期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
Computational Evaluation of Selectivity of Triazole-and Amide-Based Drug Candidates, Flavanone Derivatives and Synthesized Steroid Compounds for Treatment of Diabetes Type II
1
作者 Hong-Phuc N. Nguyen Diem-Trang T. Tran +1 位作者 Thanh N. Truong Ly Le 《Journal of Life Sciences》 2012年第11期1277-1284,共8页
Inhibition of 11βHSD1 (11-beta-hydroxysteroid dehydrogenase 1) is a promising strategy in drug treatment of diabetes. Several 11βHSDI inhibitors have been proposed; however, their selectivity to 11βHSD1 over its ... Inhibition of 11βHSD1 (11-beta-hydroxysteroid dehydrogenase 1) is a promising strategy in drug treatment of diabetes. Several 11βHSDI inhibitors have been proposed; however, their selectivity to 11βHSD1 over its isozyme 11βHSD2 (11-beta-hydroxysteroid dehydrogenase 2) has not been fully reported. The authors sought to provide a short list of top potent and selective compounds along with their detailed binding modes and pharmacophore models, Molecular docking was used for initial screening of a set of 23 potent inhibitors reported by previous experimental studies. After that, selected promising entries were reassessed by molecular dynamics simulations, followed by hydrogen bond analysis. Pharmacophore models of all drug candidates and binding modes of some selected drugs were analyzed. Among the 23 compounds, only four inhibitors were identified as potent and selective drug candidates. Binding energies, 3D pharmacophores and binding modes of the four compounds with 11βHSDI are also discussed in detail in this study. 展开更多
关键词 11-β-hydroxysteroid dehydrogenase INHIBITORS binding mode pharmacophore models.
在线阅读 下载PDF
Influence of Tropical Cyclone Landfalls on Spatiotemporal Variations in Typhoon Season Rainfall over South China 被引量:9
2
作者 Min-Hee LEE Chang-Hoi HO Joo-Hong KIM 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2010年第2期443-454,共12页
This study examined the impact of tropical cyclone (TC) landfalls on the spatiotemporal variations in the rainfall over South China for the period 1957–2005. The target region was selected to show the noteworthy cont... This study examined the impact of tropical cyclone (TC) landfalls on the spatiotemporal variations in the rainfall over South China for the period 1957–2005. The target region was selected to show the noteworthy contribution of TC landfalls to the total rainfall during the typhoon season (July–October). Two prevailing spatial variations in the rainfall were obtained from an EOF analysis. The first EOF mode displays singlesign variability over South China with an explained variance of 23.4%. The associated time series of this mode fluctuates on a decadal timescale and was found to be correlated with TC genesis in the South China Sea. The second EOF mode shows a seesaw pattern between Hainan Island/Guangdong Province and the remaining regions with an explained variance of 11.4%. This seesaw pattern results from an anti-correlation in seasonal TC landfalls between the two regions, which was found in previous studies. This is related to the strengthening (weakening) of the upper tropospheric jets and the corresponding development of a massive anticyclonic (cyclonic) circulation over East Asia. The EOF analysis was also conducted using just the data for rainfall caused by landfalling TCs. This revealed that the first EOF mode using just the TC-induced rainfall is nearly identical to the second mode from the total rainfall. The obvious seesaw pattern of the first mode when employing just the TC-induced rainfall in the EOF analysis implies that this pattern has larger temporal variability than the single-signed pattern (i.e., the first EOF mode using the total rainfall) in terms of TC landfalls. This study suggests that TC landfalls over South China and the accompanying rainfall significantly modulate the spatial variation of the typhoon season rainfall there. 展开更多
关键词 RAINFALL tropical cyclone South China typhoon season
在线阅读 下载PDF
Deep learning:Applications,architectures,models,tools,and frameworks:A comprehensive survey 被引量:12
3
作者 Mehdi Gheisari Fereshteh Ebrahimzadeh +8 位作者 Mohamadtaghi Rahimi Mahdieh Moazzamigodarzi Yang Liu Pijush Kanti Dutta Pramanik Mohammad Ali Heravi Abolfazl Mehbodniya Mustafa Ghaderzadeh Mohammad Reza Feylizadeh Saeed Kosari 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期581-606,共26页
Deep Learning(DL)is a subfield of machine learning that significantly impacts extracting new knowledge.By using DL,the extraction of advanced data representations and knowledge can be made possible.Highly effective DL... Deep Learning(DL)is a subfield of machine learning that significantly impacts extracting new knowledge.By using DL,the extraction of advanced data representations and knowledge can be made possible.Highly effective DL techniques help to find more hidden knowledge.Deep learning has a promising future due to its great performance and accuracy.We need to understand the fundamentals and the state‐of‐the‐art of DL to leverage it effectively.A survey on DL ways,advantages,drawbacks,architectures,and methods to have a straightforward and clear understanding of it from different views is explained in the paper.Moreover,the existing related methods are compared with each other,and the application of DL is described in some applications,such as medical image analysis,handwriting recognition,and so on. 展开更多
关键词 data mining data privacy deep learning
在线阅读 下载PDF
Retrieval of Outgoing Longwave Radiation from COMS Narrowband Infrared Imagery 被引量:1
4
作者 Myung-Sook PARK Chang-Hoi HO +1 位作者 Heeje CHO Yong-Sang CHOI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2015年第3期375-388,共14页
Hourly outgoing longwave radiation (OLR) from the geostationary satellite Communication Oceanography Meteorological Satellite (COMS) has been retrieved since June 2010.The COMS OLR retrieval algorithms are based o... Hourly outgoing longwave radiation (OLR) from the geostationary satellite Communication Oceanography Meteorological Satellite (COMS) has been retrieved since June 2010.The COMS OLR retrieval algorithms are based on regression analyses of radiative transfer simulations for spectral functions of COMS infrared channels.This study documents the accuracies of OLRs for future climate applications by making an intercomparison of four OLRs from one single-channel algorithm (OLR12.0 using the 12.0 μm channel) and three multiple-channel algorithms (OLR10.8+12.0 using the 10.8 and 12.0 pm channels; OLR6.7+10.8 using the 6.7 and 10.8 μm channels; and OLRAll using the 6.7,10.8,and 12.0 μm channels).The COMS OLRs from these algorithms were validated with direct measurements of OLR from a broadband radiometer of the Clouds and Earth's Radiant Energy System (CERES) over the full COMS field of view [roughly (50°S-50°N,70°-170°E)] during April 2011.Validation results show that the root-mean-square errors of COMS OLRs are 5-7 W m-2,which indicates good agreement with CERES OLR over the vast domain.OLR6.7+10.8 and OLRAll have much smaller errors (~ 6 W m-2) than OLR12.0 and OLR10.8+12.0 (~ 8 W m-2).Moreover,the small errors of OLR6.7+10.8 and OLRAll are systematic and can be readily reduced through additional mean bias correction and/or radiance calibration.These results indicate a noteworthy role of the 6.7 μm water vapor absorption channel in improving the accuracy of the OLRs.The dependence of the accuracy of COMS OLRs on various surface,atmospheric,and observational conditions is also discussed. 展开更多
关键词 outgoing longwave radiation Communication Oceanography and Meteorological Satellite Cloud and Earth's Radiant Energy System
在线阅读 下载PDF
PROJECTION BASED STATISTICAL FEATURE EXTRACTION WITH MULTISPECTRAL IMAGES AND ITS APPLICATIONS ON THE YELLOW RIVER MAINSTREAM LINE DETECTION 被引量:1
5
作者 Zhang Yanning Zhang Haichao +2 位作者 Duan Feng Liu Xuegong Han Lin 《Journal of Electronics(China)》 2009年第3期359-365,共7页
Mainstream line is significant for the Yellow River situation forecasting and flood control.An effective statistical feature extraction method is proposed in this paper.In this method, a between-class scattering matri... Mainstream line is significant for the Yellow River situation forecasting and flood control.An effective statistical feature extraction method is proposed in this paper.In this method, a between-class scattering matrix based projection algorithm is performed to maximize between-class differences, obtaining effective component for classification;then high-order statistics are utilized as the features to describe the mainstream line in the principal component obtained.Experiments are performed to verify the applicability of the algorithm.The results both on synthesized and real scenes indicate that this approach could extract the mainstream line of the Yellow River automatically, and has a high precision in mainstream line detection. 展开更多
关键词 Mainstream line PROJECTION Between-class scatter matrix High-order statistics SKEWNESS
在线阅读 下载PDF
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK 被引量:2
6
作者 Hailin Chen Gang Xu +5 位作者 Yuling Chen Xiubo Chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li 《Journal of Quantum Computing》 2020年第1期57-83,共27页
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitab... Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitably brings the issues with respect to data privacy and operating performance.In this paper,we proposed a novel blockchain scheme called Cipherchain,which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed.Specifically in our scheme,transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search(mPECK),and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger.By introducing execution-consensus-update paradigm of transaction flow,Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext,but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work.In addition,Cipherchain is a promising scheme to realize the technology combination of“blockchain+cloud computing”and“permissioned blockchain+public blockchain”. 展开更多
关键词 Blockchain Cipherchain cloud computing mPECK
在线阅读 下载PDF
Analysis and Forecasting COVID-19 Outbreak in Pakistan Using Decomposition and Ensemble Model
7
作者 Xiaoli Qiang Muhammad Aamir +3 位作者 Muhammad Naeem Shaukat Ali Adnan Aslam Zehui Shao 《Computers, Materials & Continua》 SCIE EI 2021年第7期841-856,共16页
COVID-19 has caused severe health complications and produced a substantial adverse economic impact around the world.Forecasting the trend of COVID-19 infections could help in executing policies to effectively reduce t... COVID-19 has caused severe health complications and produced a substantial adverse economic impact around the world.Forecasting the trend of COVID-19 infections could help in executing policies to effectively reduce the number of new cases.In this study,we apply the decomposition and ensemble model to forecast COVID-19 confirmed cases,deaths,and recoveries in Pakistan for the upcoming month until the end of July.For the decomposition of data,the Ensemble Empirical Mode Decomposition(EEMD)technique is applied.EEMD decomposes the data into small components,called Intrinsic Mode Functions(IMFs).For individual IMFs modelling,we use the Autoregressive Integrated Moving Average(ARIMA)model.The data used in this study is obtained from the official website of Pakistan that is publicly available and designated for COVID-19 outbreak with daily updates.Our analyses reveal that the number of recoveries,new cases,and deaths are increasing in Pakistan exponentially.Based on the selected EEMD-ARIMA model,the new confirmed cases are expected to rise from 213,470 to 311,454 by 31 July 2020,which is an increase of almost 1.46 times with a 95%prediction interval of 246,529 to 376,379.The 95%prediction interval for recovery is 162,414 to 224,579,with an increase of almost two times in total from 100802 to 193495 by 31 July 2020.On the other hand,the deaths are expected to increase from 4395 to 6751,which is almost 1.54 times,with a 95%prediction interval of 5617 to 7885.Thus,the COVID-19 forecasting results of Pakistan are alarming for the next month until 31 July 2020.They also confirm that the EEMD-ARIMA model is useful for the short-term forecasting of COVID-19,and that it is capable of keeping track of the real COVID-19 data in nearly all scenarios.The decomposition and ensemble strategy can be useful to help decision-makers in developing short-term strategies about the current number of disease occurrences until an appropriate vaccine is developed. 展开更多
关键词 ANALYSIS ARIMA COVID-19 decomposition and ensemble model forecasting
在线阅读 下载PDF
Development and Application of a Distributed Conceptual Hydrological Model to Simulate Runoff in the Be River Basin and the Water Transfer Capacity to the Saigon River Basin,Vietnam
8
作者 Vu Van Nghi Ha Bui Nguyen Lam +1 位作者 Tai Pham Anh Can Thu Van 《Journal of Environmental Science and Engineering(A)》 2020年第1期1-12,共12页
A distributed conceptual model(FRASC(Flow Routed Accumulation Simulation in a Catchment))has been developed,in which a rainfall-runoff module is modified from an original lumped conceptual model(Xinanjiang)via a GIS(G... A distributed conceptual model(FRASC(Flow Routed Accumulation Simulation in a Catchment))has been developed,in which a rainfall-runoff module is modified from an original lumped conceptual model(Xinanjiang)via a GIS(Geographic Information System)-aided approach and a water allocation module contains reservoirs,water users and hydropower plants.The model is relatively easy to use and can easily obtain input data,but still has the ability to generate hydrological information at many points within a catchment.The model application to the Be River basin is evaluated and shows to be reliable in terms of close agreements between simulated and observed series.Daily natural flow rates for 36 years are simulated at 7,981 grid cells within a studied area of 7,650 km^2.Based on this simulated database,design discharges are predicted in various probabilities.Finally,the research determines that the water transfer capacity from the Be River basin to the Saigon River basin reaches 14%,18% and 23% of a planned value of 75 m^3/s during the dry period in a wet year(P10%),average year(P50%)and dry year(P90%),respectively. 展开更多
关键词 BE River basin DISTRIBUTED CONCEPTUAL HYDROLOGICAL model FRASC
在线阅读 下载PDF
Analysing Traffic Flow and Traffic Hotspots from Historic and Real-Time GPS Data
9
作者 Christopher Bartolo Thiago Matos Pinto 《通讯和计算机(中英文版)》 2015年第6期318-325,共8页
关键词 交通流分析 数据分析 历史 实时 数据采集方法 全球定位系统 道路网络 数据收集
在线阅读 下载PDF
Minimum-area Ellipse with Three Non-collinear Points and Its Application in Parametric Interpolation
10
作者 ZHAO Yu-an ZHANG Cai-ming ZHOU Yuan-feng 《Computer Aided Drafting,Design and Manufacturing》 2013年第2期25-28,共4页
The problem of determining a minimum-area ellipse through three non-collinear points is discussed in this paper. We give the proof and construction of the minimum-area ellipse through three non-collinear points from t... The problem of determining a minimum-area ellipse through three non-collinear points is discussed in this paper. We give the proof and construction of the minimum-area ellipse through three non-collinear points from the geometric point of view, and present a new method of determining knots. This method replaces the chord length, which is closer to the arc length of the mini- mum-area ellipse with arc length, and avoids the occurrence of 'oscillation' and 'loops'. We compare the new method with the uni- form method, chord length method and the centripetal method. The comparison is performed on the quality of cubic spline curves using these methods. In most cases, the result of our method is better than others. 展开更多
关键词 PARAMETERIZATION minimum-area ellipse INTERPOLATION
在线阅读 下载PDF
Analysis of Maximum PowerPoint Tracking (MPPT) Adaptability in Inverters of the Three-Phase Photovoltaic Systems Integrated into the Electrical Grid of Congo-Brazzaville
11
作者 Rostand Martialy Davy Loembe Souamy Mavie Grace Mimiesse +4 位作者 Brel Levallois Ndzah Yombi Zonzolo   Guoping Jiang Wanghong Hua Xubao Wen 《Journal of Power and Energy Engineering》 2024年第11期125-152,共28页
This paper investigates the adaptability of Maximum Power Point Tracking (MPPT) algorithms in single-stage three-phase photovoltaic (PV) systems connected to the grid of Congo-Brazzaville and compares the attributes o... This paper investigates the adaptability of Maximum Power Point Tracking (MPPT) algorithms in single-stage three-phase photovoltaic (PV) systems connected to the grid of Congo-Brazzaville and compares the attributes of various conventional, significance and novelty of controller system of the proposed of method and improved Incremental Conductance algorithms, Perturbation and Observation Techniques, and other Maximum Power Point Tracking (MPPT) algorithms in normal and partial shading conditions. Performance evaluation techniques are discussed on the basis of the dynamic parameters of the PV system although the control of this structure is relatively advanced technology but the conversion efficiency is difficult to improve due to increase in transformation series. The single stage topology has a simple topology with high reliability and efficiency because of high power consumption, but control algorithm is more complex because of its power convert main circuit a new strategy is being developed. This paper describes a method for maximum power point tracking (MPPT) in the single-stage and three single-phase PV grid-connected system. In the paper, the nonlinear output characteristics of the PV including I-V & P-V are obtained in changed solar insulations or temperature based on MATLAB, and the MPPT algorithm which is based on the P & O algorithm method, compared with Incremental Conductance, is also described, a dimensioning of the impedance adapter for better stabilization. A comparison SPWM and SVPWM control methods in the case of a grid connection applied to the electrical grid of Republic of Congo and their influences on the dynamic performance of the system and their impact in reducing the harmonic rate for better injection into the grid. The simulation model of three single-phase PV grid-connected system is built, and simulation results show the MPPT algorithm has excellent dynamic and static performances, which verifies the Incremental Conductance is effective for MPPT in the single-stage and three single-phase PV grid-connected system. 展开更多
关键词 Photovoltaic Array CONGO Maximum Power Point Tracking Perturbation Observation Incremental Conductance Partial Shading Conditions Performance Evaluation State Flow
在线阅读 下载PDF
AutoLDP:An accurate and efficient artificial intelligence-based tool for automatic labeling of digital pathology
12
作者 Yingnan Zhao Huifen Ye +9 位作者 Jing Yang Su Yao Maohua Lv Zhihong Chen Yunrui Ye Qingru Hu Cheng Lu Zaiyi Liu Ke Zhao Zhihua Chen 《EngMedicine》 2025年第1期35-43,共9页
Background:Whole-slide image(WSI)is foundational for artificial intelligence in tumor diagnosis,treatment planning,and prognosis prediction.Efficient management of WSI labels is crucial for clinical digitalization;how... Background:Whole-slide image(WSI)is foundational for artificial intelligence in tumor diagnosis,treatment planning,and prognosis prediction.Efficient management of WSI labels is crucial for clinical digitalization;however,manual or semiautomatic methods limit scalability.Enhancing automatic pathological label recognition is critical to advancing digital pathology,improving efficiency,and drive precision oncology.Methods:We developed Auto LDP,a method for automatic labeling of digital pathology,which identifies textual information used for labeling slides.The method includes four steps:identifying text position using the CRAFT model,recognizing text content using the ParSeq model,identifying slice type using the ConvNext classifier,and combining relevant information to generate a new name.The naming format is divided into four parts:pathology ID,wax block ID,staining type,and slice type.We used the accuracy and processing time to validate our method using two validation sets.Results:The AutoLDP system was 20 times faster than manual labeling.The files per minute in the solid-state drives of CRAFT t ParSeq were the highest among all methods at 136.95 in validation set 1 and 170.95 in validation set 2.We compared the proposed model with several commonly used text detection and recognition models including ABinet,CRNN,TRBA,and Vitstr.The results show that we achieved an accuracy of 97.60%in just 87.62 s in validation set 1 with 200 cases,which was significantly better than that of the other models.In addition,the accuracy reached 96.98% in validation set 2 with 13,667 cases,confirming the generalization ability of the model.Conclusion:In this study,we proposed a new model,AutoLDP,automates the extraction and recognition of key information from WSI,enabling standardized naming,and significantly improving labeling efficiency.This innovation supports the digital transformation of pathology and advances precision medicine. 展开更多
关键词 Digital pathology Whole slide image AutoLDP Precision oncology Deep learning
在线阅读 下载PDF
GrCol-PPFL:User-Based Group Collaborative Federated Learning Privacy Protection Framework 被引量:2
13
作者 Jieren Cheng Zhenhao Liu +2 位作者 Yiming Shi Ping Luo Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1923-1939,共17页
With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal p... With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal privacy data,federated learning(FL)uses data stored on edge devices to realize training tasks by contributing training model parameters without revealing the original data.However,since FL can still leak the user’s original data by exchanging gradient information.The existing privacy protection strategy will increase the uplink time due to encryption measures.It is a huge challenge in terms of communication.When there are a large number of devices,the privacy protection cost of the system is higher.Based on these issues,we propose a privacy-preserving scheme of user-based group collaborative federated learning(GrCol-PPFL).Our scheme primarily divides participants into several groups and each group communicates in a chained transmission mechanism.All groups work in parallel at the same time.The server distributes a random parameter with the same dimension as the model parameter for each participant as a mask for the model parameter.We use the public datasets of modified national institute of standards and technology database(MNIST)to test the model accuracy.The experimental results show that GrCol-PPFL not only ensures the accuracy of themodel,but also ensures the security of the user’s original data when users collude with each other.Finally,through numerical experiments,we show that by changing the number of groups,we can find the optimal number of groups that reduces the uplink consumption time. 展开更多
关键词 Federated learning privacy protection uplink consumption time
在线阅读 下载PDF
Communication Resource Planning Algorithm Based on Time Triggered DIMA Architecture 被引量:1
14
作者 Hongchun Wang Buqun Luan Wensheng Niu 《Journal of Beijing Institute of Technology》 EI CAS 2019年第2期327-335,共9页
Traditional scheduling algorithms for avionics communication have the shortcoming of messages accumulation,the efficiency and reliability of the service can be improved by combining the distributed integrated modular ... Traditional scheduling algorithms for avionics communication have the shortcoming of messages accumulation,the efficiency and reliability of the service can be improved by combining the distributed integrated modular avionics(DIMA)system with a time trigger mechanism.To further improve the utilization of system resources,the static scheduling algorithm of time triggered service is studied.By making the time trigger message schedule dispersedly,the stabilities of both the available time slots for the event triggered messages and the system will be improved.An improved two-dimensional bin packing algorithm is also presented to achieve the above-mentioned purpose with an extra benefit of better delay performance. 展开更多
关键词 distributed integrated MODULAR AVIONICS TIME-TRIGGERED two-dimensional BIN PACKING ALGORITHM
在线阅读 下载PDF
Tire Defect Detection on Impurities 被引量:3
15
作者 ZHANG Mao-qiang GUO Qiang YANG Xingqiang 《Computer Aided Drafting,Design and Manufacturing》 2014年第1期32-35,共4页
According to X-ray image texture tire characteristics and abnormal distribution of the gray area, this paper studies a real-time defect detection method about the sidewall of tire. On the basis of the texture distribu... According to X-ray image texture tire characteristics and abnormal distribution of the gray area, this paper studies a real-time defect detection method about the sidewall of tire. On the basis of the texture distribution characteristics of X-ray tire, we extract the cord information of the tire image by maximizing the distance of the categories after the gray value correction, then we use the morphology method and statistics method to process the image so that we can get the location and the size of impurities. We can classify the tires into different grades by the information. Compared with other methods, our method has the advantage that meets the needs of tire industry. 展开更多
关键词 tire defect gray correction image segmentation morphology
在线阅读 下载PDF
FedDAA:a robust federated learning framework to protect privacy and defend against adversarial attack 被引量:2
16
作者 Shiwei LU Ruihu LI Wenbin LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第2期107-122,共16页
Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial intelligence.However,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the subm... Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial intelligence.However,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the submitted gradient,which threatens the fundamental privacy of FL.Although cryptology and differential privacy prevent privacy leakage from gradient,they bring negative effect on communication overhead or model performance.Moreover,the original distribution of local gradient has been changed in these schemes,which makes it difficult to defend against adversarial attack.In this paper,we propose a novel federated learning framework with model decomposition,aggregation and assembling(FedDAA),along with a training algorithm,to train federated model,where local gradient is decomposed into multiple blocks and sent to different proxy servers to complete aggregation.To bring better privacy protection performance to FedDAA,an indicator is designed based on image structural similarity to measure privacy leakage under DLG attack and an optimization method is given to protect privacy with the least proxy servers.In addition,we give defense schemes against adversarial attack in FedDAA and design an algorithm to verify the correctness of aggregated results.Experimental results demonstrate that FedDAA can reduce the structural similarity between the reconstructed image and the original image to 0.014 and remain model convergence accuracy as 0.952,thus having the best privacy protection performance and model training effect.More importantly,defense schemes against adversarial attack are compatible with privacy protection in FedDAA and the defense effects are not weaker than those in the traditional FL.Moreover,verification algorithm of aggregation results brings about negligible overhead to FedDAA. 展开更多
关键词 federated learning privacy protection adversarial attacks aggregated rule correctness verification
原文传递
Efficient Priority Packet Recovery Based on Network Coding in DVB-IPDC System
17
作者 WANG Lian PENG Daiyuan LIANG Hongbin 《China Communications》 SCIE CSCD 2015年第7期167-178,共12页
In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on... In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on the dynamic information updating, which can find the current most effective complete decoding packet. ECDR-NC can not only avoid the redundant encoding packets due to the overlapping among encoding packets, but also reduce the computational complexity compared with the traditional encoding schemes. Furthermore, the retransmission upper bound of ECDR-NC is fully controlled. In time-sensitive applications, to maximize the aggregate number of recovery packets while minimizing the total number of discarded packets due to the time limit according to the priority preference, the adaptive priority scheme EPNC is formulized, and the weighted relation graph is constructed to find the maximum-weighted encoding packets sequence according to the decoding gains. In the same network environment, the performances comparisons between PNC and EPNC show that EPNC is more efficient and more rational, and the average discarded packets ratios ofEPNC can be reduced about 18%~27%. The main contributions of this paper are an effective retransmission encoding packet selection algorithm ECDR-NC proposed, and a new adaptive priority recovery scheme EPNC introduced into DVB-IPDC system. 展开更多
关键词 digital video broadcasting(DVB) RETRANSMISSION network coding(NC) longterm evolution(LTE) wireless network
在线阅读 下载PDF
A Resource-Fair Protocol for Two-Party Coin Toss
18
作者 RUAN Ou ZHOU Jing +1 位作者 CUI Guohua CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期254-258,共5页
Coin-flipping protocols allow mutually distrustful parties to generate a random bit with uniform distribution.Minimizing bias and keeping fairness are two key requirements in designing such protocols.However,the best ... Coin-flipping protocols allow mutually distrustful parties to generate a random bit with uniform distribution.Minimizing bias and keeping fairness are two key requirements in designing such protocols.However,the best previously known fair coin-flipping protocol only guarantees with bias Ο(1 /r).In the paper,we introduce a new approach for fair coin-flipping protocol construction by using Garay et al’s "resource fairness" technique and propose a resource-fair two-party coin-flipping protocol according to the standard real/ideal simulation paradigm.Compared with the other coin-flipping protocols,our protocol enjoys an important advantage that its bias is 0. 展开更多
关键词 coin-flipping resource fairness secure multi-party computation
原文传递
Design and implementation of web-based dynamic geometry drawing technology
19
作者 Guan Hao Rao Yongsheng Xu Zhangtao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第6期43-53,共11页
Dynamic geometry software, as a piece of computer-assisted instruction(CAI) software, is closely and deeply associated with mathematics, and is widely applied to mathematics teaching activities in primary and secondar... Dynamic geometry software, as a piece of computer-assisted instruction(CAI) software, is closely and deeply associated with mathematics, and is widely applied to mathematics teaching activities in primary and secondary schools. Meanwhile, web technology also has become an important technology for assisting education and teaching. This paper expounds a web-based dynamic geometry software development process, and analyses specific requirements regarding graphical application programming interface(API) required by dynamic geometry software. With experiments and comparison on the two different hypertext markup language(HTML)5 graphical API technologies, i.e., scalable vector graphics(SVG) and Canvas, on different apparatuses and browsers, we draw the conclusion that it is more suitable to adopt Canvas as the graphical API technology for the web-based dynamic geometry software, thus further proposed the principles and methods for an object-oriented Canvas design. The dynamic geometry software based on the newly-designed Canvas has technical advantages and educational value, well incorporating aesthetic education into mathematics education. 展开更多
关键词 web CANVAS dynamic GEOMETRY SUBJECT tools
原文传递
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
20
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部