期刊文献+
共找到133篇文章
< 1 2 7 >
每页显示 20 50 100
Self-Compassion Moderates the Effect of Contingent Self-Esteem on Well-Being:Evidence from Cross-Sectional Survey and Experiment
1
作者 Ruirui Zhang Xuguang Zhang +1 位作者 Minxin Yang Haoran Zhang 《International Journal of Mental Health Promotion》 2024年第2期117-126,共10页
Contingent self-esteem captures the fragile nature of self-esteem and is often regarded as suboptimal to psychological functioning.Self-compassion is another important self-related concept assumed to promote mental he... Contingent self-esteem captures the fragile nature of self-esteem and is often regarded as suboptimal to psychological functioning.Self-compassion is another important self-related concept assumed to promote mental health and well-being.However,research on the relation of self-compassion to contingent self-esteem is lacking.Two studies were conducted to explore the role of selfcompassion,either as a personal characteristic or an induced mindset,in influencing the effects of contingent self-esteem on well-being.Study 1 recruited 256 Chinese college students(30.4%male,mean age=21.72 years)who filled out measures of contingent self-esteem,self-compassion,and well-being.The results found that self-compassion moderated the effect of contingent self-esteem on well-being.In Study 2,a sample of 90 Chinese college students(34%male,mean age=18.39 years)were randomly assigned to either a control or self-compassion group.They completed baseline trait measures of contingent self-esteem,self-compassion,and self-esteem.Then,they were led to have a 12-min break(control group)or listen to a 12-min self-compassion audio(self-compassion group),followed by a social stress task and outcome measures.The results demonstrated the effectiveness of the brief self-compassion training and its moderating role in influencing the effects of contingent self-esteem on negative affects after the social stress task.This research provides implications that to equip with a self-compassionate mindset could lower the risk of the impairment of well-being associated with elements of contingent selfesteem,which involves a fragile sense of self-worth.It may also provide insights into the development of an“optimal selfesteem”and the improvement of well-being. 展开更多
关键词 SELF-COMPASSION contingent self-esteem WELL-BEING social evaluative threat
下载PDF
Exploration and Practice of Big Data Introductory Courses for Big Data Management and Application Majors
2
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2024年第2期131-137,共7页
As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by ... As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by everyone.To this end,we discuss some of our explorations and attempts in the construction and teaching process of big data courses for the major of big data management and application from the perspective of course planning,course implementation,and course summary.After interviews with students and feedback from questionnaires,students are highly satisfied with some of the teaching measures and programs currently adopted. 展开更多
关键词 Big data management and application “Introduction to Big Data” Teaching reform Curriculum exploration
下载PDF
Design and platform testing of the compact torus central fueling device for the EAST tokamak 被引量:1
3
作者 孔德峰 庄革 +15 位作者 兰涛 张寿彪 叶扬 董期龙 陈晨 吴捷 张森 赵志豪 孟凡卫 张小辉 黄艳清 文斐 訾鹏飞 李磊 胡广海 宋云涛 《Plasma Science and Technology》 SCIE EI CAS CSCD 2023年第6期95-102,共8页
Compact torus(CT)injection is a highly promising technique for the central fueling of future reactor-grade fusion devices since it features extremely high injection velocity and relatively high plasma mass.Recently,a ... Compact torus(CT)injection is a highly promising technique for the central fueling of future reactor-grade fusion devices since it features extremely high injection velocity and relatively high plasma mass.Recently,a CT injector for the EAST tokamak,EAST-CTI,was developed and platform-tested.In the first round of experiments conducted with low parameter settings,the maximum velocity and mass of the CT plasma were 150 km·s^(-1)and 90μg,respectively.However,the parameters obtained by EAST-CTI were still very low and were far from the requirements of a device such as EAST that has a strong magnetic field.In future,we plan to solve the spark problem that EAST-CTI currently encounters(that mainly hinders the further development of experiments)through engineering methods,and use greater power to obtain a more stable and suitable CT plasma for EAST. 展开更多
关键词 compact torus(CT) central fueling EAST-CTI EAST tokamak
下载PDF
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
4
作者 Sureka Sivavelu Venkatesh Palanisamy 《Computers, Materials & Continua》 SCIE EI 2024年第3期3469-3487,共19页
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes two major processes namely metric or feature selection and classification. First, the SQADEN uses the nonparametric statistical Torgerson–Gower scaling technique for identifying the relevant software metrics by measuring the similarity using the dice coefficient. The feature selection process is used to minimize the time complexity of software fault prediction. With the selected metrics, software fault perdition with the help of the Quadratic Censored regressive convolution deep neural network-based classification. The deep learning classifier analyzes the training and testing samples using the contingency correlation coefficient. The softstep activation function is used to provide the final fault prediction results. To minimize the error, the Nelder–Mead method is applied to solve non-linear least-squares problems. Finally, accurate classification results with a minimum error are obtained at the output layer. Experimental evaluation is carried out with different quantitative metrics such as accuracy, precision, recall, F-measure, and time complexity. The analyzed results demonstrate the superior performance of our proposed SQADEN technique with maximum accuracy, sensitivity and specificity by 3%, 3%, 2% and 3% and minimum time and space by 13% and 15% when compared with the two state-of-the-art methods. 展开更多
关键词 Software defect prediction feature selection nonparametric statistical Torgerson-Gower scaling technique quadratic censored regressive convolution deep neural network softstep activation function nelder-mead method
下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
5
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
下载PDF
Audio2AB:Audio-driven collaborative generation of virtual character animation
6
作者 Lichao NIU Wenjun XIE +2 位作者 Dong WANG Zhongrui CAO Xiaoping LIU 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期56-70,共15页
Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of success.However,few methods exist for generating full-body animation... Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of success.However,few methods exist for generating full-body animations,and the portability of virtual character gestures and facial animations has not received sufficient attention.Methods Therefore,we propose a deep-learning-based audio-to-animation-and-blendshape(Audio2AB)network that generates gesture animations and ARK it's 52 facial expression parameter blendshape weights based on audio,audio-corresponding text,emotion labels,and semantic relevance labels to generate parametric data for full-body animations.This parameterization method can be used to drive full-body animations of virtual characters and improve their portability.In the experiment,we first downsampled the gesture and facial data to achieve the same temporal resolution for the input,output,and facial data.The Audio2AB network then encoded the audio,audio-corresponding text,emotion labels,and semantic relevance labels,and then fused the text,emotion labels,and semantic relevance labels into the audio to obtain better audio features.Finally,we established links between the body,gestures,and facial decoders and generated the corresponding animation sequences through our proposed GAN-GF loss function.Results By using audio,audio-corresponding text,and emotional and semantic relevance labels as input,the trained Audio2AB network could generate gesture animation data containing blendshape weights.Therefore,different 3D virtual character animations could be created through parameterization.Conclusions The experimental results showed that the proposed method could generate significant gestures and facial animations. 展开更多
关键词 Audio-driven Virtual character Full-body animation Audio2AB Blendshape GAN-GF
下载PDF
Integrating Multiple Linear Regression and Infectious Disease Models for Predicting Information Dissemination in Social Networks
7
作者 Junchao Dong Tinghui Huang +1 位作者 Liang Min Wenyan Wang 《Journal of Electronic Research and Application》 2023年第2期20-27,共8页
Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model int... Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model integrating multiple linear regression and infectious disease model.Firstly,we proposed the features that affect social network communication from three dimensions.Then,we predicted the node influence via multiple linear regression.Lastly,we used the node influence as the state transition of the infectious disease model to predict the trend of information dissemination in social networks.The experimental results on a real social network dataset showed that the prediction results of the model are consistent with the actual information dissemination trends. 展开更多
关键词 Social networks Epidemic model Linear regression model
下载PDF
Unsupervised Color Segmentation with Reconstructed Spatial Weighted Gaussian Mixture Model and Random Color Histogram
8
作者 Umer Sadiq Khan Zhen Liu +5 位作者 Fang Xu Muhib Ullah Khan Lerui Chen Touseef Ahmed Khan Muhammad Kashif Khattak Yuquan Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第3期3323-3348,共26页
Image classification and unsupervised image segmentation can be achieved using the Gaussian mixture model.Although the Gaussian mixture model enhances the flexibility of image segmentation,it does not reflect spatial ... Image classification and unsupervised image segmentation can be achieved using the Gaussian mixture model.Although the Gaussian mixture model enhances the flexibility of image segmentation,it does not reflect spatial information and is sensitive to the segmentation parameter.In this study,we first present an efficient algorithm that incorporates spatial information into the Gaussian mixture model(GMM)without parameter estimation.The proposed model highlights the residual region with considerable information and constructs color saliency.Second,we incorporate the content-based color saliency as spatial information in the Gaussian mixture model.The segmentation is performed by clustering each pixel into an appropriate component according to the expectation maximization and maximum criteria.Finally,the random color histogram assigns a unique color to each cluster and creates an attractive color by default for segmentation.A random color histogram serves as an effective tool for data visualization and is instrumental in the creation of generative art,facilitating both analytical and aesthetic objectives.For experiments,we have used the Berkeley segmentation dataset BSDS-500 and Microsoft Research in Cambridge dataset.In the study,the proposed model showcases notable advancements in unsupervised image segmentation,with probabilistic rand index(PRI)values reaching 0.80,BDE scores as low as 12.25 and 12.02,compactness variations at 0.59 and 0.7,and variation of information(VI)reduced to 2.0 and 1.49 for the BSDS-500 and MSRC datasets,respectively,outperforming current leading-edge methods and yielding more precise segmentations. 展开更多
关键词 Unsupervised segmentation color saliency spatial weighted GMM random color histogram
下载PDF
QoS-Constrained,Reliable and Energy-Efficient Task Deployment in Cloud Computing
9
作者 Zhenghui Zhang Yuqi Fan 《计算机科学与技术汇刊(中英文版)》 2024年第1期22-31,共10页
Reliability,QoS and energy consumption are three important concerns of cloud service providers.Most of the current research on reliable task deployment in cloud computing focuses on only one or two of the three concer... Reliability,QoS and energy consumption are three important concerns of cloud service providers.Most of the current research on reliable task deployment in cloud computing focuses on only one or two of the three concerns.However,these three factors have intrinsic trade-off relationships.The existing studies show that load concentration can reduce the number of servers and hence save energy.In this paper,we deal with the problem of reliable task deployment in data centers,with the goal of minimizing the number of servers used in cloud data centers under the constraint that the job execution deadline can be met upon single server failure.We propose a QoS-Constrained,Reliable and Energy-efficient task replica deployment(QSRE)algorithm for the problem by combining task replication and re-execution.For each task in a job that cannot finish executing by re-execution within deadline,we initiate two replicas for the task:main task and task replica.Each main task runs on an individual server.The associated task replica is deployed on a backup server and completes part of the whole task load before the main task failure.Different from the main tasks,multiple task replicas can be allocated to the same backup server to reduce the energy consumption of cloud data centers by minimizing the number of servers required for running the task replicas.Specifically,QSRE assigns the task replicas with the longest and the shortest execution time to the backup servers in turn,such that the task replicas can meet the QoS-specified job execution deadline under the main task failure.We conduct experiments through simulations.The experimental results show that QSRE can effectively reduce the number of servers used,while ensuring the reliability and QoS of job execution. 展开更多
关键词 Cloud Computing Task Deployment RELIABILITY Quality of Service Energy Consumption
下载PDF
Thermodynamic and geometric framework of a(2+1)-dimensional black hole with non-linear electrodynamics
10
作者 陈刚 刘占芳 兰明建 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第11期116-121,共6页
The thermodynamic properties of a (2 + 1)-dimensional black hole with non-linear electrodynamics from the viewpoint of geometry is studied and some kinds of temperatures of the black hole have been obtained. Weinho... The thermodynamic properties of a (2 + 1)-dimensional black hole with non-linear electrodynamics from the viewpoint of geometry is studied and some kinds of temperatures of the black hole have been obtained. Weinhold curvature and Ruppeiner curvature are explored as information geometry. Moreover, based on Quevedo's theory, the Legendre invariant geometry is investigated for the black hole. We also study the relationship between the scalar curvatures of the above several metrics and the phase transitions produced from the heat capacity. 展开更多
关键词 black hole TEMPERATURE thermodynamic geometry phase transition
下载PDF
Numerical study on matching conditions of Langmuir parametric instability and the formation of Langmuir turbulence in ionospheric heating
11
作者 MoRan Liu Chen Zhou +2 位作者 Ting Feng Xiang Wang ZhengYu Zhao 《Earth and Planetary Physics》 EI CSCD 2022年第5期474-486,共13页
Parametric decay instability(PDI)is an important process in ionospheric heating.This paper focuses on the frequency and wavevector matching condition in the initial PDI process,the subsequent cascade stage,and the gen... Parametric decay instability(PDI)is an important process in ionospheric heating.This paper focuses on the frequency and wavevector matching condition in the initial PDI process,the subsequent cascade stage,and the generation of strong Langmuir turbulence.A more general numerical model is established based on Maxwell equations and plasma dynamic equations by coupling highfrequency electromagnetic waves to low-frequency waves via ponderomotive force.The primary PDI,cascade process,and strong Langmuir turbulence are excited in the simulation.The matching condition in the initial PDI stage and cascade process is verified.The result indicates that the cascade ion acoustic wave may induce or accelerate the formation of cavitons and lead to the wavenumber spectrum being more enhanced at 2k_(L)(where k_(L) is the primary Langmuir wavenumber).The wavenumber spectra develop from discrete to continuous spectra,which is attributed to the caviton collapse and strong Langmuir turbulence. 展开更多
关键词 ionospheric electromagnetic propagation parametric decay instability CASCADE Langmuir turbulence
下载PDF
Interpretation Method of Guqin (Chinese Ancient Zither) Notation Based on Radical and Structural Analysis
12
作者 倪恩志 蒋旻隽 周昌乐 《Journal of Donghua University(English Edition)》 EI CAS 2013年第1期7-14,共8页
Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin n... Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin notation and an interpretation method of guqin notation were conducted. By using this interpretation method, raw images of handwritten notations are transformed into structural data that can be processed and analyzed by computers easily. The method decomposes each single complex character of guqin notations into simple radicals and finds the structure of the character. According to the radicals and the structure, the character is interpreted into meaningful codes. The experimental results show our method is effective. 展开更多
关键词 guqin notation character interpretation radical extraction
下载PDF
Assessing Levels and Health Risks of Fluoride and Heavy Metal Contamination in Drinking Water
13
作者 Ali Sanou Namory Méité +5 位作者 Amadou Kouyaté Elisephane Irankunda Alfred Niamien Kouamé Aka Eric Koffi Koffi Jean-Paul Bohoussou Lébé Prisca M.-S. Kouakou 《Journal of Geoscience and Environment Protection》 2022年第11期15-34,共20页
A systematic study was carried out to assess the level of contamination with fluorides and heavy metals in the drinking water of the city of Daloa as well as the risks to the health of consumers. The waters of 11.11% ... A systematic study was carried out to assess the level of contamination with fluorides and heavy metals in the drinking water of the city of Daloa as well as the risks to the health of consumers. The waters of 11.11% of the sites sampled exceeded the fluoride limit for drinking water with a contamination index (CI) greater than 0. All the waters recorded concentrations of cadmium (Cd), copper (Cu), iron (Fe), manganese (Mn) and lead (Pb) above the recommended values with CI > 0. However, 22.22% of the sites recorded concentrations below the standard for zinc (Zn) with IC < 0. The assessment of adverse effects on human health showed that the chronic daily intake (CDI) of fluorine and metals was less than 1 (CDI < 1) for both adults and children except for Zn where the CDI > 1 for children in 22.22% of drinking water studied. HQs have an average of less than 1 for fluorine and greater than 1 for all metals. Moreover, the danger indices have values greater than 1. The incremental lifetime cancer risk (ILCR) and the total ILCR are above the recommended values. These results showed that the drinking water sampled is of poor quality due to higher levels of heavy metals, which can constitute a danger to human health. Long-term use of one of these poor quality waters can lead to cancer in consumers. It is therefore necessary to treat this water in order to eliminate the metals before using it for drinking. This study can help decision-makers and competent authorities in charge of water management. 展开更多
关键词 Physico-Chemical Parameters FLUORIDE Heavy Metals Drinking Water Sanitary Risks
下载PDF
Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base
14
作者 Xiaoyu Cheng Mingxian Long +1 位作者 Wei He Hailong Zhu 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2821-2844,共24页
Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the mil... Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets. 展开更多
关键词 Fault detection milling system belief rule base fault tree analysis evidence reasoning
下载PDF
Safety Assessment of Liquid Launch Vehicle Structures Based on Interpretable Belief Rule Base
15
作者 Gang Xiang Xiaoyu Cheng +1 位作者 Wei He Peng Han 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期273-298,共26页
A liquid launch vehicle is an important carrier in aviation,and its regular operation is essential to maintain space security.In the safety assessment of fluid launch vehicle body structure,it is necessary to ensure t... A liquid launch vehicle is an important carrier in aviation,and its regular operation is essential to maintain space security.In the safety assessment of fluid launch vehicle body structure,it is necessary to ensure that the assessmentmodel can learn self-response rules from various uncertain data and not differently to provide a traceable and interpretable assessment process.Therefore,a belief rule base with interpretability(BRB-i)assessment method of liquid launch vehicle structure safety status combines data and knowledge.Moreover,an innovative whale optimization algorithm with interpretable constraints is proposed.The experiments are carried out based on the liquid launch vehicle safety experiment platform,and the information on the safety status of the liquid launch vehicle is obtained by monitoring the detection indicators under the simulation platform.The MSEs of the proposed model are 3.8000e-03,1.3000e-03,2.1000e-03,and 1.8936e-04 for 25%,45%,65%,and 84%of the training samples,respectively.It can be seen that the proposed model also shows a better ability to handle small sample data.Meanwhile,the belief distribution of the BRB-i model output has a high fitting trend with the belief distribution of the expert knowledge settings,which indicates the interpretability of the BRB-i model.Experimental results show that,compared with other methods,the BRB-i model guarantees the model’s interpretability and the high precision of experimental results. 展开更多
关键词 Liquid launch vehicle belief rule base with interpretability belief rule base whale optimization algorithm vibration frequency swaying angle
下载PDF
GDMNet: A Unified Multi-Task Network for Panoptic Driving Perception
16
作者 Yunxiang Liu Haili Ma +1 位作者 Jianlin Zhu Qiangbo Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第8期2963-2978,共16页
To enhance the efficiency and accuracy of environmental perception for autonomous vehicles,we propose GDMNet,a unified multi-task perception network for autonomous driving,capable of performing drivable area segmentat... To enhance the efficiency and accuracy of environmental perception for autonomous vehicles,we propose GDMNet,a unified multi-task perception network for autonomous driving,capable of performing drivable area segmentation,lane detection,and traffic object detection.Firstly,in the encoding stage,features are extracted,and Generalized Efficient Layer Aggregation Network(GELAN)is utilized to enhance feature extraction and gradient flow.Secondly,in the decoding stage,specialized detection heads are designed;the drivable area segmentation head employs DySample to expand feature maps,the lane detection head merges early-stage features and processes the output through the Focal Modulation Network(FMN).Lastly,the Minimum Point Distance IoU(MPDIoU)loss function is employed to compute the matching degree between traffic object detection boxes and predicted boxes,facilitating model training adjustments.Experimental results on the BDD100K dataset demonstrate that the proposed network achieves a drivable area segmentation mean intersection over union(mIoU)of 92.2%,lane detection accuracy and intersection over union(IoU)of 75.3%and 26.4%,respectively,and traffic object detection recall and mAP of 89.7%and 78.2%,respectively.The detection performance surpasses that of other single-task or multi-task algorithm models. 展开更多
关键词 Autonomous driving multitask learning drivable area segmentation lane detection vehicle detection
下载PDF
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
17
作者 Sandeep Dasari Rajesh Kaluri 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期2035-2051,共17页
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizations for various banking services may result in various intrusions and privacy leakages.As a result,this study employs federated learning(FL)using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global model.However,diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of privacy.To address this issue,the present paper proposes the imple-mentation of Federated Averaging(FedAvg)and Federated Proximal(FedProx)methods in the flower framework,which take advantage of the data locality while training and guaranteeing global convergence.Resultantly improves the privacy of the local models.This analysis used the credit card and Canadian Institute for Cybersecurity Intrusion Detection Evaluation(CICIDS)datasets.Precision,recall,and accuracy as performance indicators to show the efficacy of the proposed strategy using FedAvg and FedProx.The experimental findings suggest that the proposed approach helps to safely use banking data from diverse sources to enhance customer banking services by obtaining accuracy of 99.55%and 83.72%for FedAvg and 99.57%,and 84.63%for FedProx. 展开更多
关键词 Federated learning FedAvg FedProx flower framework privacy preservation financial sectors
下载PDF
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
18
作者 Fang Xu Songhao Jiang +3 位作者 Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1095-1113,共19页
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ... Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context. 展开更多
关键词 SIoT data forwarding social attributes social relations COMMUNITY
下载PDF
Computing Resource Allocation for Blockchain-Based Mobile Edge Computing
19
作者 Wanbo Zhang Yuqi Fan +2 位作者 Jun Zhang Xu Ding Jung Yoon Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期863-885,共23页
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a... Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC. 展开更多
关键词 Mobile edge computing blockchain resource allocation
下载PDF
A correlative classifiers approach based on particle filter and sample set for tracking occluded target 被引量:6
20
作者 LI Kang HE Fa-zhi +1 位作者 YU Hai-ping CHEN Xiao 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2017年第3期294-312,共19页
Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single... Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single classifier learn much of occluding background information which results in the decrease of tracking performance, and eventually lead to the failure of the tracking algorithm. This paper presents a new correlative classifiers approach to address the above problem. Our idea is to derive a group of correlative classifiers based on sample set method. Then we propose strategy to establish the classifiers and to query the suitable classifiers for the next frame tracking. In order to deal with nonlinear problem, particle filter is adopted and integrated with sample set method. For choosing the target from candidate particles, we define a similarity measurement between particles and sample set. The proposed sample set method includes the following steps. First, we cropped positive samples set around the target and negative samples set far away from the target. Second, we extracted average Haar-like feature from these samples and calculate their statistical characteristic which represents the target model. Third, we define the similarity measurement based on the statistical characteristic of these two sets to judge the similarity between candidate particles and target model. Finally, we choose the largest similarity score particle as the target in the new frame. A number of experiments show the robustness and efficiency of the proposed approach when compared with other state-of-the-art trackers. 展开更多
关键词 visual tracking sample set method online learning particle filter
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部