期刊文献+
共找到297,714篇文章
< 1 2 250 >
每页显示 20 50 100
A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature 被引量:1
1
作者 Shihao Wang Xuehui Du +4 位作者 Xiangyu Wu Qiantao Yang Wenjuan Wang Yu Cao Aodi Liu 《Computers, Materials & Continua》 2025年第2期3355-3379,共25页
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ... With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness. 展开更多
关键词 Blockchain threshold signature distributed oracle data submission share recovery
在线阅读 下载PDF
An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem
2
作者 Binhui Wang Hongfeng Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期371-388,共18页
The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because o... The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling. 展开更多
关键词 distributed permutation flow shop scheduling MAKESPAN iterated greedy algorithm memory mechanism cooperative reinforcement learning
在线阅读 下载PDF
Overview and Prospect of Distributed Energy P2P Trading
3
作者 Jiajia Liu Mingxing Tian Xusheng Mao 《Energy Engineering》 EI 2025年第1期379-404,共26页
After a century of relative stability in the electricity sector,the widespread adoption of distributed energy resources,along with recent advancements in computing and communication technologies,has fundamentally alte... After a century of relative stability in the electricity sector,the widespread adoption of distributed energy resources,along with recent advancements in computing and communication technologies,has fundamentally altered how energy is consumed,traded,and utilized.This change signifies a crucial shift as the power system evolves from its traditional hierarchical organization to a more decentralized approach.At the heart of this transformation are innovative energy distribution models,like peer-to-peer(P2P)sharing,which enable communities to collaboratively manage their energy resources.The effectiveness of P2P sharing not only improves the economic prospects for prosumers,who generate and consume energy,but also enhances energy resilience and sustainability.This allows communities to better leverage local resources while fostering a sense of collective responsibility and collaboration in energy management.However,there is still no extensive implementation of such sharing models in today’s electricitymarkets.Research on distributed energy P2P trading is still in the exploratory stage,and it is particularly important to comprehensively understand and analyze the existing distributed energy P2P trading market.This paper contributes with an overview of the P2P markets that starts with the network framework,market structure,technical approach for trading mechanism,and blockchain technology,moving to the outlook in this field. 展开更多
关键词 distributed energy P2P market mechanisms classification and comparison
在线阅读 下载PDF
Periodic Traveling Wave Solutions of a Single Population Model with Advection and Distributed Delay
4
作者 GUO Zilin YU Tao TANG Xiaosong 《应用数学》 北大核心 2025年第4期988-995,共8页
In this paper,we investigate the periodic traveling wave solutions problem for a single population model with advection and distributed delay.By the bifurcation analysis method,we can obtain periodic traveling wave so... In this paper,we investigate the periodic traveling wave solutions problem for a single population model with advection and distributed delay.By the bifurcation analysis method,we can obtain periodic traveling wave solutions for this model under the influence of advection term and distributed delay.The obtained results indicate that weak kernel and strong kernel can both deduce the existence of periodic traveling wave solutions.Finally,we apply the main results in this paper to Logistic model and Nicholson’s blowflies model. 展开更多
关键词 Single population model Advection distributed delay Periodic traveling wave solution
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
5
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
Distributed State and Fault Estimation for Cyber-Physical Systems Under DoS Attacks
6
作者 Limei Liang Rong Su Haotian Xu 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期261-263,共3页
Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded... Dear Editor,The letter deals with the distributed state and fault estimation of the whole physical layer for cyber-physical systems(CPSs) when the cyber layer suffers from DoS attacks. With the advancement of embedded computing, communication and related hardware technologies, CPSs have attracted extensive attention and have been widely used in power system, traffic network, refrigeration system and other fields. 展开更多
关键词 cyber physical systems refrigeration system traffic network dos attacks distributed state fault estimation embedded computing power system distributed state estimation
在线阅读 下载PDF
Distributed Cooperative Regulation for Networked Re-Entrant Manufacturing Systems
7
作者 Chenguang Liu Qing Gao +1 位作者 Wei Wang Jinhu Lü 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期636-638,共3页
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p... Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation. 展开更多
关键词 production line networked re entrant manufacturing systems three tier architecture production linethe distributed cooperative regulation hyperbolic partial differential equations pdes based distributed cooperative regulation problem manufacturing layer
在线阅读 下载PDF
Optimization of Reconfiguration and Resource Allocation for Distributed Generation and Capacitor Banks Using NSGA-Ⅱ:A Multi-Scenario Approach
8
作者 Tareq Hamadneh Belal Batiha +3 位作者 Frank Werner Mehrdad Ahmadi Kamarposhti Ilhami Colak El Manaa Barhoumi 《Computer Modeling in Engineering & Sciences》 2025年第5期1519-1548,共30页
Reconfiguration,as well as optimal utilization of distributed generation sources and capacitor banks,are highly effective methods for reducing losses and improving the voltage profile,or in other words,the power quali... Reconfiguration,as well as optimal utilization of distributed generation sources and capacitor banks,are highly effective methods for reducing losses and improving the voltage profile,or in other words,the power quality in the power distribution system.Researchers have considered the use of distributed generation resources in recent years.There are numerous advantages to utilizing these resources,the most significant of which are the reduction of network losses and enhancement of voltage stability.Non-dominated Sorting Genetic Algorithm II(NSGA-II),Multi-Objective Particle Swarm Optimization(MOPSO),and Intersect Mutation Differential Evolution(IMDE)algorithms are used in this paper to perform optimal reconfiguration,simultaneous location,and capacity determination of distributed generation resources and capacitor banks.Three scenarios were used to replicate the studies.The reconfiguration of the switches,as well as the location and determination of the capacitor bank’s optimal capacity,were investigated in this scenario.However,in the third scenario,reconfiguration,and determining the location and capacity of the Distributed Generation(DG)resources and capacitor banks have been carried out simultaneously.Finally,the simulation results of these three algorithms are compared.The results indicate that the proposed NSGAII algorithm outperformed the other two multi-objective algorithms and was capable of maintaining smaller objective functions in all scenarios.Specifically,the energy losses were reduced from 211 to 51.35 kW(a 75.66%reduction),119.13 kW(a 43.54%reduction),and 23.13 kW(an 89.04%reduction),while the voltage stability index(VSI)decreased from 6.96 to 2.105,1.239,and 1.257,respectively,demonstrating significant improvement in the voltage profile. 展开更多
关键词 Distribution network reconfiguration energy losses distributed generations capacitor banks NSGAII
在线阅读 下载PDF
Spatial monitoring of curved geostructures using distributed Brillouin sensing:A state-of-the-art review
9
作者 Shaoqiu Zhang Chao Wang +2 位作者 Cleitus Antony Qinglai Zhang Zili Li 《Intelligent Geoengineering》 2025年第1期35-53,共19页
Curved geostructures,such as tunnels,are commonly encountered in geotechnical engineering and are critical to maintaining structural stability.Ensuring their proper performance through field monitoring during their se... Curved geostructures,such as tunnels,are commonly encountered in geotechnical engineering and are critical to maintaining structural stability.Ensuring their proper performance through field monitoring during their service life is essential for the overall functionality of geotechnical infrastructure.Distributed Brillouin sensing(DBS)is increasingly applied in geotechnical projects due to its ability to acquire spatially continuous strain and temperature distributions over distances of up to 150 km using a single optical fibre.However,limited by the complex operations of distributed optic fibre sensing(DFOS)sensors in curved structures,previous reports about exploiting DBS in geotechnical structural health monitoring(SHM)have mostly been focused on flat surfaces.The lack of suitable DFOS installation methods matched to the spatial characteristics of continuous monitoring is one of the major factors that hinder the further application of this technique in curved structures.This review paper starts with a brief introduction of the fundamental working principle of DBS and the inherent limitations of DBS being used on monitoring curved surfaces.Subsequently,the state-of-the-art installation methods of optical fibres in curved structures are reviewed and compared to address the most suitable scenario of each method and their advantages and disadvantages.The installation challenges of optical fibres that can highly affect measurement accuracy are also discussed in the paper. 展开更多
关键词 distributed Brillouin sensing Structural health monitoring distributed fibre optic sensing Curved geostructures Field instrumentation
在线阅读 下载PDF
A Collaborative Approach to Distributed Heterogeneous Process Engines for Cross-Organizations
10
作者 Xuehu Zuo Xin Shan Zhongguo Yang 《Journal of Electronic Research and Application》 2025年第5期158-165,共8页
In today’s complex and rapidly changing business environment,the traditional single-organization service model can no longer meet the needs of multi-organization collaborative processing.Based on existing business pr... In today’s complex and rapidly changing business environment,the traditional single-organization service model can no longer meet the needs of multi-organization collaborative processing.Based on existing business process engine technologies,this paper proposes a distributed heterogeneous process engine collaboration method for crossorganizational scenarios.The core of this method lies in achieving unified access and management of heterogeneous engines through a business process model adapter and a common operation interface.The key technologies include:Meta-Process Control Architecture,where the central engine(meta-process scheduler)decomposes the original process into fine-grained sub-processes and schedules their execution in a unified order,ensuring consistency with the original process logic;Process Model Adapter,which addresses the BPMN2.0 model differences among heterogeneous engines such as Flowable and Activiti through a matching-and-replacement mechanism,providing a unified process model standard for different engines;Common Operation Interface,which encapsulates the REST APIs of heterogeneous engines and offers a single,standardized interface for process deployment,instance management,and status synchronization.This method integrates multiple techniques to address API differences,process model incompatibilities,and execution order consistency issues among heterogeneous engines,delivering a unified,flexible,and scalable solution for cross-organizational process collaboration. 展开更多
关键词 distributed COLLABORATION Meta-process Cross-organization Business process Process engine
在线阅读 下载PDF
Patterns of genetic diversity in five species of Passeriformes co-distributed in an environmental gradient
11
作者 Marcela Restrepo-Arias Héctor F.Rivera-Gutiérrez +2 位作者 Iván Darío Soto-Calderón Ernesto Pérez-Collazos Catalina González-Quevedo 《Avian Research》 2025年第3期519-530,共12页
Understanding the evolutionary processes that influence the distribution of genetic diversity in natural populations is a key issue in evolutionary biology. Both species' distribution ranges and environmental grad... Understanding the evolutionary processes that influence the distribution of genetic diversity in natural populations is a key issue in evolutionary biology. Both species' distribution ranges and environmental gradients can influence this diversity through mechanisms such as gene flow, selection, and genetic drift. To explore how these forces interact, we assessed neutral and adaptive genetic variation in three widely distributed and two narrowly distributed bird species co-occurring along the Cauca River canyon in Antioquia, Colombia—a region of pronounced environmental heterogeneity. We sampled individuals across eight sites spanning the canyon's gradient and analyzed genetic diversity and structure using microsatellites and toll-like receptors (TLRs), a gene family involved in innate immunity. Widely distributed species consistently exhibited higher genetic diversity at both marker types compared to their narrowly distributed counterparts. Although we did not find a significant relationship between microsatellite heterozygosity and TLR heterozygosity, we evidenced a negative trend for widely distributed species and a positive trend for narrowly distributed species. This result suggests that there is a stronger effect of genetic drift in narrowly distributed species. Our results highlight the role of distribution range in maintaining genetic diversity and suggest that environmental gradients, by interacting with gene flow and selection, may influence patterns of adaptive variation. 展开更多
关键词 Adaptive genetic diversity Microsatellites Neutral genetic diversity Restricted distribution Tol-ike receptor Wide distribution
在线阅读 下载PDF
Distributed Photovoltaic Power Prediction Technology Based on Spatio-Temporal Graph Neural Networks
12
作者 Dayan Sun Xiao Cao +2 位作者 Zhifeng Liang Junrong Xia Yuqi Wang 《Energy Engineering》 2025年第8期3329-3346,共18页
Photovoltaic(PV)power generation is undergoing significant growth and serves as a key driver of the global energy transition.However,its intermittent nature,which fluctuates with weather conditions,has raised concerns... Photovoltaic(PV)power generation is undergoing significant growth and serves as a key driver of the global energy transition.However,its intermittent nature,which fluctuates with weather conditions,has raised concerns about grid stability.Accurate PV power prediction has been demonstrated as crucial for power system operation and scheduling,enabling power slope control,fluctuation mitigation,grid stability enhancement,and reliable data support for secure grid operation.However,existing prediction models primarily target centralized PV plants,largely neglecting the spatiotemporal coupling dynamics and output uncertainties inherent to distributed PV systems.This study proposes a novel Spatio-Temporal Graph Neural Network(STGNN)architecture for distributed PV power generation prediction,designed to enhance distributed photovoltaic(PV)power generation forecasting accuracy and support regional grid scheduling.This approach models each PV power plant as a node in an undirected graph,with edges representing correlations between plants to capture spatial dependencies.The model comprises multiple Sparse Attention-based Adaptive Spatio-Temporal(SAAST)blocks.The SAAST blocks include sparse temporal attention,sparse spatial attention,an adaptive Graph Convolutional Network(GCN),and a temporal convolution network(TCN).These components eliminate weak temporal and spatial correlations,better represent dynamic spatial dependencies,and further enhance prediction accuracy.Finally,multi-dimensional comparative experiments between the STGNN and other models on the DKASC PV dataset demonstrate its superior performance in terms of accuracy and goodness-of-fit for distributed PV power generation prediction. 展开更多
关键词 distributed PV deep learning STGNN SAAST power prediction
暂未订购
Research on transparency of coal mine geological conditions based on distributed fiber-optic sensing technology
13
作者 Chunde Piao Yanzhu Yin +2 位作者 Zhihao He Wenchi Du Guangqing Wei 《Deep Underground Science and Engineering》 2025年第2期255-263,共9页
Coal mining induces changes in the nature of rock and soil bodies,as well as hydrogeological conditions,which can easily trigger the occurrence of geological disasters such as water inrush,movement of the coal seam ro... Coal mining induces changes in the nature of rock and soil bodies,as well as hydrogeological conditions,which can easily trigger the occurrence of geological disasters such as water inrush,movement of the coal seam roof and floor,and rock burst.Transparency in coal mine geological conditions provides technical support for intelligent coal mining and geological disaster prevention.In this sense,it is of great significance to address the requirements for informatizing coal mine geological conditions,dynamically adjust sensing parameters,and accurately identify disaster characteristics so as to prevent and control coal mine geological disasters.This paper examines the various action fields associated with geological disasters in mining faces and scrutinizes the types and sensing parameters of geological disasters resulting from coal seam mining.On this basis,it summarizes a distributed fiber-optic sensing technology framework for transparent geology in coal mines.Combined with the multi-field monitoring characteristics of the strain field,the temperature field,and the vibration field of distributed optical fiber sensing technology,parameters such as the strain increment ratio,the aquifer temperature gradient,and the acoustic wave amplitude are extracted as eigenvalues for identifying rock breaking,aquifer water level,and water cut range,and a multi-field sensing method is established for identifying the characteristics of mining-induced rock mass disasters.The development direction of transparent geology based on optical fiber sensing technology is proposed in terms of the aspects of sensing optical fiber structure for large deformation monitoring,identification accuracy of optical fiber acoustic signals,multi-parameter monitoring,and early warning methods. 展开更多
关键词 coal mine distributed monitoring geological disaster sensing fiber transparent geology
原文传递
Aero-propulsion analysis of distributed ducted-fan propulsion based on lifting-line driven body-force model
14
作者 Hanru LIU Xingyu ZHAO +2 位作者 Fang ZHOU Yuyao FENG Yangang WANG 《Chinese Journal of Aeronautics》 2025年第2期60-74,共15页
As the environmental problems become increasingly serious,distributed electrical propulsion systems with higher aerodynamic efficiency and lower pollution emission have received extensive attention in recent years.The... As the environmental problems become increasingly serious,distributed electrical propulsion systems with higher aerodynamic efficiency and lower pollution emission have received extensive attention in recent years.The distributed electrical propulsion usually employs the new aero-propulsion integrated configuration.A simulation strategy for internal and external flow coupling based on the combination of lifting line theory and body force method is proposed.The lifting line theory and body force method as source term are embedded into the Navier-Stokes formulation.The lift and drag characteristics of the aero-propulsion coupling configuration are simulated.The results indicate that the coupling configuration has the most obvious lift augmentation at 12°angle of attack,which can provide an 11.11%increase in lift for the airfoil.At 0°angle of attack,the pressure difference on the lip parts provides the thrust component,which results in a lower drag coefficient.Additionally,the failure impact of a ducted fan at the middle or edge on aerodynamics is investigated.For the two failure conditions,the lift of the coupling configuration is decreased significantly by 27.85%and 26.14%respectively,and the lip thrust is decreased by 70.74%and 56.48%respectively. 展开更多
关键词 Ducted fan distributed electrical PROPULSION Lifting line theory Body force method Aero-propulsion integrated CONFIGURATION
原文传递
Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things
15
作者 Amal Al-Rasheed Rahim Khan +1 位作者 Fahad Alturise Salem Alkhalaf 《Computers, Materials & Continua》 2025年第7期957-973,共17页
The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these netwo... The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these networks,as shared channels are used to transmit packets.In this paper,a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT.Initially,every device works collaboratively to form a distributed network.In this model,if a device is deployed outside the coverage area of the nearest server,it communicates indirectly through the neighboring devices.For this purpose,every device collects data from the respective neighboring devices,such as hop count,average packet transmission delay,criticality factor,link reliability,and RSSI value,etc.These parameters are used to find an optimal route from the source to the destination.Secondly,the proposed approach has enabled devices to learn from the environment and adjust the optimal route-finding formula accordingly.Moreover,these devices and server modules must ensure that every packet is transmitted securely,which is possible only if it is encrypted with an encryption algorithm.For this purpose,a decision tree-enabled device-to-server authentication algorithm is presented where every device and server must take part in the offline phase.Simulation results have verified that the proposed distributed communication approach has the potential to ensure the integrity and confidentiality of data during transmission.Moreover,the proposed approach has outperformed the existing approaches in terms of communication cost,processing overhead,end-to-end delay,packet loss ratio,and throughput.Finally,the proposed approach is adoptable in different networking infrastructures. 展开更多
关键词 Internet of things distributed communication SECURITY AUTHENTICATION decision tree
在线阅读 下载PDF
A Secured and Continuously Developing Methodology for Breast Cancer Image Segmentation via U-Net Based Architecture and Distributed Data Training
16
作者 Rifat Sarker Aoyon Ismail Hossain +1 位作者 M.Abdullah-Al-Wadud Jia Uddin 《Computer Modeling in Engineering & Sciences》 2025年第3期2617-2640,共24页
This research introduces a unique approach to segmenting breast cancer images using a U-Net-based architecture.However,the computational demand for image processing is very high.Therefore,we have conducted this resear... This research introduces a unique approach to segmenting breast cancer images using a U-Net-based architecture.However,the computational demand for image processing is very high.Therefore,we have conducted this research to build a system that enables image segmentation training with low-power machines.To accomplish this,all data are divided into several segments,each being trained separately.In the case of prediction,the initial output is predicted from each trained model for an input,where the ultimate output is selected based on the pixel-wise majority voting of the expected outputs,which also ensures data privacy.In addition,this kind of distributed training system allows different computers to be used simultaneously.That is how the training process takes comparatively less time than typical training approaches.Even after completing the training,the proposed prediction system allows a newly trained model to be included in the system.Thus,the prediction is consistently more accurate.We evaluated the effectiveness of the ultimate output based on four performance matrices:average pixel accuracy,mean absolute error,average specificity,and average balanced accuracy.The experimental results show that the scores of average pixel accuracy,mean absolute error,average specificity,and average balanced accuracy are 0.9216,0.0687,0.9477,and 0.8674,respectively.In addition,the proposed method was compared with four other state-of-the-art models in terms of total training time and usage of computational resources.And it outperformed all of them in these aspects. 展开更多
关键词 Breast cancer U-Net distributed training data privacy low-powerful machines
在线阅读 下载PDF
Securing Internet of Things Devices with Federated Learning:A Privacy-Preserving Approach for Distributed Intrusion Detection
17
作者 Sulaiman Al Amro 《Computers, Materials & Continua》 2025年第6期4623-4658,共36页
The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Syst... The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments. 展开更多
关键词 Federated learning internet of things intrusion detection PRIVACY-PRESERVING distributed security
在线阅读 下载PDF
Distributed asynchronous double accelerated optimization for ethylene plant considering delays
18
作者 Ting Wang Zhongmei Li Wenli Du 《Chinese Journal of Chemical Engineering》 2025年第2期245-250,共6页
Considering the complexity of plant-wide optimization for large-scale industries, a distributed optimization framework to solve the profit optimization problem in ethylene whole process is proposed. To tackle the dela... Considering the complexity of plant-wide optimization for large-scale industries, a distributed optimization framework to solve the profit optimization problem in ethylene whole process is proposed. To tackle the delays arising from the residence time for materials passing through production units during the process with guaranteed constraint satisfaction, an asynchronous distributed parameter projection algorithm with gradient tracking method is introduced. Besides, the heavy ball momentum and Nesterov momentum are incorporated into the proposed algorithm in order to achieve double acceleration properties. The experimental results show that the proposed asynchronous algorithm can achieve a faster convergence compared with the synchronous algorithm. 展开更多
关键词 Asynchronous distributed optimization Plant-wide optimization Heavy ball Nesterov Inequality constraints
在线阅读 下载PDF
Distributed bearing-only target tracking algorithm based on variational Bayesian inference under random measurement anomalies
19
作者 YANG Haoran CHEN Yu +1 位作者 HU Zhentao JIA Haoqian 《High Technology Letters》 2025年第1期86-94,共9页
A distributed bearing-only target tracking algorithm based on variational Bayesian inference(VBI)under random measurement anomalies is proposed for the problem of adverse effect of random measurement anomalies on the ... A distributed bearing-only target tracking algorithm based on variational Bayesian inference(VBI)under random measurement anomalies is proposed for the problem of adverse effect of random measurement anomalies on the state estimation accuracy of moving targets in bearing-only tracking scenarios.Firstly,the measurement information of each sensor is complemented by using triangulation under the distributed framework.Secondly,the Student-t distribution is selected to model the measurement likelihood probability density function,and the joint posteriori probability density function of the estimated variables is approximately decoupled by VBI.Finally,the estimation results of each local filter are sent to the fusion center and fed back to each local filter.The simulation results show that the proposed distributed bearing-only target tracking algorithm based on VBI in the presence of abnormal measurement noise comprehensively considers the influence of system nonlinearity and random anomaly of measurement noise,and has higher estimation accuracy and robustness than other existing algorithms in the above scenarios. 展开更多
关键词 bearing-only target tracking(BOTT) variational Bayesian inference(VBI) Student-t distribution cubature Kalman filter(CKF) distributed fusion
在线阅读 下载PDF
Design and Application of a New Distributed Dynamic Spatio-Temporal Privacy Preserving Mechanisms
20
作者 Jiacheng Xiong Xingshu Chen +1 位作者 Xiao Lan Liangguo Chen 《Computers, Materials & Continua》 2025年第8期2273-2303,共31页
In the era of big data,the growing number of real-time data streams often contains a lot of sensitive privacy information.Releasing or sharing this data directly without processing will lead to serious privacy informa... In the era of big data,the growing number of real-time data streams often contains a lot of sensitive privacy information.Releasing or sharing this data directly without processing will lead to serious privacy information leakage.This poses a great challenge to conventional privacy protection mechanisms(CPPM).The existing data partitioning methods ignore the number of data replications and information exchanges,resulting in complex distance calculations and inefficient indexing for high-dimensional data.Therefore,CPPM often fails to meet the stringent requirements of efficiency and reliability,especially in dynamic spatiotemporal environments.Addressing this concern,we proposed the Principal Component Enhanced Vantage-point tree(PEV-Tree),which is an enhanced data structure based on the idea of dimension reduction,and constructed a Distributed Spatio-Temporal Privacy Preservation Mechanism(DST-PPM)on it.In this work,principal component analysis and the vantage tree are used to establish the PEV-Tree.In addition,we designed three distributed anonymization algorithms for data streams.These algorithms are named CK-AA,CL-DA,and CT-CA,fulfill the anonymization rules of K-Anonymity,L-Diversity,and T-Closeness,respectively,which have different computational complexities and reliabilities.The higher the complexity,the lower the risk of privacy leakage.DST-PPM can reduce the dimension of high-dimensional information while preserving data characteristics and dividing the data space into vantage points based on distance.It effectively enhances the data processing workflow and increases algorithmefficiency.To verify the validity of the method in this paper,we conducted empirical tests of CK-AA,CL-DA,and CT-CA on conventional datasets and the PEV-Tree,respectively.Based on the big data background of the Internet of Vehicles,we conducted experiments using artificial simulated on-board network data.The results demonstrated that the operational efficiency of the CK-AA,CL-DA,and CT-CA is enhanced by 15.12%,24.55%,and 52.74%,respectively,when deployed on the PEV-Tree.Simultaneously,during homogeneity attacks,the probabilities of information leakage were reduced by 2.31%,1.76%,and 0.19%,respectively.Furthermore,these algorithms showcased superior utility(scalability)when executed across PEV-Trees of varying scales in comparison to their performance on conventional data structures.It indicates that DST-PPM offers marked advantages over CPPM in terms of efficiency,reliability,and scalability. 展开更多
关键词 Privacy preserving distributed anonymization algorithm VP-Tree data stream internet of vehicles
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部