期刊文献+
共找到88篇文章
< 1 2 5 >
每页显示 20 50 100
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
1
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
下载PDF
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
2
作者 Yi Ding Jiaqi Zhang +2 位作者 Zhen Qin Yang Zhao Mingsheng Cao 《计算机教育》 2023年第12期71-77,共7页
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic... In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities. 展开更多
关键词 Medical imaging Information security Postgraduate training Countermeasures and suggestions
下载PDF
Research and Exploration on the Construction of Double Qualified Teachers in Software Engineering 被引量:1
3
作者 Yili Li Guobin Zhu +1 位作者 Man Fang Jimin Shi 《计算机教育》 2021年第12期121-125,共5页
In order to solve the problem of insufficient integration of school-enterprise supervisors in the current school-enterprise cooperation model,this article introduces the ideas and results of the construction of a team... In order to solve the problem of insufficient integration of school-enterprise supervisors in the current school-enterprise cooperation model,this article introduces the ideas and results of the construction of a team with double-qualified instructors majored in software engineering.Specifically,the integration of production and education are carried out in three stages,i.e.,enterprise cooperation courses,enterprise internship,and graduation design(internship),by taking the software engineering major of the School of Information and Software Engineering of the University of Electronic Science and Technology of China as a case study. 展开更多
关键词 software engineering double qualification type faculty development
下载PDF
Teaching and Practice of Database Course for Software Engineering Ability Training
4
作者 Fengli Zhang Xin Lu Ruijin Wang 《计算机教育》 2020年第12期35-42,共8页
In view of the fact that the relevant courses of undergraduate database are not systematic,this paper discusses the relevant requirements of database courses from the perspective of the ability training of software en... In view of the fact that the relevant courses of undergraduate database are not systematic,this paper discusses the relevant requirements of database courses from the perspective of the ability training of software engineering.It gives the problem-oriented classroom and experimental design of the course content module,designs and develops the course learning platform,analyzes the data of the teaching effect,and explains the effectiveness of course teaching. 展开更多
关键词 problem oriented ability training course practice
下载PDF
Consideration of Postgraduate Training under the Cross Field of Medical Information and Engineering
5
作者 Yi Ding Yiqian Wang +3 位作者 Zhen Qin Yang Zhao Mingsheng Cao Zhiguang Qin 《计算机教育》 2021年第12期106-114,共9页
The slogan of“Combination of medicine and engineering”proposed in“Made in China 2025”has aroused great attention to higher engineering education.However,it is a difficult problem and challenge for schools and educ... The slogan of“Combination of medicine and engineering”proposed in“Made in China 2025”has aroused great attention to higher engineering education.However,it is a difficult problem and challenge for schools and educators to effectively adapt to the economic and social development,train new medical and engineering talents,and explore and cultivate new subject growth points.In order to deal with engineering change and a new round of scientific and technological revolution,facing the challenge of new engineering construction.This paper will combine the reality and characteristics of colleges and universities,analyze the problems existing in the current medical engineering cross-graduate training,and put forward countermeasures and suggestions to promote the progress and development of science and technology in colleges and universities. 展开更多
关键词 medical and engineering cross field postgraduate training plans countermeasures and suggestions
下载PDF
Reform and Practice of Software Engineering Teaching under the Background of Emerging Engineering Education
6
作者 Yang Zhao Hu Xiong +3 位作者 Xuyun Nie Zhen Qin Yi Ding Zhiguang Qin 《计算机教育》 2021年第12期195-200,共6页
This paper analyzes the new demands of software engineering talent training under the background of emerging engineering education,in order to clarify the direction of software engineering teaching reform,and discusse... This paper analyzes the new demands of software engineering talent training under the background of emerging engineering education,in order to clarify the direction of software engineering teaching reform,and discusses the issue of how to build core competencies of software engineering talent.This paper takes“consolidating professional foundation,training practical ability and improving innovation ability”as the goal of software engineering talent training,puts forward the conception of software engineering teaching reform with“reconstructing the core course platform,improving the practice teaching system,and creating an innovation training environment”,and expounds the teaching reform practice activities based on this conception.Finally,the paper summarizes the achievements of teaching reform. 展开更多
关键词 emerging engineering education software engineering teaching reform
下载PDF
Design of multilayer cellular neural network based on memristor crossbar and its application to edge detection 被引量:1
7
作者 YU Yongbin TANG Haowen +2 位作者 FENG Xiao WANG Xiangxiang HUANG Hang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第3期641-649,共9页
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t... Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators. 展开更多
关键词 edge detection figure of merit(FOM) memristor crossbar synaptic circuit memristor crossbar-based cellular neural network(MCM-CNN)
下载PDF
Neural Machine Translation by Fusing Key Information of Text
8
作者 Shijie Hu Xiaoyu Li +8 位作者 Jiayu Bai Hang Lei Weizhong Qian Sunqiang Hu Cong Zhang Akpatsa Samuel Kofi Qian Qiu Yong Zhou Shan Yang 《Computers, Materials & Continua》 SCIE EI 2023年第2期2803-2815,共13页
When the Transformer proposed by Google in 2017,it was first used for machine translation tasks and achieved the state of the art at that time.Although the current neural machine translation model can generate high qu... When the Transformer proposed by Google in 2017,it was first used for machine translation tasks and achieved the state of the art at that time.Although the current neural machine translation model can generate high quality translation results,there are still mistranslations and omissions in the translation of key information of long sentences.On the other hand,the most important part in traditional translation tasks is the translation of key information.In the translation results,as long as the key information is translated accurately and completely,even if other parts of the results are translated incorrect,the final translation results’quality can still be guaranteed.In order to solve the problem of mistranslation and missed translation effectively,and improve the accuracy and completeness of long sentence translation in machine translation,this paper proposes a key information fused neural machine translation model based on Transformer.The model proposed in this paper extracts the keywords of the source language text separately as the input of the encoder.After the same encoding as the source language text,it is fused with the output of the source language text encoded by the encoder,then the key information is processed and input into the decoder.With incorporating keyword information from the source language sentence,the model’s performance in the task of translating long sentences is very reliable.In order to verify the effectiveness of the method of fusion of key information proposed in this paper,a series of experiments were carried out on the verification set.The experimental results show that the Bilingual Evaluation Understudy(BLEU)score of the model proposed in this paper on theWorkshop on Machine Translation(WMT)2017 test dataset is higher than the BLEU score of Transformer proposed by Google on the WMT2017 test dataset.The experimental results show the advantages of the model proposed in this paper. 展开更多
关键词 Key information TRANSFORMER FUSION neural machine translation
下载PDF
Exploration of the Training Mode of School-enterprise Collaborative AI Innovative Talents Based on PaddlePaddle
9
作者 Yili Li Guobin Zhu Mengya Xie 《计算机教育》 2023年第12期214-220,共7页
This paper takes the school-enterprise cooperation between the University of Electronic Science and Technology of China(UESTC)and Baidu(China)Co.,Ltd.as an example to build the Paddle Paddle(Sichuan)AI Education Innov... This paper takes the school-enterprise cooperation between the University of Electronic Science and Technology of China(UESTC)and Baidu(China)Co.,Ltd.as an example to build the Paddle Paddle(Sichuan)AI Education Innovation Center by enjoying the best of both UESTC and Baidu(China),and cooperating with 16 universities in Sichuan Province.With the support of this center,both the school and the enterprise successfully built a school-enterprise collaborative AI innovative talent training model,which mainly serves the universities,industries,and districts.Furthermore,this training model is able to facilitate the update of the industrial intelligence and the regional economic development in southwest China,and also provide a reference for deep integration of school-enterprise collaboration and the cultivation of innovative talents in electronic information fields. 展开更多
关键词 PaddlePaddle School-enterprise collaboration AI innovative talents Training model
下载PDF
The Exploration of Talent Cultivation in Software Engineering“ Internet Plus Finance” 被引量:1
10
作者 Yili Li Guobin Zhu +1 位作者 Junmin Miao Mengya Xie 《计算机教育》 2022年第12期94-100,共7页
With the rapid development of the Internet finance industry,society has put forward urgent needs for“Internet Plus finance”composite talents,and also put forward challenges to talent cultivation in colleges and univ... With the rapid development of the Internet finance industry,society has put forward urgent needs for“Internet Plus finance”composite talents,and also put forward challenges to talent cultivation in colleges and universities.To cultivate the talents in the“Internet Plus finance”,the School of Information and Software Engineering of the University of Electronic Science and Technology of China(hereinafter“the School”)begins the 10 major measures,such as the construction of training programs,the construction of the curriculum system,the construction of the faculty team,and the construction of the practice base.Meanwhile,the School works together with banks,which have cooperated for a long time,to establish the talent cultivation system in the direction of“Internet Plus finance”in the software engineering major,solving the problem of interdisciplinary talent training in the field of software engineering and finance. 展开更多
关键词 Software engineering “Internet plus finance” Talent cultivation
下载PDF
Research on the Ideological and Political Construction of Mathematics Foundations of Information Security
11
作者 Hu Xiong Hang Yan Yili Li 《计算机教育》 2022年第12期120-123,共4页
Mathematics foundations of information security is a core course in the subject of information security.In view of the current national ideological and political conference in universities,finding a way to integrate t... Mathematics foundations of information security is a core course in the subject of information security.In view of the current national ideological and political conference in universities,finding a way to integrate this course with ideological and political education attracts a lot of attention from the education community.This paper makes an assay of the significance of the combination of mathematics foundations of information security course and ideological and political education,and introduces the teaching practice of mathematics foundations of information security course combined with ideological and political education.Through the combination of ideological and political education and curriculum content,cultivating all-round development of talents who study information security. 展开更多
关键词 Mathematics foundations of information security Ideological and political education Information security
下载PDF
Multiple mode cooperation based software engineering talents training
12
作者 Fuhu Deng Ji Geng 《计算机教育》 2022年第12期54-59,共6页
The main problems of the traditional software talent training are that the knowledge learned is out of touch of the industry,weak ability to solve complex engineering problems and the comprehensive quality cannot meet... The main problems of the traditional software talent training are that the knowledge learned is out of touch of the industry,weak ability to solve complex engineering problems and the comprehensive quality cannot meet the requirements of enterprises.Taking the course of digital image processing as an example,this paper analyzes the key steps in the training process in details,and proposes a multiple mode collaborative based software engineering talent training mechanism,which brings the key subjects of teaching materials,teachers,students,enterprises,subjects into a unified training mechanism,so as to provide a new ideas for software talent teaching. 展开更多
关键词 Software engineering talent teaching Multiple mode cooperation Digit image processing
下载PDF
School-Enterprise Cooperation in Excellent Engineer Education and Training Program at UESTC 被引量:1
13
作者 Ting Zhong Guobin Zhu 《计算机教育》 2018年第12期138-140,共3页
School of Information and Software Engineering at University of Electronic Science and Technology of China(abbreviated hereafter as "SISE") joined Excellent Engineer Education and Training Program launched b... School of Information and Software Engineering at University of Electronic Science and Technology of China(abbreviated hereafter as "SISE") joined Excellent Engineer Education and Training Program launched by Ministry of Education of China in 2011. This paper discussed nine models of school-enterprise cooperation practiced at SISE since 2011. The school-enterprise cooperation model effectively broadens the students' horizons and improves the students' practical ability and has been recognized by academic circles. 展开更多
关键词 school-enterprise COOPERATION CO-CULTIVATION ENGINEER Education and Training
下载PDF
Improved Prediction and Understanding of Glass-Forming Ability Based on Random Forest Algorithm 被引量:1
14
作者 Chenjing Su Xiaoyu Li +3 位作者 Mengru Li Qinsheng Zhu Hao Fu Shan Yang 《Journal of Quantum Computing》 2021年第2期79-87,共9页
As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming... As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming ability(GFA)even given the criteria in theory and this problem greatly limits the application of bulk MG in industrial field.In this work,the proposed model uses the random forest classification method which is one of machine learning methods to solve the GFA prediction for binary metallic alloys.Compared with the previous SVM algorithm models of all features combinations,this new model is successfully constructed based on the random forest classification method with a new combination of features and it obtains better prediction results.Simultaneously,it further shows the degree of feature parameters influence on GFA.Finally,a normalized evaluation indicator of binary alloy for machine learning model performance is put forward for the first time.The result shows that the application of machine learning in MGs is valuable. 展开更多
关键词 GFA random forest binary alloy machine learning
下载PDF
Intention Estimation of Adversarial Spatial Target Based on Fuzzy Inference 被引量:2
15
作者 Wenjia Xiang Xiaoyu Li +4 位作者 Zirui He Chenjing Su Wangchi Cheng Chao Lu Shan Yang 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3627-3639,共13页
Estimating the intention of space objects plays an important role in air-craft design,aviation safety,military and otherfields,and is an important refer-ence basis for air situation analysis and command decision-making... Estimating the intention of space objects plays an important role in air-craft design,aviation safety,military and otherfields,and is an important refer-ence basis for air situation analysis and command decision-making.This paper studies an intention estimation method based on fuzzy theory,combining prob-ability to calculate the intention between two objects.This method takes a space object as the origin of coordinates,observes the target’s distance,speed,relative heading angle,altitude difference,steering trend and etc.,then introduces the spe-cific calculation methods of these parameters.Through calculation,values are input into the fuzzy inference model,andfinally the action intention of the target is obtained through the fuzzy rule table and historical weighted probability.Ver-ified by simulation experiment,the target intention inferred by this method is roughly the same as the actual behavior of the target,which proves that the meth-od for identifying the target intention is effective. 展开更多
关键词 Intension estimation motion parameters calculation fuzzy inference fuzzy rule table historical weighted probability
下载PDF
Electronic Auction Scheme Based on Smart Contract and IPFS 被引量:1
16
作者 WU Xiaohua LIU Huan +1 位作者 WU Fengheng ZHANG Ke 《计算机工程》 CAS CSCD 北大核心 2023年第2期181-190,共10页
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ... Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results. 展开更多
关键词 sealed bid auction Ethereum smart contract commitment Interplanetary File System(IPFS)
下载PDF
Device-Free Through-the-Wall Activity Recognition Using Bi-Directional Long Short-Term Memory and WiFi Channel State Information
17
作者 Zi-Yuan Gong Xiang Lu +2 位作者 Yu-Xuan Liu Huan-Huan Hou Rui Zhou 《Journal of Electronic Science and Technology》 CAS CSCD 2021年第4期357-368,共12页
Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated dev... Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field. 展开更多
关键词 Activity recognition bi-directional long short-term memory(Bi-LSTM) channel state information(CSI) device-free through-the-wall.
下载PDF
The Controllability of Quantum Correlation under Geometry and Entropy Discords
18
作者 Xiaoyu Li Yiming Huang +2 位作者 Qinsheng Zhu Xusheng Liu Desheng Zheng 《Computers, Materials & Continua》 SCIE EI 2021年第3期3107-3120,共14页
Quantum correlation plays a critical role in the maintenance of quantum information processing and nanometer device design.In the past two decades,several quantitative methods had been proposed to study the quantum co... Quantum correlation plays a critical role in the maintenance of quantum information processing and nanometer device design.In the past two decades,several quantitative methods had been proposed to study the quantum correlation of certain open quantum systems,including the geometry and entropy style discord methods.However,there are differences among these quantification methods,which promote a deep understanding of the quantum correlation.In this paper,a novel time-dependent three environmental open system model is established to study the quantum correlation.This system model interacts with two independent spin-environments(two spin-environments are connected to the other spin-environment)respectively.We have calculated and compared the changing properties of the quantum correlation under three kinds of geometry and two entropy discords,especially for the freezing phenomenon.At the same time,some original and novel changing behaviors of the quantum correlation under different timedependent parameters are studied,which is helpful to achieve the optimal revival of the quantum discord and the similar serrated form of the freezing phenomenon.Finally,it shows the controllability of the freezing correlation and the robustness of these methods by adjusting time-dependent parameters.This work provides a new way to control the quantum correlation and design nanospintronic devices. 展开更多
关键词 Spin environment quantum correlation nanospintronic devices quantum information freezing phenomenon
下载PDF
Teaching Reform of Mathematics Foundations of Information Security with Algorithm as the Core
19
作者 Xuyun Nie Dajiang Cheng +2 位作者 Hu Xiong Yang Zhao Ruijin Wang 《计算机教育》 2020年第12期100-106,共7页
In view of the problems existing in the teaching of Mathematics Foundations of Information Security,such as emphasizing theory but neglecting practice,combined with the concept of engineering education certification a... In view of the problems existing in the teaching of Mathematics Foundations of Information Security,such as emphasizing theory but neglecting practice,combined with the concept of engineering education certification and emerging engineering education teaching reform,this paper combs the knowledge points and learning context of Mathematics Foundations of Information Security,puts forward a new teaching mode of Mathematics Foundations of Information Security with algorithm as the core,and gives the teaching content,organization form and assessment method.Thus,it improves the students’learning interest and practical ability,and improves the achievement of graduation requirements. 展开更多
关键词 ENGINEERING EDUCATION Certification Emerging ENGINEERING EDUCATION CYBERSPACE SECURITY MATHEMATICS FOUNDATIONS of Information SECURITY
下载PDF
How to Integrate Abstract Algebra and Number Theory in the Teaching of Public Key Cryptography Elegantly
20
作者 Hu Xiong Ting Zhong +1 位作者 Guobin Zhu Zhiguang Qin 《计算机教育》 2018年第12期136-137,共2页
Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be ... Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be generated such that only the intended user is able to recover the data using his/her private key associated with public key involved in the encryption process. To really understand the philosophy behind the public key cryptography is not an easy task and sometimes it seems somewhat difficult, if not impossible, for the beginners without the knowledge of the abstract algebra and number theory. In this paper, we introduce briefly the basic definition of public key cryptography as well as the corresponding mathematical hard problems. Besides, we explain why the mathematical backgrounds, especially abstract algebra and number theory, matter in the study of public key cryptography. 展开更多
关键词 PUBLIC KEY CRYPTOGRAPHY number theory ABSTRACT ALGEBRA
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部