期刊文献+
共找到2,464篇文章
< 1 2 124 >
每页显示 20 50 100
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
1
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
2
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Key Techniques for High-yield and High-efficiency Cultivation of‘Zhouhua 5’Peanut under Film Mulching
3
作者 Chaoyang JIA Yake LEI +3 位作者 Jianhang ZHANG Shijie ZHAN Chenwei DENG Jingbin CUI 《Agricultural Biotechnology》 2026年第1期13-15,25,共4页
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e... With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production. 展开更多
关键词 PEANUT Zhouhua 5 Film mulching Key technique
在线阅读 下载PDF
Slope rockbolting using key block theory:Force transfer and artificial intelligence-assisted multi-objective optimisation
4
作者 Jessica Ka Yi Chiu Charlie Chunlin Li +1 位作者 Ole Jakob Mengshoel Vidar Kveldsvik 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第1期73-91,共19页
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u... This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility. 展开更多
关键词 Rock anchoring Slope stability 3D modelling Key block Parametric design Bio-inspired artificial intelligence(AI)
在线阅读 下载PDF
Navigating Global Exhibition Transformations:Charting a New Blueprint for Industry Development
5
作者 Fu Zhichen 《China's Foreign Trade》 2026年第1期19-21,共3页
On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shar... On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shared recent developments,key data,and future trends in major markets,offering guidance for industry practitioners to drive progress. 展开更多
关键词 global exhibition landscape TRANSFORMATIONS key data CEFCO China Expo Forum International Cooperation industry development market trends
在线阅读 下载PDF
Risk prediction model of postoperative infection after transplantation
6
作者 Qijing Gao Yani Wu +19 位作者 Ruiheng Peng Jin-An Zhou Ruolin Tao Lingxiang Kong Lan Zhu Shaohua Song Wenjun Shang Turun Song Liping Guo Sijun Wang Yahui Huang Haili Bao Zhiren Fu Lin Zhong Gang Chen Jie Zhao Jiayin Yang Wenzhi Guo Liqiang Zheng Ning-Ning Liu 《hLife》 2026年第3期205-208,共4页
Postoperative infection is a major global health concern,affecting 5%-10%of surgical patients and nearly doubling mortality in severe cases[1].Transplant recipients are particularly vulnerable,with 30%-80%developing i... Postoperative infection is a major global health concern,affecting 5%-10%of surgical patients and nearly doubling mortality in severe cases[1].Transplant recipients are particularly vulnerable,with 30%-80%developing infections within 30 days,often from opportunistic pathogens[2,3].Key risk factors include epidemiological exposure,net immunosuppression,age,transplant type,and surgical history[4].Despite known infection risks,current evidence remains transplantation type-specific and neglects behavioral modulators[5].Different types of transplantation may share similar risk factors[6].To identify common factors affecting postoperative infection,this study collected standardized clinical data-including diet,psychological response,medication use,and biochemical indicators-from liver and kidney transplant patients across six hospitals using a unified standard operating procedure(SOP). 展开更多
关键词 liver transplant behavioral modulat TRANSPLANTATION clinical data opportunistic pathogens key risk prediction model epidemiological exposurenet immunosuppressionagetransplant postoperative infection
暂未订购
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
7
作者 Shereen S.Jumaa Mohsin H.Challoob Amjad J.Humaidi 《Computers, Materials & Continua》 2026年第4期1548-1564,共17页
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military... Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems. 展开更多
关键词 Military image encryption pixel-level scrambling bit-level manipulation block-level shuffling password hashing dynamic encryption key spatial pixel correlation chaotic system
在线阅读 下载PDF
KPA-ViT:Key Part-Level Attention Vision Transformer for Foreign Body Classification on Coal Conveyor Belt
8
作者 Haoxuanye Ji Zhiliang Chen +3 位作者 Pengfei Jiang Ziyue Wang Ting Yu Wei Zhang 《Computers, Materials & Continua》 2026年第3期656-671,共16页
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa... Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness. 展开更多
关键词 Foreign body classification global and part-level key information coal conveyor belt vision transformer(ViT) self and cross attention
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
9
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
基于压电可程控滤波放大电路的线阵列流量测量
10
作者 裴锐 贾丹平 +1 位作者 武胜 刘博 《现代电子技术》 北大核心 2025年第23期155-161,共7页
为了更好地实现线阵列流量测量,采用均匀线阵列压电传感器测量管道流量信号,通过分析介质湍流漩涡的频率滤波和幅值放大要求,文中提出一种使用数字电位器和模拟开关调节电阻、电容值,以实现动态调理的可程控滤波放大电路。首先,介绍了T... 为了更好地实现线阵列流量测量,采用均匀线阵列压电传感器测量管道流量信号,通过分析介质湍流漩涡的频率滤波和幅值放大要求,文中提出一种使用数字电位器和模拟开关调节电阻、电容值,以实现动态调理的可程控滤波放大电路。首先,介绍了T型电阻反馈网络电荷转换电路的优点;其次,阐述了Sallen⁃key二阶低通滤波电路的调节过程;同时,说明了CR一阶高通滤波电路的滤波放大调整过程;然后,应用Multisim软件进行仿真,证明了电路设计的正确性;最后,水流量标准装置的比较实验验证了使用可程控滤波放大电路实现流量测量的可行性,说明该系统在压电传感器流量测量领域具有一定的适用性。 展开更多
关键词 压电传感器 流量测量 电荷转换 可程控滤波放大电路 T型电阻 Sallen⁃key
在线阅读 下载PDF
融合代理重加密和零知识证明的USBKey联盟链追溯系统 被引量:2
11
作者 张磊 万昕元 +3 位作者 肖超恩 王建新 邓昊东 郑玉崝 《信息安全研究》 北大核心 2025年第1期81-90,共10页
目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Ke... 目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Key可信追溯解决方案.首先,在区块链上链存储过程中引入了星际文件系统(interplanetary file system,IPFS)和代理重加密技术,为参与双方建立了一个安全、高效的信息存储机制;同时,在数据查询过程中引入了zk-SNARK零知识证明机制,对查询用户进行身份认证和确权操作,确保了追溯数据查询过程中用户身份的私密性;最后,基于上述可信追溯解决方案,利用Hyperledger Fabric分布式账本实现了一个USB Key的信息追溯原型系统.通过实验,证明了该方案切实可行,并有效地保障了USB Key追溯系统中追溯信息的保密性和真实性,以及在实现权限分配的前提下用户身份的隐私性. 展开更多
关键词 USB Key 代理重加密 零知识证明 区块链 信息追溯
在线阅读 下载PDF
A new species of the Macrophya malaisei group in Macrophya Dahlbom (Hymenoptera: Tenthredinidae) from China 被引量:1
12
作者 Zejian LI Mengmeng LIU Meicai WEI 《Entomotaxonomia》 2025年第3期301-307,共7页
A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malai... A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malaisei group is provided. 展开更多
关键词 TENTHREDINOIDEA Tenthredinine TAXONOMY key
原文传递
Nitrogen-cycling processes under long-term compound heavy metal(loids)pressure around a gold mine:Stimulation of nitrite reduction 被引量:1
13
作者 Xuesong Hu Xiaoxia Liu +1 位作者 Shuo Zhang Caihong Yu 《Journal of Environmental Sciences》 2025年第1期571-581,共11页
Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This ... Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This study aims to elucidate the response patterns of nitrogen-cycling microorganisms under long-term heavy metal(loids)exposure.The results showed that the diversity and abundance of nitrogen-cyclingmicroorganisms showed negative feedback to heavy metal(loids)concentrations.Denitrifying microorganisms were shown to be the dominant microorganisms with over 60%of relative abundance and a complex community structure including 27 phyla.Further,the key bacterial species in the denitrification process were calculated using a random forest model,where the top three key species(Pseudomonas stutzei,Sphingobium japonicum and Leifsonia rubra)were found to play a prominent role in nitrite reduction.Functional gene analysis and qPCR revealed that nirK,which is involved in nitrite reduction,significantly accumulated in the most metal-rich soil with the increase of absolute abundance of 63.86%.The experimental results confirmed that the activity of nitrite reductase(Nir)encoded by nirK in the soil was increased at high concentrations of heavy metal(loids).Partial least squares-path model identified three potential modes of nitrite reduction processes being stimulated by heavy metal(loids),the most prominent of which contributed to enhanced nirK abundance and soil Nir activity through positive stimulation of key species.The results provide new insights and preliminary evidence on the stimulation of nitrite reduction processes by heavy metal(loids). 展开更多
关键词 N cycle Nitrite reduction Nitrite reductase METAGENOME Key species
原文传递
MG-SLAM: RGB-D SLAM Based on Semantic Segmentation for Dynamic Environment in the Internet of Vehicles 被引量:1
14
作者 Fengju Zhang Kai Zhu 《Computers, Materials & Continua》 2025年第2期2353-2372,共20页
The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology play... The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2, MG-SLAM incorporates a dynamic target detection process that enables the detection of both known and unknown moving objects. In this process, a separate semantic segmentation thread is required to segment dynamic target instances, and the Mask R-CNN algorithm is applied on the Graphics Processing Unit (GPU) to accelerate segmentation. To reduce computational cost, only key frames are segmented to identify known dynamic objects. Additionally, a multi-view geometry method is adopted to detect unknown moving objects. The results demonstrate that MG-SLAM achieves higher precision, with an improvement from 0.2730 m to 0.0135 m in precision. Moreover, the processing time required by MG-SLAM is significantly reduced compared to other dynamic scene SLAM algorithms, which illustrates its efficacy in locating objects in dynamic scenes. 展开更多
关键词 Visual SLAM dynamic scene semantic segmentation GPU acceleration key segmentation frame
在线阅读 下载PDF
High-resolution direct magnetic resonance imaging fistulography with hydrogen peroxide for diagnosing anorectal fistula: A preliminary retrospective study 被引量:1
15
作者 Can-Can Chang Long-Hu Qiao +5 位作者 Zhen-Qi Zhang Xiao Tian Yu Zhang Wen-Wen Cheng Xia Wang Qing Yang 《World Journal of Radiology》 2025年第1期32-40,共9页
BACKGROUND Fistula-in-ano is an abnormal tunnel formation linking the anal canal with the perineum and perianal skin.Multiple imagining methods are available to evaluate it,among which magnetic resonance imaging(MRI)i... BACKGROUND Fistula-in-ano is an abnormal tunnel formation linking the anal canal with the perineum and perianal skin.Multiple imagining methods are available to evaluate it,among which magnetic resonance imaging(MRI)is the most advanced nonin-vasive preoperative method.However,it is limited in its visualization function.AIM To investigate the use of intraluminal MRI for perianal fistulas via a novel direct MRI fistulography method.METHODS We mixed 3%hydrogen peroxide(HP)with gadolinium for HPMRI fistulogra-phy,retrospectively analyzing 60 cases of complex/recurrent fistula-in-ano using physical examination,trans-perineal ultrasonography(TPUS),low-spatial-reso-lution MRI,and high-resolution direct HPMRI fistulography.We assessed detec-tion rates of fistula tracks,internal openings,their relationship with anal sphinc-ters,and perianal abscesses using statistical analyses,including interobserver agreement(Kappa statistic),and compared results with intraoperative findings.RESULTS Surgical confirmation in 60 cases showed that high-resolution direct HPMRI fis-tulography provided superior detection rates for internal openings(153)and fistula tracks(162)compared to physical exams,TPUS,and low-spatial-resolution MRI(Z>5.7,P<0.05).The effectiveness of physical examination and TPUS was also inferior to that of our method for detecting perianal abscesses(54)(Z=6.773,3.694,P<0.05),whereas that of low-spatial-resolution MRI was not significantly different(Z=1.851,P=0.06).High-resolution direct HPMRI fistulography also achieved the highest interobserver agreement(Kappa:0.89,0.85,and 0.80),while low-spatial-resolution MRI showed moderate agreement(Kappa:0.78,0.74,and 0.69).TPUS and physical examination had lower agreement(Kappa range:0.33-0.63).CONCLUSION High-resolution direct HPMRI fistulography enhances the visualization of recurrent and complex fistula-in-ano,including branched fistulas,allowing for precise planning and improved surgical outcomes. 展开更多
关键词 Key fistula-in-ano Magnetic resonance imaging Hydrogen peroxide Perianal abscess Fistulography
暂未订购
数字签名技术在铁路行业的应用研究 被引量:1
16
作者 陈斌 饶伟 +2 位作者 王冰 高丹 马建 《铁道通信信号》 2025年第5期8-15,共8页
为满足《中华人民共和国电子签名法》、信息安全等级保护制度和铁路网络数据安全管理办法的要求,需使用基于商用密码的数字签名技术,以保障铁路信息系统网上用户身份的真实性、业务数据传输的完整性和业务操作的不可抵赖性。分析铁路信... 为满足《中华人民共和国电子签名法》、信息安全等级保护制度和铁路网络数据安全管理办法的要求,需使用基于商用密码的数字签名技术,以保障铁路信息系统网上用户身份的真实性、业务数据传输的完整性和业务操作的不可抵赖性。分析铁路信息化发展过程中铁路办公信息系统、电子商务、工程管理和电子招投标存在的数据安全问题,以及数字签名技术在铁路行业的典型应用场景;重点研究基于USB接口形态的智能密码钥匙(USB Key)的数字签名和基于协同签名机制的移动数字签名的技术原理,及其在铁路办公信息系统和货运95306系统的具体应用;介绍数字签名技术在货运单据无纸化和电子招投标中的应用价值和效果。应用效果表明:数字签名技术在保障铁路信息安全、推动铁路行业的数字化转型和发展方面发挥了重要作用。 展开更多
关键词 数字签名 数据安全 商用密码 USB Key 协同签名
在线阅读 下载PDF
Aerodynamic uplift force improvement in single-strip high-speed pantograph via key parameter regulation with mechanism investigation 被引量:1
17
作者 Yafeng Zou Xianghong Xu +2 位作者 Rui Zhou Zichen Liu Liming Lin 《Theoretical & Applied Mechanics Letters》 2025年第4期378-387,共10页
This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to... This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%. 展开更多
关键词 High-speed pantograph Aerodynamic uplift force Key parameter regulation Numerical simulation
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
18
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor Networks Internet of Things Key technologies Application fields
在线阅读 下载PDF
YOLO-based lightweight traffic sign detection algorithm and mobile deployment 被引量:1
19
作者 WU Yaqin ZHANG Tao +2 位作者 NIU Jianjun CHANG Yan LIU Ganjun 《Optoelectronics Letters》 2025年第4期249-256,共8页
This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolu... This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS). 展开更多
关键词 c f layer simple attention module simam reduce complexity traffic sign detection prioritize key features backbone networkemploying classification backbone networknextthe
原文传递
Optimizing Fine-Tuning in Quantized Language Models:An In-Depth Analysis of Key Variables
20
作者 Ao Shen Zhiquan Lai +1 位作者 Dongsheng Li Xiaoyu Hu 《Computers, Materials & Continua》 SCIE EI 2025年第1期307-325,共19页
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci... Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments. 展开更多
关键词 Large-scale Language Model Parameter-Efficient Fine-Tuning parameter quantization key variable trainable parameters experimental analysis
在线阅读 下载PDF
上一页 1 2 124 下一页 到第
使用帮助 返回顶部