期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
Generation of Low-Delay and High-Stability Multicast Tree
1
作者 Deshun Li Zhenchen Wang +5 位作者 Yucong Wei Jiangyuan Yao Yuyin Tan Qiuling Yang Zhengxia Wang Xingcan Cao 《Computers, Materials & Continua》 SCIE EI 2023年第7期561-572,共12页
Delay and stability are two key factors that affect the performance of multicast data transmission in a network.However,current algorithms of tree generation hardly meet the requirements of low delay and high sta-bili... Delay and stability are two key factors that affect the performance of multicast data transmission in a network.However,current algorithms of tree generation hardly meet the requirements of low delay and high sta-bility simultaneously.Given a general network,the generation algorithm of a multicast tree with minimum delay and maximum stability is an NP-hard problem,without a precise and efficient algorithm.To address these challenges,this paper studies the generation of low-delay and high-stability multicast trees under the model of spanning tree based on stability probability,degree-constrained,edge-weighted for multicast(T-SDE).A class of algorithms was proposed which creates the multicast tree greedy on the ratio of fan-out to delay(RFD)and probability of stability of terminal to obtain a high performance in multicast.The proposed algorithms greedily select terminals with a large RFD and a high probability of stability as forwarding nodes in the generation of the multicast tree,where the larger RFD and higher stability of upstream nodes are beneficial to achieve a low transmission delay and high stability in multicast.The proposed RFD can be compatible with the original model,which can take advantage of network connectivity during the generation of a multicast tree.This paper carries out simulation experiments on Matlab R2016b to measure the performance of the proposed algorithm.Experimental results show that the proposed algorithm can provide a smaller height,higher stability,and a lower transmission delay of the resulting multicast tree than other solutions.The spanning tree of the proposed algorithms can support low transmission delay and high stability in multicast transmission. 展开更多
关键词 Overlay network multicast tree transmission delay probability of stability greedy algorithm
下载PDF
Ship Detection and Recognition Based on Improved YOLOv7 被引量:2
2
作者 Wei Wu Xiulai Li +1 位作者 Zhuhua Hu Xiaozhang Liu 《Computers, Materials & Continua》 SCIE EI 2023年第7期489-498,共10页
In this paper,an advanced YOLOv7 model is proposed to tackle the challenges associated with ship detection and recognition tasks,such as the irregular shapes and varying sizes of ships.The improved model replaces the ... In this paper,an advanced YOLOv7 model is proposed to tackle the challenges associated with ship detection and recognition tasks,such as the irregular shapes and varying sizes of ships.The improved model replaces the fixed anchor boxes utilized in conventional YOLOv7 models with a set of more suitable anchor boxes specifically designed based on the size distribution of ships in the dataset.This paper also introduces a novel multi-scale feature fusion module,which comprises Path Aggregation Network(PAN)modules,enabling the efficient capture of ship features across different scales.Furthermore,data preprocessing is enhanced through the application of data augmentation techniques,including random rotation,scaling,and cropping,which serve to bolster data diversity and robustness.The distribution of positive and negative samples in the dataset is balanced using random sampling,ensuring a more accurate representation of real-world scenarios.Comprehensive experimental results demonstrate that the proposed method significantly outperforms existing state-of-the-art approaches in terms of both detection accuracy and robustness,highlighting the potential of the improved YOLOv7 model for practical applications in the maritime domain. 展开更多
关键词 Ship position prediction target detection YOLOv7 data augmentation techniques
下载PDF
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
3
作者 Xiulai Li Jieren Cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain 被引量:1
4
作者 Jieren Cheng Xiulai Li +2 位作者 Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期975-992,共18页
With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentraliz... With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentralized,decentralized nature,blockchain networks are vulnerable to distributed denial-of-service(DDoS)attacks,which can lead to service stops,causing serious economic losses and social impacts.The research questions in this paper mainly include two aspects:first,the classification of DDoS,which refers to detecting whether blockchain nodes are suffering DDoS attacks,that is,detecting the data of nodes in parallel;The second is the problem of DDoS segmentation,that is,multiple pieces of data that appear at the same time are determined which type of DDoS attack they belong to.In order to solve these problems,this paper proposes a modified PointNet(MPointNet)for the classification and type segmentation of DDoS attacks.A dataset containing multiple DDoS attack types was constructed using the CIC-DDoS2019 dataset,and trained,validated,and tested accordingly.The results show that the proposed DDoS attack classification method has high performance and can be used for the actual blockchain security maintenance process.The accuracy rate of classification tasks reached 99.65%,and the accuracy of type segmentation tasks reached 85.47%.Therefore,the method proposed in this paper has high application value in detecting the classification and segmentation of DDoS attacks. 展开更多
关键词 Blockchain DDOS PointNet classification and segmentation
下载PDF
RPNet: Rice plant counting after tillering stage based on plant attention and multiple supervision network
5
作者 Xiaodong Bai Susong Gu +4 位作者 Pichao Liu Aiping Yang Zhe Cai Jianjun Wang Jianguo Yao 《The Crop Journal》 SCIE CSCD 2023年第5期1586-1594,共9页
Rice is a major food crop and is planted worldwide. Climatic deterioration, population growth, farmland shrinkage, and other factors have necessitated the application of cutting-edge technology to achieve accurate and... Rice is a major food crop and is planted worldwide. Climatic deterioration, population growth, farmland shrinkage, and other factors have necessitated the application of cutting-edge technology to achieve accurate and efficient rice production. In this study, we mainly focus on the precise counting of rice plants in paddy field and design a novel deep learning network, RPNet, consisting of four modules: feature encoder, attention block, initial density map generator, and attention map generator. Additionally, we propose a novel loss function called RPloss. This loss function considers the magnitude relationship between different sub-loss functions and ensures the validity of the designed network. To verify the proposed method, we conducted experiments on our recently presented URC dataset, which is an unmanned aerial vehicle dataset that is quite challenged at counting rice plants. For experimental comparison, we chose some popular or recently proposed counting methods, namely MCNN, CSRNet, SANet, TasselNetV2, and FIDTM. In the experiment, the mean absolute error(MAE), root mean squared error(RMSE), relative MAE(rMAE) and relative RMSE(rRMSE) of the proposed RPNet were 8.3, 11.2, 1.2% and 1.6%, respectively,for the URC dataset. RPNet surpasses state-of-the-art methods in plant counting. To verify the universality of the proposed method, we conducted experiments on the well-know MTC and WED datasets. The final results on these datasets showed that our network achieved the best results compared with excellent previous approaches. The experiments showed that the proposed RPNet can be utilized to count rice plants in paddy fields and replace traditional methods. 展开更多
关键词 RICE Precision agriculture Plant counting Deep learning Attention mechanism
下载PDF
Gate-Attention and Dual-End Enhancement Mechanism for Multi-Label Text Classification
6
作者 Jieren Cheng Xiaolong Chen +3 位作者 Wenghang Xu Shuai Hua Zhu Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第11期1779-1793,共15页
In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in sema... In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in semantic feature extraction have turned to external knowledge to augment the model’s grasp of textual content,often overlooking intrinsic textual cues such as label statistical features.In contrast,these endogenous insights naturally align with the classification task.In our paper,to complement this focus on intrinsic knowledge,we introduce a novel Gate-Attention mechanism.This mechanism adeptly integrates statistical features from the text itself into the semantic fabric,enhancing the model’s capacity to understand and represent the data.Additionally,to address the intricate task of mining label correlations,we propose a Dual-end enhancement mechanism.This mechanism effectively mitigates the challenges of information loss and erroneous transmission inherent in traditional long short term memory propagation.We conducted an extensive battery of experiments on the AAPD and RCV1-2 datasets.These experiments serve the dual purpose of confirming the efficacy of both the Gate-Attention mechanism and the Dual-end enhancement mechanism.Our final model unequivocally outperforms the baseline model,attesting to its robustness.These findings emphatically underscore the imperativeness of taking into account not just external knowledge but also the inherent intricacies of textual data when crafting potent MLTC models. 展开更多
关键词 Multi-label text classification feature extraction label distribution information sequence generation
下载PDF
An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models
7
作者 Xiulai Li Jieren Cheng +3 位作者 Chengchun Ruan Bin Zhang Xiangyan Tang Mengzhe Sun 《Computers, Materials & Continua》 SCIE EI 2023年第12期3265-3288,共24页
With the rising adoption of blockchain technology due to its decentralized,secure,and transparent features,ensuring its resilience against network threats,especially Distributed Denial of Service(DDoS)attacks,is cruci... With the rising adoption of blockchain technology due to its decentralized,secure,and transparent features,ensuring its resilience against network threats,especially Distributed Denial of Service(DDoS)attacks,is crucial.This research addresses the vulnerability of blockchain systems to DDoS assaults,which undermine their core decentralized characteristics,posing threats to their security and reliability.We have devised a novel adaptive integration technique for the detection and identification of varied DDoS attacks.To ensure the robustness and validity of our approach,a dataset amalgamating multiple DDoS attacks was derived from the CIC-DDoS2019 dataset.Using this,our methodology was applied to detect DDoS threats and further classify them into seven unique attack subcategories.To cope with the broad spectrum of DDoS attack variations,a holistic framework has been pro-posed that seamlessly integrates five machine learning models:Gate Recurrent Unit(GRU),Convolutional Neural Networks(CNN),Long-Short Term Memory(LSTM),Deep Neural Networks(DNN),and Support Vector Machine(SVM).The innovative aspect of our framework is the introduction of a dynamic weight adjustment mechanism,enhancing the system’s adaptability.Experimental results substantiate the superiority of our ensemble method in comparison to singular models across various evaluation metrics.The framework displayed remarkable accuracy,with rates reaching 99.71%for detection and 87.62%for classification tasks.By developing a comprehensive and adaptive methodology,this study paves the way for strengthening the defense mechanisms of blockchain systems against DDoS attacks.The ensemble approach,combined with the dynamic weight adjustment,offers promise in ensuring blockchain’s enduring security and trustworthiness. 展开更多
关键词 Blockchain DDOS multi-models adaptive detection
下载PDF
A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT
8
作者 Yu Fan Jingbing Li +4 位作者 Uzair Aslam Bhatti Chunyan Shao Cheng Gong Jieren Cheng Yenwei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第1期1279-1302,共24页
Medical images are a critical component of the diagnostic process for clinicians.Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis,they must be encrypted due to the c... Medical images are a critical component of the diagnostic process for clinicians.Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis,they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images.Traditional watermark embedding algorithm embeds the watermark information into the medical image,which reduces the quality of the medical image and affects the physicians’judgment of patient diagnosis.In addition,watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks are destroyed.This paper proposes a novel watermarking algorithm using the convolutional neural networks(CNN)Inception V3 and the discrete cosine transform(DCT)to address above mentioned problems.First,the medical image is input into the Inception V3 network,which has been structured by adjusting parameters,such as the size of the convolution kernels and the typical architecture of the convolution modules.Second,the coefficients extracted from the fully connected layer of the network are transformed by DCT to obtain the feature vector of the medical image.At last,the watermarks are encrypted using the logistic map system and hash function,and the keys are stored by a third party.The encrypted watermarks and the original image features are performed logical operations to realize the embedding of zero-watermark.In the experimental section,multiple watermarking schemes using three different types of watermarks were implemented to verify the effectiveness of the three proposed algorithms.Our NC values for all the images are more than 90%accurate which shows the robustness of the algorithm.Extensive experimental results demonstrate the robustness under both conventional and high-intensity geometric attacks of the proposed algorithm. 展开更多
关键词 Inception V3 multi-watermarking DCT watermark encryption robustness
下载PDF
Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking
9
作者 Jiangyuan Yao Weiping Yang +5 位作者 Shuhua Weng Minrui Wang Zheng Jiang Deshun Li Yahui Li Xingcan Cao 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期741-755,共15页
Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,t... Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,the network topology of each control domain of SDN will affect the performance of the multidomain network,so performance evaluation is required before the deployment of the multi-domain SDN.Besides,there is a high cost to build real multi-domain SDN networks with different topologies,so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network.As there is a lack of existing methods to construct a multi-domain SDN simulation network for the tool to evaluate the topological performance automatically,this paper proposes an automated multi-domain SDN topology performance evaluation framework,which supports multiple types of SDN network topologies in cooperating to construct a multi-domain SDN network.The framework integrates existing single-domain SDN simulation tools with network performance testing tools to realize automated performance evaluation of multidomain SDN network topologies.We designed and implemented a Mininet-based simulation tool that can connect multiple controllers and run user-specified topologies in multiple SDN control domains to build and test multi-domain SDN networks faster.Then,we used the tool to perform performance tests on various data center network topologies in single-domain and multi-domain SDN simulation environments.Test results show that Space Shuffle has the most stable performance in a single-domain environment,and Fat-tree has the best performance in a multi-domain environment.Also,this tool has the characteristics of simplicity and stability,which can meet the needs of multi-domain SDN topology performance evaluation. 展开更多
关键词 Software-defined networking emulation network multi-domain SDN data center network topology
下载PDF
ProbD: Faulty Path Detection Based on Probability in Software-Defined Networking
10
作者 Jiangyuan Yao Jiawen Wang +4 位作者 Shuhua Weng Minrui Wang Deshun Li Yahui Li Xingcan Cao 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1783-1796,共14页
With the increasing number of switches in Software-Defined Network-ing(SDN),there are more and more faults rising in the data plane.However,due to the existence of link redundancy and multi-path forwarding mechanisms,t... With the increasing number of switches in Software-Defined Network-ing(SDN),there are more and more faults rising in the data plane.However,due to the existence of link redundancy and multi-path forwarding mechanisms,these problems cannot be detected in time.The current faulty path detection mechan-isms have problems such as the large scale of detection and low efficiency,which is difficult to meet the requirements of efficient faulty path detection in large-scale SDN.Concerning this issue,we propose an efficient network path fault testing model ProbD based on probability detection.This model achieves a high prob-ability of detecting arbitrary path fault in the form of small-scale random sam-pling.Under a certain path fault rate,ProbD obtains the curve of sample size and probability of detecting arbitrary path fault by randomly sampling network paths several times.After a small number of experiments,the ProbD model can cor-rectly estimate the path fault rate of the network and calculate the total number of paths that need to be detected according to the different probability of detecting arbitrary path fault and the path fault rate of the network.Thefinal experimental results show that,compared with the full path coverage test,the ProbD model based on probability detection can achieve efficient network testing with less overhead.Besides,the larger the network scale is,the more overhead will be saved. 展开更多
关键词 Probability detection faulty path detection software-defined networking
下载PDF
MSC-YOLO:Improved YOLOv7 Based on Multi-Scale Spatial Context for Small Object Detection in UAV-View
11
作者 Xiangyan Tang Chengchun Ruan +2 位作者 Xiulai Li Binbin Li Cebin Fu 《Computers, Materials & Continua》 SCIE EI 2024年第4期983-1003,共21页
Accurately identifying small objects in high-resolution aerial images presents a complex and crucial task in thefield of small object detection on unmanned aerial vehicles(UAVs).This task is challenging due to variati... Accurately identifying small objects in high-resolution aerial images presents a complex and crucial task in thefield of small object detection on unmanned aerial vehicles(UAVs).This task is challenging due to variations inUAV flight altitude,differences in object scales,as well as factors like flight speed and motion blur.To enhancethe detection efficacy of small targets in drone aerial imagery,we propose an enhanced You Only Look Onceversion 7(YOLOv7)algorithm based on multi-scale spatial context.We build the MSC-YOLO model,whichincorporates an additional prediction head,denoted as P2,to improve adaptability for small objects.We replaceconventional downsampling with a Spatial-to-Depth Convolutional Combination(CSPDC)module to mitigatethe loss of intricate feature details related to small objects.Furthermore,we propose a Spatial Context Pyramidwith Multi-Scale Attention(SCPMA)module,which captures spatial and channel-dependent features of smalltargets acrossmultiple scales.This module enhances the perception of spatial contextual features and the utilizationof multiscale feature information.On the Visdrone2023 and UAVDT datasets,MSC-YOLO achieves remarkableresults,outperforming the baseline method YOLOv7 by 3.0%in terms ofmean average precision(mAP).The MSCYOLOalgorithm proposed in this paper has demonstrated satisfactory performance in detecting small targets inUAV aerial photography,providing strong support for practical applications. 展开更多
关键词 Small object detection YOLOv7 multi-scale attention spatial context
下载PDF
Scene 3-D Reconstruction System in Scattering Medium
12
作者 Zhuoyifan Zhang Lu Zhang +1 位作者 LiangWang Haoming Wu 《Computers, Materials & Continua》 SCIE EI 2024年第8期3405-3420,共16页
Research on neural radiance fields for novel view synthesis has experienced explosive growth with the development of new models and extensions.The NeRF(Neural Radiance Fields)algorithm,suitable for underwater scenes o... Research on neural radiance fields for novel view synthesis has experienced explosive growth with the development of new models and extensions.The NeRF(Neural Radiance Fields)algorithm,suitable for underwater scenes or scattering media,is also evolving.Existing underwater 3D reconstruction systems still face challenges such as long training times and low rendering efficiency.This paper proposes an improved underwater 3D reconstruction system to achieve rapid and high-quality 3D reconstruction.First,we enhance underwater videos captured by a monocular camera to correct the image quality degradation caused by the physical properties of the water medium and ensure consistency in enhancement across frames.Then,we perform keyframe selection to optimize resource usage and reduce the impact of dynamic objects on the reconstruction results.After pose estimation using COLMAP,the selected keyframes undergo 3D reconstruction using neural radiance fields(NeRF)based on multi-resolution hash encoding for model construction and rendering.In terms of image enhancement,our method has been optimized in certain scenarios,demonstrating effectiveness in image enhancement and better continuity between consecutive frames of the same data.In terms of 3D reconstruction,our method achieved a peak signal-to-noise ratio(PSNR)of 18.40 dB and a structural similarity(SSIM)of 0.6677,indicating a good balance between operational efficiency and reconstruction quality. 展开更多
关键词 Underwater scene reconstruction image enhancement NeRF
下载PDF
Kernel-based adversarial attacks and defenses on support vector classification
13
作者 Wanman Li Xiaozhang Liu +1 位作者 Anli Yan Jie Yang 《Digital Communications and Networks》 SCIE CSCD 2022年第4期492-497,共6页
While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity... While malicious samples are widely found in many application fields of machine learning,suitable countermeasures have been investigated in the field of adversarial machine learning.Due to the importance and popularity of Support Vector Machines(SVMs),we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper.The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier.Specially,we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers.Utilizing this vulnerability function,we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack.Our defense method is verified to be very effective on the benchmark datasets,and the SVM classifier becomes more robust after using our kernel optimization scheme. 展开更多
关键词 Adversarial machine learning Support vector machines Evasion attack Vulnerability function Kernel optimization
下载PDF
Broad Learning System for Tackling Emerging Challenges in Face Recognition 被引量:1
14
作者 Wenjun Zhang WenfengWang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1597-1619,共23页
Face recognition has been rapidly developed and widely used.However,there is still considerable uncertainty in the computational intelligence based on human-centric visual understanding.Emerging challenges for face re... Face recognition has been rapidly developed and widely used.However,there is still considerable uncertainty in the computational intelligence based on human-centric visual understanding.Emerging challenges for face recognition are resulted from information loss.This study aims to tackle these challenges with a broad learning system(BLS).We integrated two models,IR3C with BLS and IR3C with a triplet loss,to control the learning process.In our experiments,we used different strategies to generate more challenging datasets and analyzed the competitiveness,sensitivity,and practicability of the proposed two models.In the model of IR3C with BLS,the recognition rates for the four challenging strategies are all 100%.In the model of IR3C with a triplet loss,the recognition rates are 94.61%,94.61%,96.95%,96.23%,respectively.The experiment results indicate that the proposed two models can achieve a good performance in tackling the considered information loss challenges from face recognition. 展开更多
关键词 Computational intelligence human-centric visual understanding
下载PDF
An Improved BPNN Prediction Method Based on Multi-Strategy Sparrow Search Algorithm 被引量:1
15
作者 Xiangyan Tang Dengfang Feng +3 位作者 KeQiu Li Jingxin Liu Jinyang Song Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第2期2789-2802,共14页
Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends.Back propagation(BP)neural network is a widely used prediction method.To re... Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends.Back propagation(BP)neural network is a widely used prediction method.To reduce its probability of falling into local optimum and improve the prediction accuracy,we propose an improved BP neural network prediction method based on a multi-strategy sparrow search algorithm(MSSA).The weights and thresholds of the BP neural network are optimized using the sparrow search algorithm(SSA).Three strategies are designed to improve the SSA to enhance its optimization-seeking ability,leading to the MSSA-BP prediction model.The MSSA algorithm was tested with nine different types of benchmark functions to verify the optimization performance of the algorithm.Two different datasets were selected for comparison experiments on three groups of models.Under the same conditions,the mean absolute error(MAE),root mean square error(RMSE),andmean absolute percentage error(MAPE)of the prediction results of MSSA-BPwere significantly reduced,and the convergence speed was significantly improved.MSSA-BP can effectively improve the prediction accuracy and has certain application value. 展开更多
关键词 PREDICTION parrow search algorithm back propagation neural network
下载PDF
Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT 被引量:1
16
作者 Mingshuai Sheng Jingbing Li +3 位作者 Uzair Aslam Bhatti Jing Liu Mengxing Huang Yen-Wei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第4期293-309,共17页
Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To beg... Medical images are used as a diagnostic tool, so protecting theirconfidentiality has long been a topic of study. From this, we propose aResnet50-DCT-based zero watermarking algorithm for use with medicalimages. To begin, we use Resnet50, a pre-training network, to draw out thedeep features of medical images. Then the deep features are transformedby DCT transform and the perceptual hash function is used to generatethe feature vector. The original watermark is chaotic scrambled to get theencrypted watermark, and the watermark information is embedded into theoriginal medical image by XOR operation, and the logical key vector isobtained and saved at the same time. Similarly, the same feature extractionmethod is used to extract the deep features of the medical image to be testedand generate the feature vector. Later, the XOR operation is carried outbetween the feature vector and the logical key vector, and the encryptedwatermark is extracted and decrypted to get the restored watermark;thenormalized correlation coefficient (NC) of the original watermark and therestored watermark is calculated to determine the ownership and watermarkinformation of the medical image to be tested. After calculation, most ofthe NC values are greater than 0.50. The experimental results demonstratethe algorithm’s robustness, invisibility, and security, as well as its ability toaccurately extract watermark information. The algorithm also shows goodresistance to conventional attacks and geometric attacks. 展开更多
关键词 Medical images deep residual network resnet50-DCT privacy protection ROBUSTNESS security
下载PDF
DecodeSTORM:A user-friendly ImageJ plug-in for quantitative data analysis in single-molecule localization microscopy
17
作者 Qihang Song Cheng Wu +3 位作者 Jianming Huang Zhiwei Zhou Zhen-Li Huang Zhengxia Wang 《Journal of Innovative Optical Health Sciences》 SCIE EI CSCD 2023年第6期77-89,共13页
Quantitative data analysis in single-molecule localization microscopy(SMLM)is crucial for studying cellular functions at the biomolecular level.In the past decade,several quantitative methods were developed for analyz... Quantitative data analysis in single-molecule localization microscopy(SMLM)is crucial for studying cellular functions at the biomolecular level.In the past decade,several quantitative methods were developed for analyzing SMLM data;however,imaging artifacts in SMLM experiments reduce the accuracy of these methods,and these methods were seldom designed as user-friendly tools.Researchers are now trying to overcome these di±culties by developing easyto-use SMLM data analysis software for certain image analysis tasks.But,this kind of software did not pay su±cient attention to the impact of imaging artifacts on the analysis accuracy,and usually contained only one type of analysis task.Therefore,users are still facing di±culties when they want to have the combined use of different types of analysis methods according to the characteristics of their data and their own needs.In this paper,we report an ImageJ plug-in called DecodeSTORM,which not only has a simple GUI for human–computer interaction,but also combines artifact correction with several quantitative analysis methods.DecodeSTORM includes format conversion,channel registration,artifact correction(drift correction and localization¯ltering),quantitative analysis(segmentation and clustering,spatial distribution statistics and colocalization)and visualization.Importantly,these data analysis methods can be combined freely,thus improving the accuracy of quantitative analysis and allowing users to have an optimal combination of methods.We believe DecodeSTORM is a user-friendly and powerful ImageJ plug-in,which provides an easy and accurate data analysis tool for adventurous biologists who are looking for new imaging tools for studying important questions in cell biology. 展开更多
关键词 Single-molecule localization microscopy artifact correction quantitative analysis ImageJ plug-in DecodeSTORM
下载PDF
Functional Pattern-Related Anomaly Detection Approach Collaborating Binary Segmentation with Finite State Machine
18
作者 Ming Wan Minglei Hao +2 位作者 Jiawei Li Jiangyuan Yao Yan Song 《Computers, Materials & Continua》 SCIE EI 2023年第12期3573-3592,共20页
The process control-oriented threat,which can exploit OT(Operational Technology)vulnerabilities to forcibly insert abnormal control commands or status information,has become one of the most devastating cyber attacks i... The process control-oriented threat,which can exploit OT(Operational Technology)vulnerabilities to forcibly insert abnormal control commands or status information,has become one of the most devastating cyber attacks in industrial automation control.To effectively detect this threat,this paper proposes one functional pattern-related anomaly detection approach,which skillfully collaborates the BinSeg(Binary Segmentation)algorithm with FSM(Finite State Machine)to identify anomalies between measuring data and control data.By detecting the change points of measuring data,the BinSeg algorithm is introduced to generate some initial sequence segments,which can be further classified and merged into different functional patterns due to their backward difference means and lengths.After analyzing the pattern association according to the Bayesian network,one functional state transition model based on FSM,which accurately describes the whole control and monitoring process,is constructed as one feasible detection engine.Finally,we use the typical SWaT(Secure Water Treatment)dataset to evaluate the proposed approach,and the experimental results show that:for one thing,compared with other change-point detection approaches,the BinSeg algorithm can be more suitable for the optimal sequence segmentation of measuring data due to its highest detection accuracy and least consuming time;for another,the proposed approach exhibits relatively excellent detection ability,because the average detection precision,recall rate and F1-score to identify 10 different attacks can reach 0.872,0.982 and 0.896,respectively. 展开更多
关键词 Process control-oriented threat anomaly detection binary segmentation FSM
下载PDF
A Survey on Image Semantic Segmentation Using Deep Learning Techniques
19
作者 Jieren Cheng Hua Li +2 位作者 Dengbo Li Shuai Hua Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1941-1957,共17页
Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due ... Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due to the remarkable performance of transformer and multilayer perceptron(MLP)in computer vision,which is equivalent to convolutional neural network(CNN),there has been a substantial amount of image semantic segmentation works aimed at developing different types of deep learning architecture.This survey aims to provide a comprehensive overview of deep learning methods in the field of general image semantic segmentation.Firstly,the commonly used image segmentation datasets are listed.Next,extensive pioneering works are deeply studied from multiple perspectives(e.g.,network structures,feature fusion methods,attention mechanisms),and are divided into four categories according to different network architectures:CNN-based architectures,transformer-based architectures,MLP-based architectures,and others.Furthermore,this paper presents some common evaluation metrics and compares the respective advantages and limitations of popular techniques both in terms of architectural design and their experimental value on the most widely used datasets.Finally,possible future research directions and challenges are discussed for the reference of other researchers. 展开更多
关键词 Deep learning semantic segmentation CNN MLP TRANSFORMER
下载PDF
Exploring High-Performance Architecture for Data Center Networks
20
作者 Deshun Li Shaorong Sun +5 位作者 Qisen Wu Shuhua Weng Yuyin Tan Jiangyuan Yao Xiangdang Huang Xingcan Cao 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期433-443,共11页
As a critical infrastructure of cloud computing,data center networks(DCNs)directly determine the service performance of data centers,which provide computing services for various applications such as big data processin... As a critical infrastructure of cloud computing,data center networks(DCNs)directly determine the service performance of data centers,which provide computing services for various applications such as big data processing and artificial intelligence.However,current architectures of data center networks suffer from a long routing path and a low fault tolerance between source and destination servers,which is hard to satisfy the requirements of high-performance data center networks.Based on dual-port servers and Clos network structure,this paper proposed a novel architecture RClos to construct high-performance data center networks.Logically,the proposed architecture is constructed by inserting a dual-port server into each pair of adjacent switches in the fabric of switches,where switches are connected in the form of a ring Clos structure.We describe the structural properties of RClos in terms of network scale,bisection bandwidth,and network diameter.RClos architecture inherits characteristics of its embedded Clos network,which can accommodate a large number of servers with a small average path length.The proposed architecture embraces a high fault tolerance,which adapts to the construction of various data center networks.For example,the average path length between servers is 3.44,and the standardized bisection bandwidth is 0.8 in RClos(32,5).The result of numerical experiments shows that RClos enjoys a small average path length and a high network fault tolerance,which is essential in the construction of high-performance data center networks. 展开更多
关键词 Data center networks dual-port server clos structure highperformance
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部