期刊文献+
共找到356,230篇文章
< 1 2 250 >
每页显示 20 50 100
Study of ADS-B Data Evaluation 被引量:27
1
作者 ZHANG Jun LIU Wei ZHU Yanbo 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2011年第4期461-466,共6页
In western China, the terrain and meteorological conditions are so complex that it is not suitable to construct new radar stations. Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance me... In western China, the terrain and meteorological conditions are so complex that it is not suitable to construct new radar stations. Automatic dependent surveillance-broadcast (ADS-B) is a totally new surveillance method, so before practically applied and operated in China, abundant tests and evaluations are necessary to validate the performance of ADS-B and guarantee the operational security. During the flight tests, we collect the data of radar, ADS-B and high accuracy position and compare the performance of ADS-B with radar based on high accuracy position. To solve the asynchronous problem among radar data, ADS-B data and real-time kinematic (RTK) data caused by different update rates, this artic.le proposes the technique of synchronizing multi-surveil- lance data by extrapolating from the data of low update rate to high update rate according to velocity and heading. Meanwhile, because radar data, ADS-B data and RTK data are expressed in different coordinates and cannot be compared each other, this article provides a method to unifying the coordinates of multi-surveillance data. By the analysis and evaluation, we can conclude that the performance of ADS-B is better than radar. 展开更多
关键词 civil aviation SURVEILLANCE ads-b ACCURACY INTEGRITY flight inspection data evaluation
原文传递
ADS-B Data Authentication Based on ECC and X.509 Certificate 被引量:6
2
作者 Wei-Jun Pan,Zi-Liang Feng,and Yang Wang the College of ComputerScience,Sichuan University,Chengdu 610065,Chinah the College of Aviation Management,the Civil Aviation Flight University of China,Guanghan 618307,China. 《Journal of Electronic Science and Technology》 CAS 2012年第1期51-55,共5页
An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system d... An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode. 展开更多
关键词 Automatic dependent surveillance-broadcast data authentication elliptic curve cipher X.509.
在线阅读 下载PDF
民航ADS-B数据多质量指标与多特征联合处理的GNSS干扰检测方法
3
作者 陈敏 朱彤晖 +2 位作者 何炜琨 鲁建波 周洪 《交通运输工程学报》 北大核心 2025年第3期317-329,共13页
为解决导航卫星信号微弱,极易受到各种有意或无意的干扰,造成航空安全隐患、航班延误和运行效率下降的问题,利用全球导航卫星系统(GNSS)射频干扰导致的飞机航迹异常以及广播式自动相关监视(ADS-B)数据中导航质量指标的变化特性,在兼容DO... 为解决导航卫星信号微弱,极易受到各种有意或无意的干扰,造成航空安全隐患、航班延误和运行效率下降的问题,利用全球导航卫星系统(GNSS)射频干扰导致的飞机航迹异常以及广播式自动相关监视(ADS-B)数据中导航质量指标的变化特性,在兼容DO-260、DO-260A/B不同质量指标的情况下,给出了一种基于ADS-B数据多质量指标多特征联合处理的GNSS干扰检测方法;在GNSS干扰环境下提取ADS-B数据变化特征,通过检测导航质量指标的波动持续时间特征、质量指标变化同时航迹断裂特征以及多种质量指标同时下降特征等异常行为筛选出潜在干扰航班;对潜在航班进行干扰特征点提取,考虑到干扰航班在空间上具有聚集性,再利用MeanShift聚类方法实现了干扰航班的检测。试验结果表明:所提多质量指标多特征联合处理的GNSS干扰检测方法与单质量指标干扰检测方法相比精确率提高21.3%,能有效降低误检率,与熵权法相比查全率提高7%,在保证误检率不增加的前提下能有效降低漏检率,同时所提方法无需大量数据进行预训练,检测所需时间相比机器学习方法降低了98.4%,具有较好的实时性和工程应用价值,可为民用航空无线电干扰检测中的受干扰航班、受干扰时间和位置的确定提供解决方案。 展开更多
关键词 空中交通 ads-b GNSS干扰 质量指标 航迹断裂 多特征联合处理
原文传递
面向LBS的ADS-B报文定位数据本地化差分隐私保护方法 被引量:1
4
作者 杨宏宇 张恒鸣 +2 位作者 朱友文 胡慧玲 胡俊成 《网络与信息安全学报》 2025年第4期32-49,共18页
由于广播式自动相关监视(automatic dependent surveillance-broadcast,ADS-B)报文格式完全公开且重要数据缺乏加密措施,因此敏感定位数据面临泄露的风险。为解决不可信第三方基于位置服务(untrusted third-party location based servic... 由于广播式自动相关监视(automatic dependent surveillance-broadcast,ADS-B)报文格式完全公开且重要数据缺乏加密措施,因此敏感定位数据面临泄露的风险。为解决不可信第三方基于位置服务(untrusted third-party location based service,UT-LBS)在收集和发布ADS-B报文定位数据时造成的隐私泄露问题,提出一种阶段式等差随机响应(phased equal-step randomized response,PERR)隐私保护方法。首先,对三维定位数据进行降维处理,通过二进制交叉编码生成一维八进制定位信息编码。其次,使用阶段式等差随机响应方法对一维定位信息编码进行扰动,通过所提出的等差扰动的思想对随机响应空间进行阶梯式分组。然后,将随机响应分成基于等差隐私的随机响应和基于等差概率的自适应随机响应空间划分两个阶段,提高随机响应过程中数据的隐私性。最后,通过所提出的基于阶段式概率加权的卡尔曼滤波器估算方法,对随机响应后的隐私数据进行频率估算,并分析证明该方法的隐私性和可行性。实验结果表明,所提方法在实现ADS-B敏感定位数据隐私保护的同时,有效减小隐私保护后数据的频数统计与原始数据的频数统计之间的误差,保证了数据的有效性。 展开更多
关键词 本地化差分隐私 隐私保护 随机响应 ads-b报文定位数据 基于位置服务
在线阅读 下载PDF
基于卡尔曼滤波的ADS-B虚假目标识别系统设计
5
作者 周苏宁 王韬 班恬 《电子测量技术》 北大核心 2025年第2期66-74,共9页
为了应对虚假的广播式自动监视(ADS-B)信号对航迹信息带来的干扰,基于卡尔曼滤波对于飞行航迹的预测设计了一种对于ADS-B虚假目标的检测系统。报文解码基于软件无线电平台的ADS-B解调系统,在Qt端完成了解码校验部分并嵌入高德地图动态... 为了应对虚假的广播式自动监视(ADS-B)信号对航迹信息带来的干扰,基于卡尔曼滤波对于飞行航迹的预测设计了一种对于ADS-B虚假目标的检测系统。报文解码基于软件无线电平台的ADS-B解调系统,在Qt端完成了解码校验部分并嵌入高德地图动态显示。制作了ADS-B虚假报文发射系统,并基于卡尔曼滤波完成了航迹预测部分。基于ADS-B预测数据的位置离散度,均方根误差设计了跳点率检测部分。根据实验测试,对于给出的虚假报文,成功检测到90.4%的跳点。据此,该系统具有一定的ADS-B虚假目标检测能力。 展开更多
关键词 ads-b 航迹信息 卡尔曼滤波 假目标识别
原文传递
IoT Empowered Early Warning of Transmission Line Galloping Based on Integrated Optical Fiber Sensing and Weather Forecast Time Series Data 被引量:1
6
作者 Zhe Li Yun Liang +1 位作者 Jinyu Wang Yang Gao 《Computers, Materials & Continua》 SCIE EI 2025年第1期1171-1192,共22页
Iced transmission line galloping poses a significant threat to the safety and reliability of power systems,leading directly to line tripping,disconnections,and power outages.Existing early warning methods of iced tran... Iced transmission line galloping poses a significant threat to the safety and reliability of power systems,leading directly to line tripping,disconnections,and power outages.Existing early warning methods of iced transmission line galloping suffer from issues such as reliance on a single data source,neglect of irregular time series,and lack of attention-based closed-loop feedback,resulting in high rates of missed and false alarms.To address these challenges,we propose an Internet of Things(IoT)empowered early warning method of transmission line galloping that integrates time series data from optical fiber sensing and weather forecast.Initially,the method applies a primary adaptive weighted fusion to the IoT empowered optical fiber real-time sensing data and weather forecast data,followed by a secondary fusion based on a Back Propagation(BP)neural network,and uses the K-medoids algorithm for clustering the fused data.Furthermore,an adaptive irregular time series perception adjustment module is introduced into the traditional Gated Recurrent Unit(GRU)network,and closed-loop feedback based on attentionmechanism is employed to update network parameters through gradient feedback of the loss function,enabling closed-loop training and time series data prediction of the GRU network model.Subsequently,considering various types of prediction data and the duration of icing,an iced transmission line galloping risk coefficient is established,and warnings are categorized based on this coefficient.Finally,using an IoT-driven realistic dataset of iced transmission line galloping,the effectiveness of the proposed method is validated through multi-dimensional simulation scenarios. 展开更多
关键词 Optical fiber sensing multi-source data fusion early warning of galloping time series data IOT adaptive weighted learning irregular time series perception closed-loop attention mechanism
在线阅读 下载PDF
Diversity,Complexity,and Challenges of Viral Infectious Disease Data in the Big Data Era:A Comprehensive Review 被引量:1
7
作者 Yun Ma Lu-Yao Qin +1 位作者 Xiao Ding Ai-Ping Wu 《Chinese Medical Sciences Journal》 2025年第1期29-44,I0005,共17页
Viral infectious diseases,characterized by their intricate nature and wide-ranging diversity,pose substantial challenges in the domain of data management.The vast volume of data generated by these diseases,spanning fr... Viral infectious diseases,characterized by their intricate nature and wide-ranging diversity,pose substantial challenges in the domain of data management.The vast volume of data generated by these diseases,spanning from the molecular mechanisms within cells to large-scale epidemiological patterns,has surpassed the capabilities of traditional analytical methods.In the era of artificial intelligence(AI)and big data,there is an urgent necessity for the optimization of these analytical methods to more effectively handle and utilize the information.Despite the rapid accumulation of data associated with viral infections,the lack of a comprehensive framework for integrating,selecting,and analyzing these datasets has left numerous researchers uncertain about which data to select,how to access it,and how to utilize it most effectively in their research.This review endeavors to fill these gaps by exploring the multifaceted nature of viral infectious diseases and summarizing relevant data across multiple levels,from the molecular details of pathogens to broad epidemiological trends.The scope extends from the micro-scale to the macro-scale,encompassing pathogens,hosts,and vectors.In addition to data summarization,this review thoroughly investigates various dataset sources.It also traces the historical evolution of data collection in the field of viral infectious diseases,highlighting the progress achieved over time.Simultaneously,it evaluates the current limitations that impede data utilization.Furthermore,we propose strategies to surmount these challenges,focusing on the development and application of advanced computational techniques,AI-driven models,and enhanced data integration practices.By providing a comprehensive synthesis of existing knowledge,this review is designed to guide future research and contribute to more informed approaches in the surveillance,prevention,and control of viral infectious diseases,particularly within the context of the expanding big-data landscape. 展开更多
关键词 viral infectious diseases big data data diversity and complexity data standardization artificial intelligence data analysis
暂未订购
Three-dimension collision-free trajectory planning of UAVs based on ADS-B information in low-altitude urban airspace 被引量:2
8
作者 Chao DONG Yifan ZHANG +3 位作者 Ziye JIA Yiyang LIAO Lei ZHANG Qihui WU 《Chinese Journal of Aeronautics》 2025年第2期274-285,共12页
The environment of low-altitude urban airspace is complex and variable due to numerous obstacles,non-cooperative aircraft,and birds.Unmanned Aerial Vehicles(UAVs)leveraging environmental information to achieve three-d... The environment of low-altitude urban airspace is complex and variable due to numerous obstacles,non-cooperative aircraft,and birds.Unmanned Aerial Vehicles(UAVs)leveraging environmental information to achieve three-dimension collision-free trajectory planning is the prerequisite to ensure airspace security.However,the timely information of surrounding situation is difficult to acquire by UAVs,which further brings security risks.As a mature technology leveraged in traditional civil aviation,the Automatic Dependent Surveillance-Broadcast(ADS-B)realizes continuous surveillance of the information of aircraft.Consequently,we leverage ADS-B for surveillance and information broadcasting,and divide the aerial airspace into multiple sub-airspaces to improve flight safety in UAV trajectory planning.In detail,we propose the secure Sub-airSpaces Planning(SSP)algorithm and Particle Swarm Optimization Rapidly-exploring Random Trees(PSO-RRT)algorithm for the UAV trajectory planning in law-altitude airspace.The performance of the proposed algorithm is verified by simulations and the results show that SSP reduces both the maximum number of UAVs in the sub-airspace and the length of the trajectory,and PSO-RRT reduces the cost of UAV trajectory in the sub-airspace. 展开更多
关键词 Three-dimension trajectory planning of UAV Collision avoidance Sliding window ads-b Low-altitude urban airspace
原文传递
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:1
9
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital Communications and Networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 data science Internet of things(IoT) Big data Communication systems Networks Security data science analytics
在线阅读 下载PDF
A Newly Established Air Pollution Data Center in China 被引量:1
10
作者 Mei ZHENG Tianle ZHANG +11 位作者 Yaxin XIANG Xiao TANG Yinan WANG Guannan GENG Yuying WANG Yingjun LIU Chunxiang YE Caiqing YAN Yingjun CHEN Jiang ZHU Qiang ZHANG Tong ZHU 《Advances in Atmospheric Sciences》 2025年第4期597-604,共8页
Air pollution in China covers a large area with complex sources and formation mechanisms,making it a unique place to conduct air pollution and atmospheric chemistry research.The National Natural Science Foundation of ... Air pollution in China covers a large area with complex sources and formation mechanisms,making it a unique place to conduct air pollution and atmospheric chemistry research.The National Natural Science Foundation of China’s Major Research Plan entitled“Fundamental Researches on the Formation and Response Mechanism of the Air Pollution Complex in China”(or the Plan)has funded 76 research projects to explore the causes of air pollution in China,and the key processes of air pollution in atmospheric physics and atmospheric chemistry.In order to summarize the abundant data from the Plan and exhibit the long-term impacts domestically and internationally,an integration project is responsible for collecting the various types of data generated by the 76 projects of the Plan.This project has classified and integrated these data,forming eight categories containing 258 datasets and 15 technical reports in total.The integration project has led to the successful establishment of the China Air Pollution Data Center(CAPDC)platform,providing storage,retrieval,and download services for the eight categories.This platform has distinct features including data visualization,related project information querying,and bilingual services in both English and Chinese,which allows for rapid searching and downloading of data and provides a solid foundation of data and support for future related research.Air pollution control in China,especially in the past decade,is undeniably a global exemplar,and this data center is the first in China to focus on research into the country’s air pollution complex. 展开更多
关键词 air pollution data center PLATFORM multi-source data China
在线阅读 下载PDF
ADS-B信号相干解调算法研究
11
作者 孙欣伟 王建新 《电子设计工程》 2025年第5期192-196,共5页
广播式自动相关监视(Automatic-Dependent-Surveillance-Broadcast,ADS-B)技术是目前国际民航组织ICAO推荐的新型空域监管技术。针对星载环境下的低信噪比场景,为了进一步提高ADS-B信号解调算法的成功率,提出了一种ADS-B信号相干解调算... 广播式自动相关监视(Automatic-Dependent-Surveillance-Broadcast,ADS-B)技术是目前国际民航组织ICAO推荐的新型空域监管技术。针对星载环境下的低信噪比场景,为了进一步提高ADS-B信号解调算法的成功率,提出了一种ADS-B信号相干解调算法。该算法依靠频域恒虚警方法进行信号到来检测,通过基于FFT算法的频偏、相偏估计算法消除频偏和相偏的影响,并使用互相关取最大值的方式进行帧头定位。计算机仿真表明,该算法在Eb/N0=10 dB时解调成功率达到90%,达到了贴近理论值的高解调性能。 展开更多
关键词 ads-b 相干解调 恒虚警检测 互相关
在线阅读 下载PDF
基于区块链的ADS-B数据完整性验证机制
12
作者 孙薇 《数字技术与应用》 2025年第10期181-183,共3页
作为现代航空通信重要组成部分的ADS-B系统,在实际应用中存在数据易被篡改与伪造的安全隐患,本文将基于此展开研究。首先,研究了基于区块链的ADS-B数据完整性验证机制,设计出数据采集、区块链网络和验证反馈三层系统架构;其次,分析了不... 作为现代航空通信重要组成部分的ADS-B系统,在实际应用中存在数据易被篡改与伪造的安全隐患,本文将基于此展开研究。首先,研究了基于区块链的ADS-B数据完整性验证机制,设计出数据采集、区块链网络和验证反馈三层系统架构;其次,分析了不同攻击场景下数据完整性风险特征,进而提出结合许可链和智能合约的优化策略,实现数据实时验证与不可篡改存证能力的提升;最后,完成了ADS-B数据链上验证机制的具体实现。其测试结果显示,所提机制在验证延迟与系统吞吐量方面表现优异,具备实际应用价值。该结果对于提升航空通信数据安全性、丰富区块链技术在关键基础设施保护领域的应用具有重要的理论意义和工程价值。 展开更多
关键词 区块链网络 完整性验证 ads-b数据
在线阅读 下载PDF
Challenges to and Countermeasures for the Value Realization of Healthcare Data Elements in China 被引量:1
13
作者 Tianan Yang Wenhao Deng +3 位作者 Ran Liu Tianyu Wang Yuanyuan Dai Jianwei Deng 《Health Care Science》 2025年第3期225-228,共4页
As a new type of production factor in healthcare,healthcare data elements have been rapidly integrated into various health production processes,such as clinical assistance,health management,biological testing,and oper... As a new type of production factor in healthcare,healthcare data elements have been rapidly integrated into various health production processes,such as clinical assistance,health management,biological testing,and operation and supervision[1,2].Healthcare data elements include biolog.ical and clinical data that are related to disease,environ-mental health data that are associated with life,and operational and healthcare management data that are related to healthcare activities(Figure 1).Activities such as the construction of a data value assessment system,the devel-opment of a data circulation and sharing platform,and the authorization of data compliance and operation products support the strong growth momentum of the market for health care data elements in China[3]. 展开更多
关键词 China healthcare data elements healthcare data management value realization
暂未订购
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
14
作者 Congcong Wang Chen Wang +1 位作者 Wenying Zheng Wei Gu 《Computers, Materials & Continua》 SCIE EI 2025年第1期799-816,共18页
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use... As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis. 展开更多
关键词 Smart grid data security privacy protection artificial intelligence data aggregation
在线阅读 下载PDF
Influence of different data selection criteria on internal geomagnetic field modeling 被引量:4
15
作者 HongBo Yao JuYuan Xu +3 位作者 Yi Jiang Qing Yan Liang Yin PengFei Liu 《Earth and Planetary Physics》 2025年第3期541-549,共9页
Earth’s internal core and crustal magnetic fields,as measured by geomagnetic satellites like MSS-1(Macao Science Satellite-1)and Swarm,are vital for understanding core dynamics and tectonic evolution.To model these i... Earth’s internal core and crustal magnetic fields,as measured by geomagnetic satellites like MSS-1(Macao Science Satellite-1)and Swarm,are vital for understanding core dynamics and tectonic evolution.To model these internal magnetic fields accurately,data selection based on specific criteria is often employed to minimize the influence of rapidly changing current systems in the ionosphere and magnetosphere.However,the quantitative impact of various data selection criteria on internal geomagnetic field modeling is not well understood.This study aims to address this issue and provide a reference for constructing and applying geomagnetic field models.First,we collect the latest MSS-1 and Swarm satellite magnetic data and summarize widely used data selection criteria in geomagnetic field modeling.Second,we briefly describe the method to co-estimate the core,crustal,and large-scale magnetospheric fields using satellite magnetic data.Finally,we conduct a series of field modeling experiments with different data selection criteria to quantitatively estimate their influence.Our numerical experiments confirm that without selecting data from dark regions and geomagnetically quiet times,the resulting internal field differences at the Earth’s surface can range from tens to hundreds of nanotesla(nT).Additionally,we find that the uncertainties introduced into field models by different data selection criteria are significantly larger than the measurement accuracy of modern geomagnetic satellites.These uncertainties should be considered when utilizing constructed magnetic field models for scientific research and applications. 展开更多
关键词 Macao Science Satellite-1 SWARM geomagnetic field modeling data selection core field crustal field
在线阅读 下载PDF
A novel method for clustering cellular data to improve classification
16
作者 Diek W.Wheeler Giorgio A.Ascoli 《Neural Regeneration Research》 SCIE CAS 2025年第9期2697-2705,共9页
Many fields,such as neuroscience,are experiencing the vast prolife ration of cellular data,underscoring the need fo r organizing and interpreting large datasets.A popular approach partitions data into manageable subse... Many fields,such as neuroscience,are experiencing the vast prolife ration of cellular data,underscoring the need fo r organizing and interpreting large datasets.A popular approach partitions data into manageable subsets via hierarchical clustering,but objective methods to determine the appropriate classification granularity are missing.We recently introduced a technique to systematically identify when to stop subdividing clusters based on the fundamental principle that cells must differ more between than within clusters.Here we present the corresponding protocol to classify cellular datasets by combining datadriven unsupervised hierarchical clustering with statistical testing.These general-purpose functions are applicable to any cellular dataset that can be organized as two-dimensional matrices of numerical values,including molecula r,physiological,and anatomical datasets.We demonstrate the protocol using cellular data from the Janelia MouseLight project to chara cterize morphological aspects of neurons. 展开更多
关键词 cellular data clustering dendrogram data classification Levene's one-tailed statistical test unsupervised hierarchical clustering
在线阅读 下载PDF
A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain 被引量:1
17
作者 Hongliang Tian Meiruo Li 《Computers, Materials & Continua》 2025年第6期5539-5559,共21页
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili... The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure. 展开更多
关键词 Edge blockchain CP-ABE data security sharing IOT
在线阅读 下载PDF
元数据标准在re3data健康科学数据中的应用现状及启示
18
作者 赵洁 贾仕亨 《图书馆学研究》 北大核心 2025年第6期43-57,共15页
调查和分析元数据标准在健康科学数据中的应用现状,有助于为我国健康科学数据描述中元数据标准的选择、健康科学数据平台的建设提供参考。通过网络调研法对科学数据仓储注册系统(registry of research data repositories,re3data)中的... 调查和分析元数据标准在健康科学数据中的应用现状,有助于为我国健康科学数据描述中元数据标准的选择、健康科学数据平台的建设提供参考。通过网络调研法对科学数据仓储注册系统(registry of research data repositories,re3data)中的健康科学数据管理平台进行调研,梳理所应用的元数据标准,分析典型元数据标准在平台中的应用情况,并归纳其在健康科学数据描述中的适用性。re3data中各健康科学数据平台共使用14种元数据标准,其中DC、DataCite、DDI、仓储自建元数据标准的使用最为广泛,多数平台组合使用多种元数据标准。各类元数据标准可分为通用型、社会科学型、自建型3类,分别适用于描述健康科学数据通用属性、社会科学研究产生的健康科学数据、特色和专业性强及政府开放的健康科学数据。 展开更多
关键词 re3data 健康科学数据 元数据标准 科学数据管理
原文传递
A Support Vector Machine(SVM)Model for Privacy Recommending Data Processing Model(PRDPM)in Internet of Vehicles
19
作者 Ali Alqarni 《Computers, Materials & Continua》 SCIE EI 2025年第1期389-406,共18页
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy challenges.One key requirement for such systems is the preservation of user privacy,ensuring a seamless experie... Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy challenges.One key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driving,navigation,and communication.These privacy needs are influenced by various factors,such as data collected at different intervals,trip durations,and user interactions.To address this,the paper proposes a Support Vector Machine(SVM)model designed to process large amounts of aggregated data and recommend privacy preserving measures.The model analyzes data based on user demands and interactions with service providers or neighboring infrastructure.It aims to minimize privacy risks while ensuring service continuity and sustainability.The SVMmodel helps validate the system’s reliability by creating a hyperplane that distinguishes between maximum and minimum privacy recommendations.The results demonstrate the effectiveness of the proposed SVM model in enhancing both privacy and service performance. 展开更多
关键词 Support vector machine big data IoV PRIVACY-PRESERVING
在线阅读 下载PDF
Design Discussion of a Wireless Fire Alarm System Based on Data Fusion Technology 被引量:1
20
作者 Qun Wu Jinyang Wu 《Journal of Electronic Research and Application》 2025年第2期58-64,共7页
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi... This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system. 展开更多
关键词 data fusion technology Fire alarm system Wireless alarm Hardware design Software design
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部