Tracking control is a very challenging problem in the networked control system(NCS), especially for the process with blurred mechanism and where only input-output data are available. This paper has proposed a data-bas...Tracking control is a very challenging problem in the networked control system(NCS), especially for the process with blurred mechanism and where only input-output data are available. This paper has proposed a data-based design approach for the networked tracking control system(NTCS). The method utilizes the input-output data of the controlled process to establish a predictive model with the help of fuzzy cluster modelling(FCM)technology. Then, the deduced error and error change in the future are treated as inputs of a fuzzy sliding mode controller(FSMC) to obtain a string of future control actions. These candidate control actions in the controller side are delivered to the plant side. Thus, the network induced time delays are compensated by selecting appropriate control action. Simulation outputs prove the validity of the proposed method.展开更多
Recently,multimodal sentiment analysis has increasingly attracted attention with the popularity of complementary data streams,which has great potential to surpass unimodal sentiment analysis.One challenge of multimoda...Recently,multimodal sentiment analysis has increasingly attracted attention with the popularity of complementary data streams,which has great potential to surpass unimodal sentiment analysis.One challenge of multimodal sentiment analysis is how to design an efficient multimodal feature fusion strategy.Unfortunately,existing work always considers feature-level fusion or decision-level fusion,and few research works focus on hybrid fusion strategies that contain feature-level fusion and decision-level fusion.To improve the performance of multimodal sentiment analysis,we present a novel multimodal sentiment analysis model using BiGRU and attention-based hybrid fusion strategy(BAHFS).Firstly,we apply BiGRU to learn the unimodal features of text,audio and video.Then we fuse the unimodal features into bimodal features using the bimodal attention fusion module.Next,BAHFS feeds the unimodal features and bimodal features into the trimodal attention fusion module and the trimodal concatenation fusion module simultaneously to get two sets of trimodal features.Finally,BAHFS makes a classification with the two sets of trimodal features respectively and gets the final analysis results with decision-level fusion.Based on the CMU-MOSI and CMU-MOSEI datasets,extensive experiments have been carried out to verify BAHFS’s superiority.展开更多
Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.F...Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting.展开更多
Controllable saturation reactors are widely used in reactive power compensation. The control system of controllable saturation reactor determines adaption speed, accuracy, and stability. First, an innovative type of c...Controllable saturation reactors are widely used in reactive power compensation. The control system of controllable saturation reactor determines adaption speed, accuracy, and stability. First, an innovative type of controllable saturation reactor is introduced. After that the control system is designed, and a self-tuning algorithm in PID controller is proposed in the paper. The algorithm tunes PID parameters automatically with different error signals caused by varied loads in power system. Then the feasibility of the above algorithm is verified by Simulink module of Matlab software. The results of simulation indicate that the control system can efficiently reduce adaption time and overshoot.展开更多
Aimed at the problems of small gradient, low learning rate, slow convergence error when the DBN using back-propagation process to fix the network connection weight and bias, proposing a new algorithm that combines wit...Aimed at the problems of small gradient, low learning rate, slow convergence error when the DBN using back-propagation process to fix the network connection weight and bias, proposing a new algorithm that combines with multi-innovation theory to improve standard DBN algorithm, that is the multi-innovation DBN(MI-DBN). It sets up a new model of back-propagation process in DBN algorithm, making the use of single innovation in previous algorithm extend to the use of innovation of the preceding multiple period, thus increasing convergence rate of error largely. To study the application of the algorithm in the social computing, and recognize the meaningful information about the handwritten numbers in social networking images. This paper compares MI-DBN algorithm with other representative classifiers through experiments. The result shows that MI-DBN algorithm, comparing with other representative classifiers, has a faster convergence rate and a smaller error for MNIST dataset recognition. And handwritten numbers on the image also have a precise degree of recognition.展开更多
Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families ...Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code.展开更多
With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the netw...With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the network being attacked by malicious code.Therefore,it is important to identify malicious codes on computer systems efficiently.However,most of the existing malicious code detection methods have two problems:(1)The ability of the model to extract features is weak,resulting in poor model performance.(2)The large scale of model data leads to difficulties deploying on devices with limited resources.Therefore,this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet(LCMISNet).In this paper,the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi-size depthwise separable convolution module.The feature slicing module reduces the number of parameters by grouping features.The multi-size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes.In addition,this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet.The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%,respectively.It proves that LCMISNet has a powerful malicious code recognition performance.In addition,compared with other network models,LCMISNet has better performance,and a lower number of parameters and computations.展开更多
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encoun...Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.展开更多
The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors...The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors such as doctors’knowledge and experience.The accuracy is difficult to guarantee and has a serious lag.In this paper,a mixture prediction model is proposed for perioperative adverse events of heart failure,which combined with the advantages of the Deep Pyramid Convolutional Neural Networks(DPCNN)and Extreme Gradient Boosting(XGBOOST).The DPCNN was used to automatically extract features from patient’s diagnostic texts,and the text features were integrated with the preoperative examination and intraoperative monitoring values of patients,then the XGBOOST algorithm was used to construct the prediction model of heart failure.An experimental comparison was conducted on the model based on the data of patients with heart failure in southwest hospital from 2014 to 2018.The results showed that the DPCNN-XGBOOST model improved the predictive sensitivity of the model by 3%and 31%compared with the text-based DPCNN Model and the numeric-based XGBOOST Model.展开更多
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has b...In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has become an important goal of the research community.Existing task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment model.Given the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is proposed.OTARP is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task assignments.The first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph matching.The second stage uses a bipartite graph to complete the online task assignment process.This paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment strategies.To encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’movement.To avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase utility.Finally,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated.展开更多
To elucidate the mechanisms underlying the differences in yield formation among two parents(P1 and P2) and their F1 hybrid of cucumber, biomass production and whole source–sink dynamics were analyzed using a functio...To elucidate the mechanisms underlying the differences in yield formation among two parents(P1 and P2) and their F1 hybrid of cucumber, biomass production and whole source–sink dynamics were analyzed using a functional–structural plant model(FSPM) that simulates both the number and size of individual organs. Observations of plant development and organ biomass were recorded throughout the growth periods of the plants. The GreenLab Model was used to analyze the differences in fruit setting, organ expansion, biomass production and biomass allocation. The source–sink parameters were estimated from the experimental measurements. Moreover, a particle swarm optimization algorithm(PSO) was applied to analyze whether the fruit setting is related to the source–sink ratio. The results showed that the internal source–sink ratio increased in the vegetative stage and reached a peak until the first fruit setting. The high yield of hybrid F1 is the compound result of both fruit setting and the internal source–sink ratio. The optimization results also revealed that the incremental changes in fruit weight result from the increases in sink strength and proportion of plant biomass allocation for fruits. The model-aided analysis revealed that heterosis is a result of a delicate compromise between fruit setting and fruit sink strength. The organlevel model may provide a computational approach to define the target of breeding by combination with a genetic model.展开更多
In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Fi...In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Firstly,the incoming color image is partitioned into non-overlapping blocks and each block is encoded using the W-plane method to get an initial common bitmap and quantization values.Then,the hill climbing algorithm is applied to optimize an initial common bitmap and generate a near-optimized common bitmap.Finally,the quantization values are recalculated by the near-optimized common bitmap and the considered color image is reconstructed block by block through the common bitmap and the new quantization values.Since the processing of each image block in SBBTC is independent and identical,parallel computing is applied to reduce the time consumption of this scheme.The simulation results show that the proposed scheme has better visual quality and time consumption than those of the reference SBBTC schemes.展开更多
Abdominal magnetic resonance imaging(MRI)and computed tomography(CT)are commonly used for disease screening,diagnosis,and treatment guidance.However,abdominal MRI has disadvantages including slow speed and vulnerabili...Abdominal magnetic resonance imaging(MRI)and computed tomography(CT)are commonly used for disease screening,diagnosis,and treatment guidance.However,abdominal MRI has disadvantages including slow speed and vulnerability to motions,while CT suffers from problems of radiation.It has been reported that deep learning reconstruction can solve such problems while maintaining good image quality.Recently,deep learning-based image reconstruction has become a hot topic in the field of medical imaging.This study reviews the latest research on deep learning reconstruction in abdominal imaging,including the widely used convolutional neural network,generative adversarial network,and recurrent neural network.展开更多
In order to further understand the mechanism of material volume change in the drying process,numerical simulations(considering or neglecting shrinkage)of heat and mass transfer during convective drying of carrot slice...In order to further understand the mechanism of material volume change in the drying process,numerical simulations(considering or neglecting shrinkage)of heat and mass transfer during convective drying of carrot slices under constant and controlled temperature and relative humidity were carried out.Simulated results were validated with experimental data.The results of the simulation show that the Quadratic model fitted well to the moisture ratio and the material temperature data trend with average relative errors of 5.9%and 8.1%,respectively.Additionally,the results of the simulation considering shrinkage show that the moisture and temperature distributions during drying are closer to the experimental data than the results of the simulation disregarding shrinkage.The material moisture content was significantly related to the shrinkage of dried tissue.Temperature and relative humidity significantly affected the volume shrinkage of carrot slices.The volume shrinkage increased with the rising of the constant temperature and the decline of relative humidity.This model can be used to provide more information on the dynamics of heat and mass transfer during drying and can also be adapted to other products and dryers devices.展开更多
The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to ...The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to support massive network nodes, the common participation over all nodes in the consensus mechanism would lead to increased communication complexity, and the arbitrary selection of master nodes would also lead to inefficient consensus. This paper offered a PBFT consensus method (Role Division-based Practical Byzantine Fault Tolerance, RD-PBFT) to address the above problems based on node role division. First, the nodes in the system voted with each other to divide the high reputation group and low reputation group, and determined the starting reputation value of the nodes. Then, the mobile node in the group was divided into roles according to the high reputation value, and a total of three roles were divided into consensus node, backup node, and supervisory node to reduce the number of nodes involved in the consensus process and reduced the complexity of communication. In addition, an adaptive method was used to select the master nodes in the consensus process, and an integer value was introduced to ensure the unpredictability and equality of the master node selection. Experimentally, it was verified that the algorithm has lower communication complexity and better decentralization characteristics compared with the PBFT consensus algorithm, which improved the efficiency of consensus.展开更多
A multi-functional full-space metasurface based on frequency and polarization multiplexing is proposed.The metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric substra...A multi-functional full-space metasurface based on frequency and polarization multiplexing is proposed.The metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric substrate.The unit cell can control electromagnetic wavefronts to achieve a broadband transmission with amplitudes greater than 0.4 from 4.4 to 10.4 GHz.Meanwhile,at 11.7 GHz and 15.4 GHz,four high-efficiency reflection channels with a reflection amplitude greater than 0.8 are also realized.When illuminated by linearly polarized waves,five different functions can be realized at five different frequencies,which are demonstrated by theoretical calculations,full-wave simulations,and experimental measurements.展开更多
With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT t...With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability.展开更多
With the development of the Internet of Things(IoT),spatio-temporal crowdsourcing(mobile crowdsourcing)has become an emerging paradigm for addressing location-based sensing tasks.However,the delay caused by network tr...With the development of the Internet of Things(IoT),spatio-temporal crowdsourcing(mobile crowdsourcing)has become an emerging paradigm for addressing location-based sensing tasks.However,the delay caused by network transmission has led to low data processing efficiency.Fortunately,edge computing can solve this problem,effectively reduce the delay of data transmission,and improve data processing capacity,so that the crowdsourcing platform can make better decisions faster.Therefore,this paper combines spatio-temporal crowdsourcing and edge computing to study the Multi-Objective Optimization Task Assignment(MOO-TA)problem in the edge computing environment.The proposed online incentive mechanism considers the task difficulty attribute to motivate crowd workers to perform sensing tasks in the unpopular area.In this paper,the Weighted and Multi-Objective Particle Swarm Combination(WAMOPSC)algorithm is proposed to maximize both platform’s and crowd workers’utility,so as to maximize social welfare.The algorithm combines the traditional Linear Weighted Summation(LWS)algorithm and Multi-Objective Particle Swarm Optimization(MOPSO)algorithm to find pareto optimal solutions of multi-objective optimization task assignment problem as much as possible for crowdsourcing platform to choose.Through comparison experiments on real data sets,the effectiveness and feasibility of the proposed method are evaluated.展开更多
基金supported by the National High Technology Research and Development Program(863 program)of China(2012AA101906-2)the National Natural Science Foundation of China(3140030594)
基金supported by the National Natural Science Foundation of China(51205025,51775048,61602041)the Science and Technology Program of Beijing Municipal Education Commission(KM201611417009,KM201811417001)+6 种基金the Premium Funding Project(BPHR2017CZ08)for Academic Human Resources Development in Beijing Union University(BUU)the Beijing Natural Science FoundationBeijing Municipal Education Commission Joint Fund(KZ201811417048)the Project of 2018-2019 Basic Research Fund of BUUthe Beijing Advanced Innovation Center for Intelligent Robots and Systems Open Fund(2018I RS17)the 2016 Beijing High Level Personnel Cross Training Program “Practical Training Plan”the Project of Beijing Municipal Natural Science Foundation(4142018)the Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions(CIT&TCD20150314)
文摘Tracking control is a very challenging problem in the networked control system(NCS), especially for the process with blurred mechanism and where only input-output data are available. This paper has proposed a data-based design approach for the networked tracking control system(NTCS). The method utilizes the input-output data of the controlled process to establish a predictive model with the help of fuzzy cluster modelling(FCM)technology. Then, the deduced error and error change in the future are treated as inputs of a fuzzy sliding mode controller(FSMC) to obtain a string of future control actions. These candidate control actions in the controller side are delivered to the plant side. Thus, the network induced time delays are compensated by selecting appropriate control action. Simulation outputs prove the validity of the proposed method.
基金funded by the National Natural Science Foundation of China (Grant No.61872126,No.62273290)supported by the Key project of Natural Science Foundation of Shandong Province (Grant No.ZR2020KF019).
文摘Recently,multimodal sentiment analysis has increasingly attracted attention with the popularity of complementary data streams,which has great potential to surpass unimodal sentiment analysis.One challenge of multimodal sentiment analysis is how to design an efficient multimodal feature fusion strategy.Unfortunately,existing work always considers feature-level fusion or decision-level fusion,and few research works focus on hybrid fusion strategies that contain feature-level fusion and decision-level fusion.To improve the performance of multimodal sentiment analysis,we present a novel multimodal sentiment analysis model using BiGRU and attention-based hybrid fusion strategy(BAHFS).Firstly,we apply BiGRU to learn the unimodal features of text,audio and video.Then we fuse the unimodal features into bimodal features using the bimodal attention fusion module.Next,BAHFS feeds the unimodal features and bimodal features into the trimodal attention fusion module and the trimodal concatenation fusion module simultaneously to get two sets of trimodal features.Finally,BAHFS makes a classification with the two sets of trimodal features respectively and gets the final analysis results with decision-level fusion.Based on the CMU-MOSI and CMU-MOSEI datasets,extensive experiments have been carried out to verify BAHFS’s superiority.
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis(No.HCIC201502,HCIC201701)。
文摘Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting.
文摘Controllable saturation reactors are widely used in reactive power compensation. The control system of controllable saturation reactor determines adaption speed, accuracy, and stability. First, an innovative type of controllable saturation reactor is introduced. After that the control system is designed, and a self-tuning algorithm in PID controller is proposed in the paper. The algorithm tunes PID parameters automatically with different error signals caused by varied loads in power system. Then the feasibility of the above algorithm is verified by Simulink module of Matlab software. The results of simulation indicate that the control system can efficiently reduce adaption time and overshoot.
文摘Aimed at the problems of small gradient, low learning rate, slow convergence error when the DBN using back-propagation process to fix the network connection weight and bias, proposing a new algorithm that combines with multi-innovation theory to improve standard DBN algorithm, that is the multi-innovation DBN(MI-DBN). It sets up a new model of back-propagation process in DBN algorithm, making the use of single innovation in previous algorithm extend to the use of innovation of the preceding multiple period, thus increasing convergence rate of error largely. To study the application of the algorithm in the social computing, and recognize the meaningful information about the handwritten numbers in social networking images. This paper compares MI-DBN algorithm with other representative classifiers through experiments. The result shows that MI-DBN algorithm, comparing with other representative classifiers, has a faster convergence rate and a smaller error for MNIST dataset recognition. And handwritten numbers on the image also have a precise degree of recognition.
基金support this work is the Key Research and Development Program of Heilongjiang Province,specifically Grant Number 2023ZX02C10.
文摘Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code.
文摘With the growth of the Internet,more and more business is being done online,for example,online offices,online education and so on.While this makes people’s lives more convenient,it also increases the risk of the network being attacked by malicious code.Therefore,it is important to identify malicious codes on computer systems efficiently.However,most of the existing malicious code detection methods have two problems:(1)The ability of the model to extract features is weak,resulting in poor model performance.(2)The large scale of model data leads to difficulties deploying on devices with limited resources.Therefore,this paper proposes a lightweight malicious code identification model Lightweight Malicious Code Classification Method Based on Improved SqueezeNet(LCMISNet).In this paper,the MFire lightweight feature extraction module is constructed by proposing a feature slicing module and a multi-size depthwise separable convolution module.The feature slicing module reduces the number of parameters by grouping features.The multi-size depthwise separable convolution module reduces the number of parameters and enhances the feature extraction capability by replacing the standard convolution with depthwise separable convolution with different convolution kernel sizes.In addition,this paper also proposes a feature splicing module to connect the MFire lightweight feature extraction module based on the feature reuse and constructs the lightweight model LCMISNet.The malicious code recognition accuracy of LCMISNet on the BIG 2015 dataset and the Malimg dataset reaches 98.90% and 99.58%,respectively.It proves that LCMISNet has a powerful malicious code recognition performance.In addition,compared with other network models,LCMISNet has better performance,and a lower number of parameters and computations.
基金National Natural Science Foundation of China(62072392).
文摘Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.
基金This study was approved by the Ethics Committee of the First Affiliated Hospital of Army Medical University,PLA,and the Approved No.of ethic committee is KY201936This work is supported by the National Key Research&Development Plan of China(2018YFC0116704)in data collectionIn addition,it is supported by Chongqing Technology Innovation and application research and development project(cstc2019jscx-msxmx0237)in the design of the study.
文摘The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients.Existing methods depend on the judgment of doctors,the results are affected by many factors such as doctors’knowledge and experience.The accuracy is difficult to guarantee and has a serious lag.In this paper,a mixture prediction model is proposed for perioperative adverse events of heart failure,which combined with the advantages of the Deep Pyramid Convolutional Neural Networks(DPCNN)and Extreme Gradient Boosting(XGBOOST).The DPCNN was used to automatically extract features from patient’s diagnostic texts,and the text features were integrated with the preoperative examination and intraoperative monitoring values of patients,then the XGBOOST algorithm was used to construct the prediction model of heart failure.An experimental comparison was conducted on the model based on the data of patients with heart failure in southwest hospital from 2014 to 2018.The results showed that the DPCNN-XGBOOST model improved the predictive sensitivity of the model by 3%and 31%compared with the text-based DPCNN Model and the numeric-based XGBOOST Model.
基金supported in part by the National Natural Science Foundation of China under Grant 62072392,Grant 61822602,Grant 61772207,Grant 61802331,Grant 61602399,Grant 61702439,Grant 61773331,and Grant 62062034the China Postdoctoral Science Foundation under Grant 2019T120732 and Grant 2017M622691+2 种基金the Natural Science Foundation of Shandong Province under Grant ZR2016FM42the Major scientific and technological innovation projects of Shandong Province under Grant 2019JZZY020131the Key projects of Shandong Natural Science Foundation under Grant ZR2020KF019.
文摘In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical world.As a part of the IoT ecosystem,task assignment has become an important goal of the research community.Existing task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment model.Given the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is proposed.OTARP is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task assignments.The first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph matching.The second stage uses a bipartite graph to complete the online task assignment process.This paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment strategies.To encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’movement.To avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase utility.Finally,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated.
基金This work was supported by the National Natural Science Foundation of China(31700315 and 61533019)the Natural Science Foundation of Chongqing,China(cstc2018jcyjAX0587)+1 种基金the Chinese Academy of Science(CAS)-Thailand National Science and Technology Development Agency(NSTDA)Joint Research Program(GJHZ2076)The authors thank Wang Qian and Mory Diakite for their assistance in the experiment.
文摘To elucidate the mechanisms underlying the differences in yield formation among two parents(P1 and P2) and their F1 hybrid of cucumber, biomass production and whole source–sink dynamics were analyzed using a functional–structural plant model(FSPM) that simulates both the number and size of individual organs. Observations of plant development and organ biomass were recorded throughout the growth periods of the plants. The GreenLab Model was used to analyze the differences in fruit setting, organ expansion, biomass production and biomass allocation. The source–sink parameters were estimated from the experimental measurements. Moreover, a particle swarm optimization algorithm(PSO) was applied to analyze whether the fruit setting is related to the source–sink ratio. The results showed that the internal source–sink ratio increased in the vegetative stage and reached a peak until the first fruit setting. The high yield of hybrid F1 is the compound result of both fruit setting and the internal source–sink ratio. The optimization results also revealed that the incremental changes in fruit weight result from the increases in sink strength and proportion of plant biomass allocation for fruits. The model-aided analysis revealed that heterosis is a result of a delicate compromise between fruit setting and fruit sink strength. The organlevel model may provide a computational approach to define the target of breeding by combination with a genetic model.
基金Supported by the National Natural Science Foundation of China(No.61402537)the Open Fund of Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis(No.HCIC201706)the Sichuan Science and Technology Programme(No.2018GZDZX0041)
文摘In order to generate an efficient common bitmap in single bitmap block truncation coding(SBBTC)of color images,an improved SBBTC scheme based on weighted plane(W-plane)method and hill climbing algorithm is proposed.Firstly,the incoming color image is partitioned into non-overlapping blocks and each block is encoded using the W-plane method to get an initial common bitmap and quantization values.Then,the hill climbing algorithm is applied to optimize an initial common bitmap and generate a near-optimized common bitmap.Finally,the quantization values are recalculated by the near-optimized common bitmap and the considered color image is reconstructed block by block through the common bitmap and the new quantization values.Since the processing of each image block in SBBTC is independent and identical,parallel computing is applied to reduce the time consumption of this scheme.The simulation results show that the proposed scheme has better visual quality and time consumption than those of the reference SBBTC schemes.
基金National Natural Science Foundation of China,No.61902338 and No.62001120Shanghai Sailing Program,No.20YF1402400.
文摘Abdominal magnetic resonance imaging(MRI)and computed tomography(CT)are commonly used for disease screening,diagnosis,and treatment guidance.However,abdominal MRI has disadvantages including slow speed and vulnerability to motions,while CT suffers from problems of radiation.It has been reported that deep learning reconstruction can solve such problems while maintaining good image quality.Recently,deep learning-based image reconstruction has become a hot topic in the field of medical imaging.This study reviews the latest research on deep learning reconstruction in abdominal imaging,including the widely used convolutional neural network,generative adversarial network,and recurrent neural network.
基金supported by Earmarked Fund for China Agriculture Research System(CARS-21).
文摘In order to further understand the mechanism of material volume change in the drying process,numerical simulations(considering or neglecting shrinkage)of heat and mass transfer during convective drying of carrot slices under constant and controlled temperature and relative humidity were carried out.Simulated results were validated with experimental data.The results of the simulation show that the Quadratic model fitted well to the moisture ratio and the material temperature data trend with average relative errors of 5.9%and 8.1%,respectively.Additionally,the results of the simulation considering shrinkage show that the moisture and temperature distributions during drying are closer to the experimental data than the results of the simulation disregarding shrinkage.The material moisture content was significantly related to the shrinkage of dried tissue.Temperature and relative humidity significantly affected the volume shrinkage of carrot slices.The volume shrinkage increased with the rising of the constant temperature and the decline of relative humidity.This model can be used to provide more information on the dynamics of heat and mass transfer during drying and can also be adapted to other products and dryers devices.
文摘The PBFT (Practical Byzantine Fault Tolerance, PBFT) consensus algorithm, which addressed the issue of malicious nodes sending error messages to disrupt the system operation in distributed systems, was challenging to support massive network nodes, the common participation over all nodes in the consensus mechanism would lead to increased communication complexity, and the arbitrary selection of master nodes would also lead to inefficient consensus. This paper offered a PBFT consensus method (Role Division-based Practical Byzantine Fault Tolerance, RD-PBFT) to address the above problems based on node role division. First, the nodes in the system voted with each other to divide the high reputation group and low reputation group, and determined the starting reputation value of the nodes. Then, the mobile node in the group was divided into roles according to the high reputation value, and a total of three roles were divided into consensus node, backup node, and supervisory node to reduce the number of nodes involved in the consensus process and reduced the complexity of communication. In addition, an adaptive method was used to select the master nodes in the consensus process, and an integer value was introduced to ensure the unpredictability and equality of the master node selection. Experimentally, it was verified that the algorithm has lower communication complexity and better decentralization characteristics compared with the PBFT consensus algorithm, which improved the efficiency of consensus.
基金This work was supported by the Natural Science Foundation of Heilongjiang Province(No.LH2022F053)the National Natural Science Foundation of China(Nos.62275063 and 62171153)+3 种基金the Scientific and Technological Development Project of the Central Government Guiding Local(No.SBZY2021E076)the Open Project of State Key Laboratory of Millimeter Waves(No.K202309)the Postdoctoral Research Fund Project of Heilongjiang Province of China(No.LBH-Q21195)the Fundamental Research Funds of Heilongjiang Provincial Universities of China(No.145209151).
文摘A multi-functional full-space metasurface based on frequency and polarization multiplexing is proposed.The metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric substrate.The unit cell can control electromagnetic wavefronts to achieve a broadband transmission with amplitudes greater than 0.4 from 4.4 to 10.4 GHz.Meanwhile,at 11.7 GHz and 15.4 GHz,four high-efficiency reflection channels with a reflection amplitude greater than 0.8 are also realized.When illuminated by linearly polarized waves,five different functions can be realized at five different frequencies,which are demonstrated by theoretical calculations,full-wave simulations,and experimental measurements.
文摘With the development of Internet of Things(IoT),the delay caused by network transmission has led to low data processing efficiency.At the same time,the limited computing power and available energy consumption of IoT terminal devices are also the important bottlenecks that would restrict the application of blockchain,but edge computing could solve this problem.The emergence of edge computing can effectively reduce the delay of data transmission and improve data processing capacity.However,user data in edge computing is usually stored and processed in some honest-but-curious authorized entities,which leads to the leakage of users’privacy information.In order to solve these problems,this paper proposes a location data collection method that satisfies the local differential privacy to protect users’privacy.In this paper,a Voronoi diagram constructed by the Delaunay method is used to divide the road network space and determine the Voronoi grid region where the edge nodes are located.A random disturbance mechanism that satisfies the local differential privacy is utilized to disturb the original location data in each Voronoi grid.In addition,the effectiveness of the proposed privacy-preserving mechanism is verified through comparison experiments.Compared with the existing privacy-preserving methods,the proposed privacy-preserving mechanism can not only better meet users’privacy needs,but also have higher data availability.
基金supported in part by the National Natural Science Foundation of China under Grant 61822602,Grant 61772207,Grant 61802331,Grant 61572418,Grant 61602399,Grant 61702439 and Grant 61773331the China Postdoctoral Science Foundation under Grant 2019T120732 and Grant 2017M622691+1 种基金the National Science Foundation(NSF)under Grant 1704287,Grant 1252292 and Grant 1741277the Natural Science Foundation of Shandong Province under Grant ZR2016FM42.
文摘With the development of the Internet of Things(IoT),spatio-temporal crowdsourcing(mobile crowdsourcing)has become an emerging paradigm for addressing location-based sensing tasks.However,the delay caused by network transmission has led to low data processing efficiency.Fortunately,edge computing can solve this problem,effectively reduce the delay of data transmission,and improve data processing capacity,so that the crowdsourcing platform can make better decisions faster.Therefore,this paper combines spatio-temporal crowdsourcing and edge computing to study the Multi-Objective Optimization Task Assignment(MOO-TA)problem in the edge computing environment.The proposed online incentive mechanism considers the task difficulty attribute to motivate crowd workers to perform sensing tasks in the unpopular area.In this paper,the Weighted and Multi-Objective Particle Swarm Combination(WAMOPSC)algorithm is proposed to maximize both platform’s and crowd workers’utility,so as to maximize social welfare.The algorithm combines the traditional Linear Weighted Summation(LWS)algorithm and Multi-Objective Particle Swarm Optimization(MOPSO)algorithm to find pareto optimal solutions of multi-objective optimization task assignment problem as much as possible for crowdsourcing platform to choose.Through comparison experiments on real data sets,the effectiveness and feasibility of the proposed method are evaluated.