immersive environment for the sea surface temperature data and the sea surface current fields.In all three visualization experiments,the panoramic sphere is most preferred by the participants,particularly for global,transcontinental and transoceanic needs. 展开更多
关键词 the panoramic sphere immersive environment virtual reality oceanographic information visualization
下载PDF
Single exposure passive three-dimensional information reconstruction based on an ordinary imaging system
8
作者 窦申成 刘璠 +3 位作者 李虎 姚旭日 刘雪峰 翟光杰 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期446-455,共10页
Existing three-dimensional(3D) imaging technologies have issues such as requiring active illumination, multiple exposures, or coding modulation. We propose a passive single 3D imaging method based on an ordinary imagi... Existing three-dimensional(3D) imaging technologies have issues such as requiring active illumination, multiple exposures, or coding modulation. We propose a passive single 3D imaging method based on an ordinary imaging system.Using the point spread function of the imaging system to realize the non-coding measurement on the target, the full-focus images and depth information of the 3D target can be extracted from a single two-dimensional(2D) image through the compressed sensing algorithm. Simulation and experiments show that this approach can complete passive 3D imaging based on an ordinary imaging system without any coding operations. This method can achieve millimeter-level vertical resolution under single exposure conditions and has the potential for real-time dynamic 3D imaging. It improves the efficiency of 3D information detection, reduces the complexity of the imaging system, and may be of considerable value to the field of computer vision and other related applications. 展开更多
关键词 passive three-dimensional imaging single exposure point spread function compressed sensing
下载PDF
Exploiting Human Pose and Scene Information for Interaction Detection
9
作者 Manahil Waheed Samia Allaoua Chelloug +4 位作者 Mohammad Shorfuzzaman Abdulmajeed Alsufyani Ahmad Jalal Khaled Alnowaiser Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第3期5853-5870,共18页
Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has at... Identifying human actions and interactions finds its use in manyareas, such as security, surveillance, assisted living, patient monitoring, rehabilitation,sports, and e-learning. This wide range of applications has attractedmany researchers to this field. Inspired by the existing recognition systems,this paper proposes a new and efficient human-object interaction recognition(HOIR) model which is based on modeling human pose and scene featureinformation. There are different aspects involved in an interaction, includingthe humans, the objects, the various body parts of the human, and the backgroundscene. Themain objectives of this research include critically examiningthe importance of all these elements in determining the interaction, estimatinghuman pose through image foresting transform (IFT), and detecting the performedinteractions based on an optimizedmulti-feature vector. The proposedmethodology has six main phases. The first phase involves preprocessing theimages. During preprocessing stages, the videos are converted into imageframes. Then their contrast is adjusted, and noise is removed. In the secondphase, the human-object pair is detected and extracted from each image frame.The third phase involves the identification of key body parts of the detectedhumans using IFT. The fourth phase relates to three different kinds of featureextraction techniques. Then these features are combined and optimized duringthe fifth phase. The optimized vector is used to classify the interactions in thelast phase. TheMSRDaily Activity 3D dataset has been used to test this modeland to prove its efficiency. The proposed system obtains an average accuracyof 91.7% on this dataset. 展开更多
关键词 Artificial intelligence daily activities human interactions human pose information image foresting transform scene feature information
下载PDF
The Probability Density Function Related to Shallow Cumulus Entrainment Rate and Its Influencing Factors in a Large-Eddy Simulation 被引量:2
10
作者 Lei ZHU Chunsong LU +5 位作者 Xiaoqi XU Xin HE Junjun LI Shi LUO Yuan WANG Fan WANG 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第1期173-187,共15页
The process of entrainment-mixing between cumulus clouds and the ambient air is important for the development of cumulus clouds.Accurately obtaining the entrainment rate(λ)is particularly important for its parameteri... The process of entrainment-mixing between cumulus clouds and the ambient air is important for the development of cumulus clouds.Accurately obtaining the entrainment rate(λ)is particularly important for its parameterization within the overall cumulus parameterization scheme.In this study,an improved bulk-plume method is proposed by solving the equations of two conserved variables simultaneously to calculateλof cumulus clouds in a large-eddy simulation.The results demonstrate that the improved bulk-plume method is more reliable than the traditional bulk-plume method,becauseλ,as calculated from the improved method,falls within the range ofλvalues obtained from the traditional method using different conserved variables.The probability density functions ofλfor all data,different times,and different heights can be well-fitted by a log-normal distribution,which supports the assumed stochastic entrainment process in previous studies.Further analysis demonstrate that the relationship betweenλand the vertical velocity is better than other thermodynamic/dynamical properties;thus,the vertical velocity is recommended as the primary influencing factor for the parameterization ofλin the future.The results of this study enhance the theoretical understanding ofλand its influencing factors and shed new light on the development ofλparameterization. 展开更多
关键词 large-eddy simulation cumulus clouds entrainment rate probability density functions spatial and temporal distribution
下载PDF
Assessment of International GNSS Service Global Ionosphere Map products over China region based on measurements from the Crustal Movement Observation Network of China 被引量:1
11
作者 Jin Hu HaiBing Ruan +2 位作者 FuQing Huang ShengYang Gu XianKang Dou 《Earth and Planetary Physics》 EI CAS CSCD 2024年第2期400-407,共8页
The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of G... The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of GIM products in data-sparse regions is of paramount importance.In this study,measurements from the Crustal Movement Observation Network of China(CMONOC)are leveraged to evaluate the suitability of IGS-GIM products over China region in 2013-2014.The indices of mean error(ME),root mean square error(RMSE),and normalized RMSE(NRMSE)are then utilized to quantify the accuracy of IGS-GIM products.Results revealed distinct local time and latitudinal dependencies in IGS-GIM errors,with substantially high errors at nighttime(NRMSE:39%)and above 40°latitude(NRMSE:49%).Seasonal differences also emerged,with larger equinoctial deviations(NRMSE:33.5%)compared with summer(20%).A preliminary analysis implied that the irregular assimilation of sparse IGS observations,compounded by China’s distinct geomagnetic topology,may manifest as error variations.These results suggest that modeling based solely on IGS-GIM observations engenders inadequate representations across China and that a thorough examination would proffer the necessary foundation for advancing regional total electron content(TEC)constructions. 展开更多
关键词 International GNSS Service(IGS)Global Ionosphere Maps(GIM) Crustal Movement Observation Network of China(CMONOC) total electron content(TEC) data assessment
下载PDF
Intelligent Small Sample Defect Detection of Concrete Surface Using Novel Deep Learning Integrating Improved YOLOv5 被引量:1
12
作者 Yongming Han Lei Wang +1 位作者 Youqing Wang Zhiqiang Geng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期545-547,共3页
Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The p... Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality. 展开更多
关键词 CONCRETE integrating ALGORITHM
下载PDF
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:1
13
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain IIoT data storage cryptographic commitment
下载PDF
Differences in spring precipitation over southern China associated with multiyear La Ni?a events 被引量:1
14
作者 Guangliang Li Licheng Feng +3 位作者 Wei Zhuang Fei Liu Ronghua Zhang Cuijuan Sui 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2024年第2期1-10,共10页
Composite analyses were performed in this study to reveal the difference in spring precipitation over southern China during multiyear La Ni?a events during 1901 to 2015. It was found that there is significantly below-... Composite analyses were performed in this study to reveal the difference in spring precipitation over southern China during multiyear La Ni?a events during 1901 to 2015. It was found that there is significantly below-normal precipitation during the first boreal spring, but above-normal precipitation during the second year. The difference in spring precipitation over southern China is correlative to the variation in western North Pacific anomalous cyclone(WNPC), which can in turn be attributed to the different sea surface temperature anomaly(SSTA) over the Tropical Pacific. The remote forcing of negative SSTA in the equatorial central and eastern Pacific and the local air-sea interaction in the western North Pacific are the usual causes of WNPC formation and maintenance.SSTA in the first spring is stronger than those in the second spring. As a result, the intensity of WNPC in the first year is stronger, which is more likely to reduce the moisture in southern China by changing the moisture transport, leading to prolonged precipitation deficits over southern China. However, the tropical SSTA signals in the second year are too weak to induce the formation and maintenance of WNPC and the below-normal precipitation over southern China. Thus, the variation in tropical SSTA signals between two consecutive springs during multiyear La Ni?a events leads to obvious differences in the spatial pattern of precipitation anomaly in southern China by causing the different WNPC response. 展开更多
关键词 multiyear La Nina precipitation anomaly anomalous western North Pacific cyclone southern China
下载PDF
Quantum geometric tensor and the topological characterization of the extended Su-Schrieffer-Heeger model
15
作者 曾相龙 赖文喜 +1 位作者 魏祎雯 马余全 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期260-265,共6页
We investigate the quantum metric and topological Euler number in a cyclically modulated Su-Schrieffer-Heeger(SSH)model with long-range hopping terms.By computing the quantum geometry tensor,we derive exact expression... We investigate the quantum metric and topological Euler number in a cyclically modulated Su-Schrieffer-Heeger(SSH)model with long-range hopping terms.By computing the quantum geometry tensor,we derive exact expressions for the quantum metric and Berry curvature of the energy band electrons,and we obtain the phase diagram of the model marked by the first Chern number.Furthermore,we also obtain the topological Euler number of the energy band based on the Gauss-Bonnet theorem on the topological characterization of the closed Bloch states manifold in the first Brillouin zone.However,some regions where the Berry curvature is identically zero in the first Brillouin zone result in the degeneracy of the quantum metric,which leads to ill-defined non-integer topological Euler numbers.Nevertheless,the non-integer"Euler number"provides valuable insights and an upper bound for the absolute values of the Chern numbers. 展开更多
关键词 quantum geometric tensor topological Euler number Chern number Berry curvature quantum metric Su-Schrieffer-Heeger(SSH)model
下载PDF
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
16
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
17
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
18
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
19
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
20
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部