期刊文献+
共找到13,424篇文章
< 1 2 250 >
每页显示 20 50 100
On-Line Privacy Behavior: Using User Interfaces for Salient Factors
1
作者 Thomas Hughes-Roberts Elahe Kani-Zabihi 《Journal of Computer and Communications》 2014年第4期220-231,共12页
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie... The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required. 展开更多
关键词 on-line privacy Social NETWORKING Site User Interface Users’ BEHAVIOR Theory of PLANNED BEHAVIOR
暂未订购
NLDA non-linear regression model for preserving data privacy in wireless sensor networks 被引量:1
2
作者 A.L.Sreenivasulu P.Chenna Reddy 《Digital Communications and Networks》 SCIE 2020年第1期101-107,共7页
Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data... Recently,the application of Wireless Sensor Networks(WSNs)has been increasing rapidly.It requires privacy preserving data aggregation protocols to secure the data from compromises.Preserving privacy of the sensor data is a challenging task.This paper presents a non-linear regression-based data aggregation protocol for preserving privacy of the sensor data.The proposed protocol uses non-linear regression functions to represent the sensor data collected from the sensor nodes.Instead of sending the complete data to the cluster head,the sensor nodes only send the coefficients of the non-linear function.This will reduce the communication overhead of the network.The data aggregation is performed on the masked coefficients and the sink node is able to retrieve the approximated results over the aggregated data.The analysis of experiment results shows that the proposed protocol is able to minimize communication overhead,enhance data aggregation accuracy,and preserve data privacy. 展开更多
关键词 Sensor nodes Data accuracy Wireless sensor networks Data aggregation privacy preserving
在线阅读 下载PDF
A Mass On-line Control Type Impact Inertial Piezoelectric Actuator Based on a Bionic Wheat Awn Structure
3
作者 Youjia Li Shanshan Wu +5 位作者 Taofei Long Jianping Li Jijie Ma Xinhui Li Yili Hu Jianming Wen 《Journal of Bionic Engineering》 2025年第6期3058-3075,共18页
A mass on-line control type impact inertial piezoelectric actuator with a bionic wheat structure is proposed in this work.Inspired by the anisotropic friction mechanism of natural wheat awns,a bioinspired mechanism is... A mass on-line control type impact inertial piezoelectric actuator with a bionic wheat structure is proposed in this work.Inspired by the anisotropic friction mechanism of natural wheat awns,a bioinspired mechanism is used to achieve the designed driving strategy based on the asymmetric-mass control method that mimics bidirectional motion characteristics of wheat awn.A lumped parameter theoretical model is established,and the numerical simulation results have verified the designed bionic working principle and revealed the key system parameters.Experimental results show that the prototype has the bi-directional motion ability inherited from anisotropic friction of wheat awn,with theoretically infinite stroke and can easily obtain the required step displacement and velocity by conveniently adjusting the voltage.It can achieve a resolution of 0.7μm,and a forward and backward maximum velocity of 12.7μm/s and 90.72μm/s respectively.In addition,the actuator also has the advantages of good stability,control convenience,and ease of integration.Besides,the actuator is capable of adjusting motion direction via voltage,providing a significant advantage in precise bidirectional control.This study confirms that the proposed mass on-line control type actuator embodies a successful bionic translation from plant morphology to precision engineering,and adds a new member to the family of impact inertial piezoelectric actuators,which completes the last piece of the puzzle for the impact inertial driving mechanism.It promotes the further development of inertial precision driving and control technology and is expected to expand the scope of application.Future work will focus on optimizing performance and developing applications. 展开更多
关键词 BIONIC Bi-directional motion INERTIAL Mass on-line control Piezoelectric actuator
在线阅读 下载PDF
Personalized Differential Privacy Graph Neural Network
4
作者 Yanli Yuan Dian Lei +3 位作者 Chuan Zhang Zehui Xiong Chunhai Li Liehuang Zhu 《IEEE/CAA Journal of Automatica Sinica》 2026年第2期498-500,共3页
Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving g... Dear Editor,This letter addresses the critical challenge of preserving privacy in graph learning without compromising on data utility.Differential privacy(DP)is emerging as an effective method for privacy-preserving graph learning.However,its application often diminishes data utility,especially for nodes with fewer neighbors in graph neural networks(GNNs). 展开更多
关键词 graph neural networks gnns personalized differential privacy graph learning privacy preservation data utility preserving privacy graph neural network
在线阅读 下载PDF
Privacy-Preserving Personnel Detection in Substations via Federated Learning with Dynamic Noise Adaptation
5
作者 Yuewei Tian Yang Su +4 位作者 Yujia Wang Lisa Guo Xuyang Wu Lei Cao Fang Ren 《Computers, Materials & Continua》 2026年第3期894-915,共22页
This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federat... This study addresses the risk of privacy leakage during the transmission and sharing of multimodal data in smart grid substations by proposing a three-tier privacy-preserving architecture based on asynchronous federated learning.The framework integrates blockchain technology,the InterPlanetary File System(IPFS)for distributed storage,and a dynamic differential privacy mechanism to achieve collaborative security across the storage,service,and federated coordination layers.It accommodates both multimodal data classification and object detection tasks,enabling the identification and localization of key targets and abnormal behaviors in substation scenarios while ensuring privacy protection.This effectively mitigates the single-point failures and model leakage issues inherent in centralized architectures.A dynamically adjustable differential privacy mechanism is introduced to allocate privacy budgets according to client contribution levels and upload frequencies,achieving a personalized balance between model performance and privacy protection.Multi-dimensional experimental evaluations,including classification accuracy,F1-score,encryption latency,and aggregation latency,verify the security and efficiency of the proposed architecture.The improved CNN model achieves 72.34%accuracy and an F1-score of 0.72 in object detection and classification tasks on infrared surveillance imagery,effectively identifying typical risk events such as not wearing safety helmets and unauthorized intrusion,while maintaining an aggregation latency of only 1.58 s and a query latency of 80.79 ms.Compared with traditional static differential privacy and centralized approaches,the proposed method demonstrates significant advantages in accuracy,latency,and security,providing a new technical paradigm for efficient,secure data sharing,object detection,and privacy preservation in smart grid substations. 展开更多
关键词 SUBSTATION privacy preservation asynchronous federated learning CNN differential privacy
在线阅读 下载PDF
A Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering
6
作者 Fang Liu Xianghui Meng +1 位作者 Jiachen Li Sibo Guo 《Computers, Materials & Continua》 2026年第2期632-652,共21页
With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods... With the popularization of smart devices,Location-Based Services(LBS)greatly facilitates users’life,but at the same time brings the risk of users’location privacy leakage.Existing location privacy protection methods are deficient,failing to reasonably allocate the privacy budget for non-outlier location points and ignoring the critical location information that may be contained in the outlier points,leading to decreased data availability and privacy exposure problems.To address these problems,this paper proposes a Mix Location Privacy Preservation Method Based on Differential Privacy with Clustering(MLDP).The method first utilizes the DBSCAN clustering algorithm to classify location points into non-outliers and outliers.For non-outliers,the scoring function is designed by combining geographic information and semantic information,and the privacy budget is allocated according to the heat intensity of the hotspot area;for outliers,the scoring function is constructed to allocate the privacy budget based on their correlation with the hotspot area.By comprehensively considering the geographic information,semantic information,and correlation with hotspot areas of the location points,a reasonable privacy budget is assigned to each location point,andfinallynoise is added throughthe Laplacemechanismto realizeprivacyprotection.Experimental results on tworeal trajectory datasets,Geolife and T-Drive,show that the MLDP approach significantly improves data availability while effectively protecting location privacy.Compared with the comparison methods,the maximum available data ratio of MLDP is 1.Moreover,compared with the RandomNoise method,its execution time is 0.056–0.061 s longer,and the logRE is 0.12951–0.62194 lower;compared with KemeansDP,QTK-DP,DPK-F,IDP-SC,and DPK-Means-up methods,it saves 0.114–0.296 s in execution time,and the logRE is 0.01112–0.38283 lower. 展开更多
关键词 Location privacy protection DBSCAN clustering differential privacy hotspot area
在线阅读 下载PDF
FedDPL:Federated Dynamic Prototype Learning for Privacy-Preserving Malware Analysis across Heterogeneous Clients
7
作者 Danping Niu Yuan Ping +2 位作者 Chun Guo Xiaojun Wang Bin Hao 《Computers, Materials & Continua》 2026年第3期1989-2014,共26页
With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these i... With the increasing complexity of malware attack techniques,traditional detection methods face significant challenges,such as privacy preservation,data heterogeneity,and lacking category information.To address these issues,we propose Federated Dynamic Prototype Learning(FedDPL)for malware classification by integrating Federated Learning with a specifically designed K-means.Under the Federated Learning framework,model training occurs locally without data sharing,effectively protecting user data privacy and preventing the leakage of sensitive information.Furthermore,to tackle the challenges of data heterogeneity and the lack of category information,FedDPL introduces a dynamic prototype learning mechanism,which adaptively adjusts the clustering prototypes in terms of position and number.Thus,the dependency on predefined category numbers in typical K-means and its variants can be significantly reduced,resulting in improved clustering performance.Theoretically,it provides a more accurate detection of malicious behavior.Experimental results confirm that FedDPL excels in handling malware classification tasks,demonstrating superior accuracy,robustness,and privacy protection. 展开更多
关键词 Malware classification data heterogeneity federated learning CLUSTERING differential privacy
在线阅读 下载PDF
DPIL-Traj: Differential Privacy Trajectory Generation Framework with Imitation Learning
8
作者 Huaxiong Liao Xiangxuan Zhong +4 位作者 Xueqi Chen Yirui Huang Yuwei Lin Jing Zhang Bruce Gu 《Computers, Materials & Continua》 2026年第1期1530-1550,共21页
The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location re... The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns.However,the use of real-world trajectory data poses significant privacy risks,such as location reidentification and correlation attacks.To address these challenges,privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data.This paper introduces DPIL-Traj,an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation.Firstly,the framework incorporates Differential Privacy Clustering,which anonymizes trajectory data by applying differential privacy techniques that add noise,ensuring the protection of sensitive user information.Secondly,Imitation Learning is used to replicate decision-making behaviors observed in real-world trajectories.By learning from expert trajectories,this component generates synthetic data that closely mimics real-world decision-making processes while optimizing the quality of the generated trajectories.Finally,Markov-based Trajectory Generation is employed to capture and maintain the inherent temporal dynamics of movement patterns.Extensive experiments conducted on the GeoLife trajectory dataset show that DPIL-Traj improves utility performance by an average of 19.85%,and in terms of privacy performance by an average of 12.51%,compared to state-of-the-art approaches.Ablation studies further reveal that DP clustering effectively safeguards privacy,imitation learning enhances utility under noise,and the Markov module strengthens temporal coherence. 展开更多
关键词 privacy-PRESERVING trajectory generation differential privacy imitation learning Markov chain
在线阅读 下载PDF
A Review on Penetration Testing for Privacy of Deep Learning Models
9
作者 Salma Akther Wencheng Yang +5 位作者 Song Wang Shicheng Wei Ji Zhang Xu Yang Yanrong Lu Yan Li 《Computers, Materials & Continua》 2026年第5期43-76,共34页
As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effe... As deep learning(DL)models are increasingly deployed in sensitive domains(e.g.,healthcare),concerns over privacy and security have intensified.Conventional penetration testing frameworks,such asOWASP and NIST,are effective for traditional networks and applications but lack the capabilities to address DL-specific threats,such asmodel inversion,membership inference,and adversarial attacks.This review provides a comprehensive analysis of penetration testing for the privacy of DL models,examining the shortfalls of existing frameworks,tools,and testing methodologies.Through systematic evaluation of existing literature and empirical analysis,we identify three major contributions:(i)a critical assessment of traditional penetration testing frameworks’inadequacies when applied to DL-specific privacy vulnerabilities,(ii)a comprehensive evaluation of state-of-the-art privacy-preserving methods and their integration with penetration testing workflows,and(iii)the development of a structured framework that combines reconnaissance,threat modeling,exploitation,and post-exploitation phases specifically tailored for DL privacy assessment.Moreover,this review evaluates popular solutions such as IBMAdversarial Robustness Toolbox and TensorFlowPrivacy,alongside privacy-preserving techniques(e.g.,Differential Privacy,Homomorphic Encryption,and Federated Learning),which we systematically analyze through comparative studies of their effectiveness,computational overhead,and practical deployment constraints.While these techniques offer promising safeguards,their adoption is hindered by accuracy loss,performance overheads,and the rapid evolution of attack strategies.Our findings reveal that no single existing solution provides comprehensive protection,which leads us to propose a hybrid approach that strategically combines multiple privacy-preserving mechanisms.The findings of this survey underscore an urgent need for automated,regulationcompliant penetration testing frameworks specifically tailored to DL systems.We argue for hybrid privacy solutions that combinemultiple protectivemechanisms to ensure bothmodel accuracy and privacy.Building on our analysis,we present actionable recommendations for developing adaptive penetration testing strategies that incorporate automated vulnerability assessment,continuous monitoring,and regulatory compliance verification. 展开更多
关键词 Penetration testing deep learning homomorphic encryption differential privacy federated learning
在线阅读 下载PDF
Personalized Differential Privacy for Support Vector Machines
10
作者 WANG Xiaofeng LIU Xingwei XU Wangli 《Journal of Systems Science & Complexity》 2026年第1期180-202,共23页
The support vector machine,a widely used binary classification method,may expose sensitive information during training.To address this,the authors propose a personalized differential privacy method that extends differ... The support vector machine,a widely used binary classification method,may expose sensitive information during training.To address this,the authors propose a personalized differential privacy method that extends differential privacy.Specifically,the authors introduce personalized differentially private support vector machines to meet different individuals'privacy requirements,using a reweighting strategy and the Laplace mechanism.Theoretical analysis demonstrates that the proposed methods simultaneously satisfy the requirements of personalized differential privacy and ensure model prediction accuracy at these privacy levels.Extensive experiments demonstrate that the proposed methods outperform the existing methods. 展开更多
关键词 Laplace mechanism personalized differential privacy reweighting strategy support vector machine
原文传递
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
11
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks privacy scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Security and Privacy Challenges,Solutions,and Performance Evaluation in AIoT-Enabled Smart Societies
12
作者 Shahab Ali Khan Tehseen Mazhar +5 位作者 Syed Faisal Abbas Shah Wasim Ahmad Sunawar Khan Afsha BiBi Usama Shah Habib Hamam 《Computer Modeling in Engineering & Sciences》 2026年第3期179-217,共39页
The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces ma... The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces major security and privacy concerns across domains such as healthcare,transportation,and smart cities.This Systemic Literature Review(SLR)addresses three research questions:identifying major threats and challenges in AIoT ecosystems,reviewing state-of-the-art security and privacy techniques,and evaluating their effectiveness.An SLR covering the period from 2020 to 2025 was conducted using major academic digital libraries,including IEEE Xplore,ACM Digital Library,ScienceDirect,SpringerLink,and Wiley Online Library,with a focus on security-and privacy-enhancing techniques such as blockchain,federated learning,and edge AI.The SLR identifies key challenges including data privacy leakage,authentication,cloud dependency,and attack surface expansion,and finds that emerging techniques,while promising,often involve trade-offs related to latency,scalability,and compliance.The study highlights future directions including lightweight cryptography,standardization,and explainable AI to support secure and trustworthy AIoT-enabled smart societies. 展开更多
关键词 Artificial Intelligence of Things(AIoT) smart societies security privacy blockchain federated learning edge computing
在线阅读 下载PDF
A Distributed Dual-Network Meta-Adaptive Framework for Scalable and Privacy-Aware Multi-Agent Coordination
13
作者 Atef Gharbi Mohamed Ayari +3 位作者 Nasser Albalawi Ahmad Alshammari Nadhir Ben Halima Zeineb Klai 《Computers, Materials & Continua》 2026年第5期1456-1476,共21页
This paper presents Dual Adaptive Neural Topology(Dual ANT),a distributed dual-network metaadaptive framework that enhances ant-colony-based multi-agent coordination with online introspection,adaptive parameter contro... This paper presents Dual Adaptive Neural Topology(Dual ANT),a distributed dual-network metaadaptive framework that enhances ant-colony-based multi-agent coordination with online introspection,adaptive parameter control,and privacy-preserving interactions.This approach improves standard Ant Colony Optimization(ACO)with two lightweight neural components:a forward network that estimates swarm efficiency in real time and an inverse network that converts these descriptors into parameter adaptations.To preserve the privacy of individual trajectories in shared pheromone maps,we introduce a locally differentially private pheromone update mechanism that adds calibrated noise to each agent’s pheromone deposit while preserving the efficacy of the global pheromone signal.The resulting systemenables agents to dynamically and autonomously adapt their coordination strategies under challenging and dynamic conditions,including varying obstacle layouts,uncertain target locations,and time-varying disturbances.Extensive simulations of large grid-based search tasks demonstrated that Dual ANT achieved faster convergence,higher robustness,and improved scalability compared to advanced baselines such asMulti-StrategyACO and Hierarchical ACO.The meta-adaptive feedback loop compensates for the performance degradation caused by privacy noise and prevents premature stagnation by triggering Levy flight exploration only when necessary. 展开更多
关键词 Ant colony optimization multi-agent systems deep neural networks meta-adaptive learning Levy flight differential privacy swarm intelligence
在线阅读 下载PDF
Privacy-Preserving Gender-Based Customer Behavior Analytics in Retail Spaces Using Computer Vision
14
作者 Ginanjar Suwasono Adi Samsul Huda +4 位作者 Griffani Megiyanto Rahmatullah Dodit Suprianto Dinda Qurrota Aini Al-Sefy Ivon Sandya Sari Putri Lalu Tri Wijaya Nata Kusuma 《Computers, Materials & Continua》 2026年第1期1839-1861,共23页
In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and ta... In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and targeted marketing.However,existing computer vision solutions often rely on facial recognition to gather such insights,raising significant privacy and ethical concerns.To address these issues,this paper presents a privacypreserving customer analytics system through two key strategies.First,we deploy a deep learning framework using YOLOv9s,trained on the RCA-TVGender dataset.Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate gender classification.Second,we apply AES-128 encryption to customer position data,ensuring secure access and regulatory compliance.Our system achieved overall performance,with 81.5%mAP@50,77.7%precision,and 75.7%recall.Moreover,a 90-min observational study confirmed the system’s ability to generate privacy-protected heatmaps revealing distinct behavioral patterns between male and female customers.For instance,women spent more time in certain areas and showed interest in different products.These results confirm the system’s effectiveness in enabling personalized layout and marketing strategies without compromising privacy. 展开更多
关键词 Business intelligence customer behavior privacy-preserving analytics computer vision deep learning smart retail gender recognition heatmap privacy RCA-TVGender dataset
在线阅读 下载PDF
Quantitative determination of cyclophosphamide in rat plasma using an on-line SPE HPLC-DAD 被引量:2
15
作者 李晓娜 于宁 +5 位作者 张建美 林文斯 凌笑梅 富戈 李润涛 崔景荣 《Journal of Chinese Pharmaceutical Sciences》 CAS 2012年第2期156-161,共6页
A rapid and simple liquid chromatography method with on-line solid phase extraction was developed and validated for the quantitative determination of cyclophosphamide in rat plasma.The plasma sample was first extracte... A rapid and simple liquid chromatography method with on-line solid phase extraction was developed and validated for the quantitative determination of cyclophosphamide in rat plasma.The plasma sample was first extracted on an Acclaim? Polar Advantage II C18 guard column(PA II C18,10 mm×4.6 mm,5 μm),which was also the on-line Extraction Cartridge SPE column,by washing with 100% H2O for 1 min.The extracted sample was then eluted onto a PA II C18 column(150 mm×4.6 mm,5 μm) and separated by isocratic elution with acetonitrile-water(40:60,v/v).The mobile phase was run at a flow rate of 1.0 mL/min,and the UV detector was set at 195 nm.Retention time of cyclophosphamide was 4.3 min and the total run-time was 6 min.The linear range of the standard curve was from 1.0 to 200 μg/mL(r2 = 0.9999),and the limits of quantification and detection were 1.0 μg/mL(RSD10%,n = 5) and 0.3 μg/mL(RSD13%,n = 5),respectively.Both intra-and inter-day variations were less than 5.6%.The developed method can be used for the therapeutic drug monitoring of cyclophosphamide in the clinic. 展开更多
关键词 on-line SPE HPLC-DAD CYCLOPHOSPHAMIDE Rat plasma
原文传递
On-line SVM在船舶设备故障预测中的应用 被引量:2
16
作者 许小伟 范世东 姚玉南 《武汉理工大学学报》 CAS CSCD 北大核心 2014年第9期61-67,共7页
船舶设备众多、型号多样、结构复杂,故障预测所需的有效数据偏少,而大规模的在线数据监测又受制于存储空间和计算时间的限制。利用On-line SVM建立了故障预测模型,分析了船舶设备故障预测的流程;并以某船舶主机的燃油系统为例,验证了模... 船舶设备众多、型号多样、结构复杂,故障预测所需的有效数据偏少,而大规模的在线数据监测又受制于存储空间和计算时间的限制。利用On-line SVM建立了故障预测模型,分析了船舶设备故障预测的流程;并以某船舶主机的燃油系统为例,验证了模型的准确性,认为基于On-line SVM的故障预测精度较高,解决了船舶设备故障预测中的超大样本、非线性以及高维复杂数据问题。 展开更多
关键词 on-line SVM 船舶设备 故障预测 参数优化
原文传递
Multi-Sensor Intelligent System for On-Line and Real-Time Moneitoring Tool Cutting State in FMS 被引量:1
17
作者 徐春广 王信义 +1 位作者 邢济收 杨大勇 《Journal of Beijing Institute of Technology》 EI CAS 1997年第3期258-266,共9页
The principle and the constitution of an intelligent system for on-line and real-time montitoring tool cutting state were discussed and a synthetic sensors schedule combined a new type fluid acoustic emission sens... The principle and the constitution of an intelligent system for on-line and real-time montitoring tool cutting state were discussed and a synthetic sensors schedule combined a new type fluid acoustic emission sensor (AE) with motor current sensor was presented. The parallel communication between control system of machine tools, the monitoring intelligent system,and several decision-making systems for identifying tool cutting state was established It can auto - matically select the sensor way ,monitoring mode and identifying method in machining process- ing so as to build a successful and effective intelligent system for on -line and real-time moni- toring cutting tool states in FMS. 展开更多
关键词 tool cutting state on-line monitoring intelligent system acoustic emission sensor
在线阅读 下载PDF
On-line机行血液透析滤过两种稀释模式效果的临床观察 被引量:2
18
作者 易铁钢 祁爱蓉 程淑碧 《中国血液净化》 2004年第1期41-42,47,共3页
关键词 on-line 血液透析滤过 稀释模式 HDF 治疗 血液净化
暂未订购
On-line hemodiafiltration技术和临床应用 被引量:25
19
作者 谢红浪 季大玺 《肾脏病与透析肾移植杂志》 CAS CSCD 2005年第4期377-381,共5页
关键词 血液净化 肾脏疾病 临床 on-line 临床应用 肾脏替代治疗 终末期肾脏疾病 血液透析滤过 常规血液透析 生物相容性
暂未订购
Development and Application of On-Line Corrosion Monitoring Device for Condenser Tube 被引量:1
20
作者 曹杰玉 宋敬霞 +2 位作者 汪德良 龙国军 孙本达 《Electricity》 2004年第2期31-35,共5页
This paper introduces the development and industrial application of an on-line corrosion monitoring device for condenser tubes. Corrosion sensors are made up of representative condenser tubes chosen by eddy current te... This paper introduces the development and industrial application of an on-line corrosion monitoring device for condenser tubes. Corrosion sensors are made up of representative condenser tubes chosen by eddy current test, which enable the monitoring result to be consistent with the corrosion of actual condenser tubes. Localized corrosion rate of condenser tubes can be measured indirectly by a galvanic couple made up of tube segments with and without pits. Using this technology, corrosion problems can be found in time and accurately, and anticorrosive measures be made more economic and effective. Applications in two power plants showed the corrosion measurements are fast and accurate. 展开更多
关键词 condenser tube CORROSION on-line monitoring INSTRUMENTATION
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部