期刊文献+
共找到19,215篇文章
< 1 2 250 >
每页显示 20 50 100
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
1
作者 Shereen S.Jumaa Mohsin H.Challoob Amjad J.Humaidi 《Computers, Materials & Continua》 2026年第4期1548-1564,共17页
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military... Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems. 展开更多
关键词 Military image encryption pixel-level scrambling bit-level manipulation block-level shuffling password hashing dynamic encryption key spatial pixel correlation chaotic system
在线阅读 下载PDF
Electroacoustic tomography with dual-frequency array for real-time monitoring of electroporation
2
作者 Luke Xu Yifei Xu Liangzhong Xiang 《Journal of Innovative Optical Health Sciences》 2026年第1期45-55,共11页
Electroacoustic Tomography(EAT)is an imaging technique that detects ultrasound waves induced by electrical pulses,offering a solution for real-time electroporation monitoring.This study presents EAT system using a dua... Electroacoustic Tomography(EAT)is an imaging technique that detects ultrasound waves induced by electrical pulses,offering a solution for real-time electroporation monitoring.This study presents EAT system using a dual-frequency ultrasound array.The broadband nature of electroacoustic signals requires ultrasound detector to cover both the high-frequency range(around 6MHz)signals generated by small targets and the low-frequency range(around 1MHz)signals generated by large targets.In our EAT system,we use the 6 MHz array to detect high-frequency signals from the electrodes,and the 1 MHz array for the electrical field.To test this,we conducted simulations using COMSOL Multiphysics^(®) and MATLAB's k-Wave toolbox,followed by experiments using a custom-built setup with a dual-frequency transducer and real-time data acquisition.The results demonstrated that the dual-frequency EAT system could accurately and simultaneously monitor the electroporation process,effectively showing both the treatment area and electrode placement with the application of 1 kV electric pulses with 100 ns duration.The axial resolution of the 6MHz array for EAT was 0.45 mm,significantly better than the 2mm resolution achieved with the 1MHz array.These findings validate the potential of dual-frequency EAT as a superior method for real-time electroporation monitoring. 展开更多
关键词 DUAL-FREQUENCY electroacoustic imaging real-time ELECTROPORATION
原文传递
A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix
3
作者 Hongyu Zhao Shengsheng Wang 《Computers, Materials & Continua》 2026年第1期636-660,共25页
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ... Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology. 展开更多
关键词 Image encryption spatiotemporal chaotic system chaotic fractal matrix cantor diagonal matrix
在线阅读 下载PDF
Ultrahigh Electromagnetic Interference Shielding and Integrated Thermal Sensing-encryption Enabled by a Honeycomb-inspired Multifunctional Foam
4
作者 Shao-Peng Yu Ya Liu +4 位作者 Ming-Yu Hao Xin Zhang Xu Zhang Yi-Cheng Yuan Zhen-Xiu Zhang 《Chinese Journal of Polymer Science》 2026年第2期513-524,I0016,共13页
With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption ar... With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption are urgently required.This study presents a bio-inspired hierarchical composite foam fabricated using supercritical nitrogen foaming technology.This material exhibits a honeycomb structure,with pore cell sizes controllable within a range of 30–92μm by regulating the filler.The carbon fiber felt(CFf)provides efficient reflection of electromagnetic waves,while the chloroprene rubber/carbon fiber/carbon black foam facilitates both wave absorption and temperature monitoring through its optimized conductive network.This synergistic mechanism results in an EMI shielding effectiveness(SE)of 60.06 d B with excellent temperature sensing performance(The temperature coefficient of resistance(TCR)is-2.642%/℃)in the 24–70℃ range.Notably,the material has a thermal conductivity of up to 0.159 W/(m·K),and the bio-inspired layered design enables information encryption,demonstrating the material's potential for secure communication applications.The foam also has tensile properties of up to 5.13 MPa and a tear strength of 33.02 N/mm.This biomimetic design overcomes the traditional limitations of flexible materials and provides a transformative solution for next-generation applications such as flexible electronics,aerospace systems and military equipment,which urgently need integrated electromagnetic protection,thermal management and information security. 展开更多
关键词 FLEXIBILITY Cellular structures Electromagnetic interference shielding Temperature sensor Message encryption
原文传递
A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides
5
作者 Bassam Al-Shargabi Mohammed Abbas Fadhil Al-Husainy +1 位作者 Abdelrahman Abuarqoub Omar Albahbouh Aldabbas 《Computers, Materials & Continua》 2026年第4期391-415,共25页
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently... The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks. 展开更多
关键词 Security analysis image protection randomness in cryptography DNA nucleotides DNA-based encryption
在线阅读 下载PDF
Block-Wise Sliding Recursive Wavelet Transform and Its Application in Real-Time Vehicle-Induced Signal Separation
6
作者 Jie Li Nan An Youliang Ding 《Structural Durability & Health Monitoring》 2026年第1期1-22,共22页
Vehicle-induced response separation is a crucial issue in structural health monitoring(SHM).This paper proposes a block-wise sliding recursive wavelet transform algorithm to meet the real-time processing requirements ... Vehicle-induced response separation is a crucial issue in structural health monitoring(SHM).This paper proposes a block-wise sliding recursive wavelet transform algorithm to meet the real-time processing requirements of monitoring data.To extend the separation target from a fixed dataset to a continuously updating data stream,a block-wise sliding framework is first developed.This framework is further optimized considering the characteristics of real-time data streams,and its advantage in computational efficiency is theoretically demonstrated.During the decomposition and reconstruction processes,information from neighboring data blocks is fully utilized to reduce algorithmic complexity.In addition,a delay-setting strategy is introduced for each processing window to mitigate boundary effects,thereby balancing accuracy and efficiency.Simulated signal experiments are conducted to determine the optimal delay configuration and to verify the algorithm’s superior performance,achieving a lower Root Mean Square Error(RMSE)and only 0.0249 times the average computational time compared with the original algorithm.Furthermore,strain signals from the Lieshi River Bridge are employed to validate the method.The proposed algorithm successfully separates the static trend from vehicle-induced responses in real time across different sampling frequencies,demonstrating its effectiveness and applicability in real-time bridge monitoring. 展开更多
关键词 Wavelet transform vehicle-induced signal separation real-time structure monitoring
在线阅读 下载PDF
Framework for Secure Substitution Box Construction and Its Application in Image Encryption
7
作者 Umar Hayat Ikram Ullah Muhammad Bilal 《Computers, Materials & Continua》 2026年第4期1428-1462,共35页
Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystem... Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks. 展开更多
关键词 Substitution box Mordell elliptic curve Mobius transformation NONLINEARITY image encryption CRYPTANALYSIS data security
在线阅读 下载PDF
Energy relief effect of real-time drilling to prevent rockburst in high-stress rock
8
作者 Zhichao He Fengqiang Gong +2 位作者 Li Ren Weimin Yang Xuezhen Wu 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第2期1460-1475,共16页
To investigate the energy relief effect of real-time drilling in preventing rockburst in high-stress rock,a series of high-stress real-time drilling uniaxial compression tests were conducted on red sandstone specimens... To investigate the energy relief effect of real-time drilling in preventing rockburst in high-stress rock,a series of high-stress real-time drilling uniaxial compression tests were conducted on red sandstone specimens using the SG4500 drilling rig.Results showed that the mechanical behavior(i.e.peak strength and rockburst intensity)of the rock was weakened under high-stress real-time drilling and exhibited a downward trend as the drilling diameter increased.The real-time drilling energy dissipation index(ERD)was proposed to characterize the energy relief during high-stress real-time drilling.The ERD exhibited a linear increase with the real-time drilling diameter.Furthermore,the elastic strain energy of post-drilling rock showed a linear relationship with the square of stress across different stress levels,which also applied to the peak elastic strain energy and the square of peak stress.This findingreveals the intrinsic link between the weakening effect of peak elastic strain energy and peak strength due to high-stress real-time drilling,confirmingthe consistency between energy relief and pressure relief effects.By establishing relationships among rockburst proneness,peak elastic strain energy,and peak strength,it was demonstrated that high-stress real-time drilling reduces rockburst proneness through energy dissipation.Specifically,both peak elastic strain energy and rockburst proneness decreased with larger drill bit diameters,consistent with reductions in peak strength,rockburst intensity,and fractal dimensions of high-stress real-time drilled rock.These results validate the energy relief mechanism of real-time drilling in mitigating rockburst risks. 展开更多
关键词 Rock mechanics ROCKBURST real-time drilling Drilling energy relief Energy storage capacity Rockburst proneness
在线阅读 下载PDF
Experimental study on real-time monitoring of surrounding rock 3D wave velocity structure and failure zone in deep tunnels
9
作者 Hongyun Yang Chuandong Jiang +4 位作者 Yong Li Zhi Lin Xiang Wang Yifei Wu Wanlin Feng 《International Journal of Mining Science and Technology》 2026年第2期423-437,共15页
An innovative real-time monitoring method for surrounding rock damage based on microseismic time-lapse double-difference tomography is proposed for delayed dynamic damage identification and insufficient detection of a... An innovative real-time monitoring method for surrounding rock damage based on microseismic time-lapse double-difference tomography is proposed for delayed dynamic damage identification and insufficient detection of adverse geological conditions in deep-buried tunnel construction.The installation techniques for microseismic sensors were optimized by mounting sensors at bolt ends which significantly improves signal-to-noise ratio(SNR)and anti-interference capability compared to conventional borehole placement.Subsequently,a 3D wave velocity evolution model that incorporates construction-induced disturbances was established,enabling the first visualization of spatiotemporal variations in surrounding rock wave velocity.It finds significant wave velocity reduction near the tunnel face,with roof and floor damage zones extending 40–50 m;wave velocities approaching undisturbed levels at 15 m ahead of the working face and on the laterally undisturbed side;pronounced spatial asymmetry in wave velocity distribution—values on the left side exceed those on the right,with a clear stress concentration or transition zone located 10–15 m;and systematically lower velocities behind the face than in front,indicating asymmetric rock damage development.These results provide essential theoretical support and practical guidance for optimizing dynamic construction strategies,enabling real-time adjustment of support parameters,and establishing safety early warning systems in deep-buried tunnel engineering. 展开更多
关键词 Deep-buried tunnel Microseismic monitoring Wave velocity tomography Surrounding rock damage zone real-time monitoring
在线阅读 下载PDF
A Hybrid Deep Learning Approach for Real-Time Cheating Behaviour Detection in Online Exams Using Video Captured Analysis
10
作者 Dao Phuc Minh Huy Gia Nhu Nguyen Dac-Nhuong Le 《Computers, Materials & Continua》 2026年第3期1179-1198,共20页
Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning appr... Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints. 展开更多
关键词 Online exam proctoring cheating behavior detection deep learning real-time monitoring object detection human behavior recognition
在线阅读 下载PDF
Real-time decision support for bolter recovery safety:Long short-term memory network-driven aircraft sequencing
11
作者 Wei Han Changjiu Li +4 位作者 Xichao Su Yong Zhang Fang Guo Tongtong Yu Xuan Li 《Defence Technology(防务技术)》 2026年第2期184-205,共22页
The highly dynamic nature,strong uncertainty,and coupled multiple safety constraints inherent in carrier aircraft recovery operations pose severe challenges for real-time decision-making.Addressing bolter scenarios,th... The highly dynamic nature,strong uncertainty,and coupled multiple safety constraints inherent in carrier aircraft recovery operations pose severe challenges for real-time decision-making.Addressing bolter scenarios,this study proposes an intelligent decision-making framework based on a deep long short-term memory Q-network.This framework transforms the real-time sequencing for bolter recovery problem into a partially observable Markov decision process.It employs a stacked long shortterm memory network to accurately capture the long-range temporal dependencies of bolter event chains and fuel consumption.Furthermore,it integrates a prioritized experience replay training mechanism to construct a safe and adaptive scheduling system capable of millisecond-level real-time decision-making.Experimental demonstrates that,within large-scale mass recovery scenarios,the framework achieves zero safety violations in static environments and maintains a fuel safety violation rate below 10%in dynamic scenarios,with single-step decision times at the millisecond level.The model exhibits strong generalization capability,effectively responding to unforeseen emergent situations—such as multiple bolters and fuel emergencies—without requiring retraining.This provides robust support for efficient carrier-based aircraft recovery operations. 展开更多
关键词 Carrier-based aircraft Recovery scheduling Deep reinforcement learning Long short-term memory networks Dynamic real-time decision-making
在线阅读 下载PDF
Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection
12
作者 Zhipeng Qin Hanbing Yan +2 位作者 Biyang Zhang Peng Wang Yitao Li 《Computers, Materials & Continua》 2025年第6期5811-5829,共19页
With the widespread adoption of encrypted Domain Name System(DNS)technologies such as DNS over Hyper Text Transfer Protocol Secure(HTTPS),traditional port and protocol-based traffic analysis methods have become ineffe... With the widespread adoption of encrypted Domain Name System(DNS)technologies such as DNS over Hyper Text Transfer Protocol Secure(HTTPS),traditional port and protocol-based traffic analysis methods have become ineffective.Although encrypted DNS enhances user privacy protection,it also provides concealed communication channels for malicious software,compelling detection technologies to shift towards statistical featurebased and machine learning approaches.However,these methods still face challenges in real-time performance and privacy protection.This paper proposes a real-time identification technology for encrypted DNS traffic with privacy protection.Firstly,a hierarchical architecture of cloud-edge-end collaboration is designed,incorporating task offloading strategies to balance privacy protection and identification efficiency.Secondly,a privacy-preserving federated learning mechanismbased on Federated Robust Aggregation(FedRA)is proposed,utilizingMedoid aggregation and differential privacy techniques to ensure data privacy and enhance identification accuracy.Finally,an edge offloading strategy based on a dynamic priority scheduling algorithm(DPSA)is designed to alleviate terminal burden and reduce latency.Simulation results demonstrate that the proposed technology significantly improves the accuracy and realtime performance of encrypted DNS traffic identification while protecting privacy,making it suitable for various network environments. 展开更多
关键词 encrypted DNS edge computing federated learning real-time detection privacy protection
在线阅读 下载PDF
IoT Services:Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption 被引量:2
13
作者 Chungen Xu Lin Mei +2 位作者 Jinxue Cheng Yu Zhao Cong Zuo 《Journal of Cyber Security》 2021年第1期55-67,共13页
With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large ... With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields,including the medical,agricultural,and industrial areas.Uploading data to the cloud solves the problem of data overhead but results in privacy issues.Therefore,the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue.In this paper,we propose a scheme that supports real-time authentication with conjunctive keyword detection(RA-CKD),this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens.Through authentication technology,connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection.Finally,we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction.The experiment shows that the efficiency of RA-CKD is good enough to be practical. 展开更多
关键词 Searchable encryption conjunctive keyword search Internet of Things AUTHENTICATION
暂未订购
奶牛乳房炎病原体三重Real-time PCR检测方法的建立及应用
14
作者 郭思宇 高雅欣 +5 位作者 纪佳豪 李梓豪 刘文扬 徐博 王三毛 李睿文 《动物医学进展》 北大核心 2025年第12期39-44,共6页
为了建立同时检测奶牛临床型乳房炎中肺炎克雷伯菌(Kp)、产色葡萄球菌(Sc)和牛支原体(Mb),基于Kp ZKIR基因、Sc sodA基因和Mb opp D/F基因设计特异性引物,建立三重实时定量荧光PCR方法(real-time PCR)。试验采用在单一real-time PCR检... 为了建立同时检测奶牛临床型乳房炎中肺炎克雷伯菌(Kp)、产色葡萄球菌(Sc)和牛支原体(Mb),基于Kp ZKIR基因、Sc sodA基因和Mb opp D/F基因设计特异性引物,建立三重实时定量荧光PCR方法(real-time PCR)。试验采用在单一real-time PCR检测方法的基础上对三重real-time PCR检测方法进行优化,并确定退火条件为60℃,肺炎克雷伯菌、产色葡萄球菌以及牛支原体上、下游引物浓度为20μmol/L、荧光探针浓度为10μmol/L。结果表明,该方法对标准品pUC57-ZKIR-Kp、pUC57-sodA-Sc、pUC57-opp D/F-Mb最低检测限分别为1.55×10^(2) copies/μL、1.44×10^(2) copies/μL、1.34×10^(2) copies/μL,灵敏度高;仅对Kp、Sc、Mb这3种病原产生荧光曲线,对其他病原无交叉反应,特异性强;其中组内、组间变异系数均小于2%,重复性良好。利用建立的多重real-time PCR对233份临床样品进行检测,Kp、Sc、Mb检出率分别为73.09%、21.97%、6.72%,与单一real-time PCR方法检测结果一致。说明建立的多重real-time PCR在实际应用中具有灵敏度高、特异性强、重复性良好、检测速度快等优点,可为奶牛临床型乳房炎病原的快速检测、临床诊断和流行病学调查提供有效检测手段。 展开更多
关键词 临床型乳房炎 三重real-time PCR 肺炎克雷伯菌 产色葡萄球菌 牛支原体
在线阅读 下载PDF
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
15
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion S-box substitution
原文传递
Real-time monitoring of disc cutter wear in tunnel boring machines:A sound and vibration sensor-based approach with machine learning technique 被引量:1
16
作者 Mohammad Amir Akhlaghi Raheb Bagherpour Seyed Hadi Hoseinie 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第3期1700-1722,共23页
Large portions of the tunnel boring machine(TBM)construction cost are attributed to disc cutter consumption,and assessing the disc cutter's wear level can help determine the optimal time to replace the disc cutter... Large portions of the tunnel boring machine(TBM)construction cost are attributed to disc cutter consumption,and assessing the disc cutter's wear level can help determine the optimal time to replace the disc cutter.Therefore,the need to monitor disc cutter wear in real-time has emerged as a technical challenge for TBMs.In this study,real-time disc cutter wear monitoring is developed based on sound and vibration sensors.For this purpose,the microphone and accelerometer were used to record the sound and vibration signals of cutting three different types of rocks with varying abrasions on a laboratory scale.The relationship between disc cutter wear and the sound and vibration signal was determined by comparing the measurements of disc cutter wear with the signal plots for each sample.The features extracted from the signals showed that the sound and vibration signals are impacted by the progression of disc wear during the rock-cutting process.The signal features obtained from the rock-cutting operation were utilized to verify the machine learning techniques.The results showed that the multilayer perceptron(MLP),random subspace-based decision tree(RS-DT),DT,and random forest(RF)methods could predict the wear level of the disc cutter with an accuracy of 0.89,0.951,0.951,and 0.927,respectively.Based on the accuracy of the models and the confusion matrix,it was found that the RS-DT model has the best estimate for predicting the level of disc wear.This research has developed a method that can potentially determine when to replace a tool and assess disc wear in real-time. 展开更多
关键词 TBM disc cutter WEAR SOUND VIBRATION Machine learning real-time wear estimation
在线阅读 下载PDF
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
17
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
IoT-Based Real-Time Medical-Related Human Activity Recognition Using Skeletons and Multi-Stage Deep Learning for Healthcare 被引量:1
18
作者 Subrata Kumer Paul Abu Saleh Musa Miah +3 位作者 Rakhi Rani Paul Md.EkramulHamid Jungpil Shin Md Abdur Rahim 《Computers, Materials & Continua》 2025年第8期2513-2530,共18页
The Internet of Things(IoT)and mobile technology have significantly transformed healthcare by enabling real-time monitoring and diagnosis of patients.Recognizing Medical-Related Human Activities(MRHA)is pivotal for he... The Internet of Things(IoT)and mobile technology have significantly transformed healthcare by enabling real-time monitoring and diagnosis of patients.Recognizing Medical-Related Human Activities(MRHA)is pivotal for healthcare systems,particularly for identifying actions critical to patient well-being.However,challenges such as high computational demands,low accuracy,and limited adaptability persist in Human Motion Recognition(HMR).While some studies have integrated HMR with IoT for real-time healthcare applications,limited research has focused on recognizing MRHA as essential for effective patient monitoring.This study proposes a novel HMR method tailored for MRHA detection,leveraging multi-stage deep learning techniques integrated with IoT.The approach employs EfficientNet to extract optimized spatial features from skeleton frame sequences using seven Mobile Inverted Bottleneck Convolutions(MBConv)blocks,followed by Convolutional Long Short Term Memory(ConvLSTM)to capture spatio-temporal patterns.A classification module with global average pooling,a fully connected layer,and a dropout layer generates the final predictions.The model is evaluated on the NTU RGB+D 120 and HMDB51 datasets,focusing on MRHA such as sneezing,falling,walking,sitting,etc.It achieves 94.85%accuracy for cross-subject evaluations and 96.45%for cross-view evaluations on NTU RGB+D 120,along with 89.22%accuracy on HMDB51.Additionally,the system integrates IoT capabilities using a Raspberry Pi and GSM module,delivering real-time alerts via Twilios SMS service to caregivers and patients.This scalable and efficient solution bridges the gap between HMR and IoT,advancing patient monitoring,improving healthcare outcomes,and reducing costs. 展开更多
关键词 real-time human motion recognition(HMR) ENConvLSTM EfficientNet ConvLSTM skeleton data NTU RGB+D 120 dataset MRHA
在线阅读 下载PDF
Real-Time Communication Driver for MPU Accelerometer Using Predictable Non-Blocking I2C Communication
19
作者 Valentin Stangaciu Mihai-Vladimir Ghimpau Adrian-Gabriel Sztanarec 《Computers, Materials & Continua》 2025年第11期3213-3229,共17页
Along with process control,perception represents the main function performed by the Edge Layer of an Internet of Things(IoT)network.Many of these networks implement various applications where the response time does no... Along with process control,perception represents the main function performed by the Edge Layer of an Internet of Things(IoT)network.Many of these networks implement various applications where the response time does not represent an important parameter.However,in critical applications,this parameter represents a crucial aspect.One important sensing device used in IoT designs is the accelerometer.In most applications,the response time of the embedded driver software handling this device is generally not analysed and not taken into account.In this paper,we present the design and implementation of a predictable real-time driver stack for a popular accelerometer and gyroscope device family.We provide clear justifications for why this response time is extremely important for critical applications in the acquisition process of such data.We present extensive measurements and experimental results that demonstrate the predictability of our solution,making it suitable for critical real-time systems. 展开更多
关键词 real-time accelerometer real-time sensing Internet of Things real-time wireless sensor networks predictable time-bounded accelerometer real-time systems
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
20
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部