期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
1
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
在线阅读 下载PDF
Integrating Multiple Linear Regression and Infectious Disease Models for Predicting Information Dissemination in Social Networks
2
作者 Junchao Dong Tinghui Huang +1 位作者 Liang Min Wenyan Wang 《Journal of Electronic Research and Application》 2023年第2期20-27,共8页
Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model int... Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model integrating multiple linear regression and infectious disease model.Firstly,we proposed the features that affect social network communication from three dimensions.Then,we predicted the node influence via multiple linear regression.Lastly,we used the node influence as the state transition of the infectious disease model to predict the trend of information dissemination in social networks.The experimental results on a real social network dataset showed that the prediction results of the model are consistent with the actual information dissemination trends. 展开更多
关键词 Social networks Epidemic model Linear regression model
在线阅读 下载PDF
Teaching Reform and Practice of Statistics Courses in Big Data Management and Applications Major in the Context of New Quality Productivity
3
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2025年第2期23-31,共9页
In the new era,the impact of emerging productive forces has permeated every sector of industry.As the core production factor of these forces,data plays a pivotal role in industrial transformation and social developmen... In the new era,the impact of emerging productive forces has permeated every sector of industry.As the core production factor of these forces,data plays a pivotal role in industrial transformation and social development.Consequently,many domestic universities have introduced majors or courses related to big data.Among these,the Big Data Management and Applications major stands out for its interdisciplinary approach and emphasis on practical skills.However,as an emerging field,it has not yet accumulated a robust foundation in teaching theory and practice.Current instructional practices face issues such as unclear training objectives,inconsistent teaching methods and course content,insufficient integration of practical components,and a shortage of qualified faculty-factors that hinder both the development of the major and the overall quality of education.Taking the statistics course within the Big Data Management and Applications major as an example,this paper examines the challenges faced by statistics education in the context of emerging productive forces and proposes corresponding improvement measures.By introducing innovative teaching concepts and strategies,the teaching system for professional courses is optimized,and authentic classroom scenarios are recreated through illustrative examples.Questionnaire surveys and statistical analyses of data collected before and after the teaching reforms indicate that the curriculum changes effectively enhance instructional outcomes,promote the development of the major,and improve the quality of talent cultivation. 展开更多
关键词 New quality productivity Big data Compound talents Statistics course Teaching examples
在线阅读 下载PDF
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
4
作者 Zheng Qingan Meng Jialin +2 位作者 Wu Junjie Li Jingtao Lin Haonan 《China Communications》 2025年第4期143-160,共18页
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system. 展开更多
关键词 access control authentication Hyperledger Fabric security audit state secret algorithm
在线阅读 下载PDF
Multi-manufacturer drug identification based on near infrared spectroscopy and deep transfer learning 被引量:4
5
作者 Lingqiao Li Xipeng Pan +5 位作者 Wenli Chen Manman Wei Yanchun Feng Lihui Yin Changqin Hu Huihua Yang 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2020年第4期39-50,共12页
Near infrared(NIR)spectrum analysis technology has outstanding advantages such as rapid,nondestructive,pollution-free,and is widely used in food,pharmaceutical,petrochemical,agricultural products production and testin... Near infrared(NIR)spectrum analysis technology has outstanding advantages such as rapid,nondestructive,pollution-free,and is widely used in food,pharmaceutical,petrochemical,agricultural products production and testing industries.Convolutional neural network(CNN)is one of the most successful methods in big data analysis because of its powerful feature ex-traction and abstraction ability,and it is especially suitable for solving multi-classification problems.CNN-based transfer learning is a machine learning technique,which migrates para-meters of trained model to the new one to improve the performance.The transfer learning strategy can speed up the learning efficiency of the model instead of learning from scratch.In view of the difficulty in acquisition of drug NIR spectral data and high labeling cost,this paper proposes three simple but very effective transfer learning methods for multi-manufacturer identification of drugs based on one-dimensional CNN.Compared with the original CNN,the transfer learning method can achieve better classification performance with fewer NIR spectral data,which greatly reduces the dependence on labeled NIR spectral data.At the same time,this paper also compares and discusses three different transfer learning methods,and selects the most suitable transfer learning model for drug NIR spectral data analysis.Compared with the current popular methods,such as SVM,BP,AE and ELM,the proposed method achieves higher classification accuracy and scalability in multi-variety and multi-manufacturer NIR spectrum classification experiments. 展开更多
关键词 Near-infrared spectroscopy transfer learning drug identification multi-manufacturer
原文传递
Exploration and Practice of Big Data Introductory Courses for Big Data Management and Application Majors
6
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2024年第2期131-137,共7页
As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by ... As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by everyone.To this end,we discuss some of our explorations and attempts in the construction and teaching process of big data courses for the major of big data management and application from the perspective of course planning,course implementation,and course summary.After interviews with students and feedback from questionnaires,students are highly satisfied with some of the teaching measures and programs currently adopted. 展开更多
关键词 Big data management and application “Introduction to Big Data” Teaching reform Curriculum exploration
在线阅读 下载PDF
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
7
作者 Shijie Tang Yong Ding Huiyong Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期1129-1150,共22页
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and fast and accurate attack detection techniques are crucial.The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series.To address this issue,we propose an anomaly detection method based on distributed deep learning.Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the time series,which can maintain the edge of discrete features.We use a distributed linear deep learning model to establish a sequential prediction model and adjust the threshold for anomaly detection based on the prediction error of the validation set.Our method can not only detect abnormal attacks but also locate the sensors that cause anomalies.We conducted experiments on the Secure Water Treatment(SWAT)and Water Distribution(WADI)public datasets.The experimental results show that our method is superior to the baseline method in identifying the types of attacks and detecting efficiency. 展开更多
关键词 Anomaly detection CPS deep learning MLP(multi-layer perceptron)
在线阅读 下载PDF
Deep learning-based multi-task prediction of response to neoadjuvant chemotherapy using multiscale whole slide images in breast cancer:A multicenter study 被引量:1
8
作者 Qin Wang Feng Zhao +19 位作者 Haicheng Zhang Tongpeng Chu Qi Wang Xipeng Pan Yuqian Chen Heng Zhou Tiantian Zheng Ziyin Li Fan Lin Haizhu Xie Heng Ma Lan Liu Lina Zhang Qin Li Weiwei Wang Yi Dai Ruijun Tang Jigang Wang Ping Yang Ning Mao 《Chinese Journal of Cancer Research》 2025年第1期28-47,共20页
Objective:Early predicting response before neoadjuvant chemotherapy(NAC)is crucial for personalized treatment plans for locally advanced breast cancer patients.We aim to develop a multi-task model using multiscale who... Objective:Early predicting response before neoadjuvant chemotherapy(NAC)is crucial for personalized treatment plans for locally advanced breast cancer patients.We aim to develop a multi-task model using multiscale whole slide images(WSIs)features to predict the response to breast cancer NAC more finely.Methods:This work collected 1,670 whole slide images for training and validation sets,internal testing sets,external testing sets,and prospective testing sets of the weakly-supervised deep learning-based multi-task model(DLMM)in predicting treatment response and pCR to NAC.Our approach models two-by-two feature interactions across scales by employing concatenate fusion of single-scale feature representations,and controls the expressiveness of each representation via a gating-based attention mechanism.Results:In the retrospective analysis,DLMM exhibited excellent predictive performance for the prediction of treatment response,with area under the receiver operating characteristic curves(AUCs)of 0.869[95%confidence interval(95%CI):0.806−0.933]in the internal testing set and 0.841(95%CI:0.814−0.867)in the external testing sets.For the pCR prediction task,DLMM reached AUCs of 0.865(95%CI:0.763−0.964)in the internal testing and 0.821(95%CI:0.763−0.878)in the pooled external testing set.In the prospective testing study,DLMM also demonstrated favorable predictive performance,with AUCs of 0.829(95%CI:0.754−0.903)and 0.821(95%CI:0.692−0.949)in treatment response and pCR prediction,respectively.DLMM significantly outperformed the baseline models in all testing sets(P<0.05).Heatmaps were employed to interpret the decision-making basis of the model.Furthermore,it was discovered that high DLMM scores were associated with immune-related pathways and cells in the microenvironment during biological basis exploration.Conclusions:The DLMM represents a valuable tool that aids clinicians in selecting personalized treatment strategies for breast cancer patients. 展开更多
关键词 Artificial intelligence breast cancer digital pathology whole slide images
暂未订购
Optimizing AES S-Box Implementation:A SAT-Based Approach with Tower Field Representations
9
作者 Jingya Feng Ying Zhao +1 位作者 Tao Ye Wei Feng 《Computers, Materials & Continua》 2025年第4期1515-1531,共17页
The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field represen... The efficient implementation of the Advanced Encryption Standard(AES)is crucial for network data security.This paper presents novel hardware implementations of the AES S-box,a core component,using tower field representations and Boolean Satisfiability(SAT)solvers.Our research makes several significant contri-butions to the field.Firstly,we have optimized the GF(24)inversion,achieving a remarkable 31.35%area reduction(15.33 GE)compared to the best known implementations.Secondly,we have enhanced multiplication implementa-tions for transformation matrices using a SAT-method based on local solutions.This approach has yielded notable improvements,such as a 22.22%reduction in area(42.00 GE)for the top transformation matrix in GF((24)2)-type S-box implementation.Furthermore,we have proposed new implementations of GF(((22)2)2)-type and GF((24)2)-type S-boxes,with the GF(((22)2)2)-type demonstrating superior performance.This implementation offers two variants:a small area variant that sets new area records,and a fast variant that establishes new benchmarks in Area-Execution-Time(AET)and energy consumption.Our approach significantly improves upon existing S-box implementations,offering advancements in area,speed,and energy consumption.These optimizations contribute to more efficient and secure AES implementations,potentially enhancing various cryptographic applications in the field of network security. 展开更多
关键词 AES S-box SAT optimization tower field hardware implementation area efficiency energy consumption
在线阅读 下载PDF
Dynamically redactable blockchain based on decentralized Chameleon hash
10
作者 Xinzhe Huang Yujue Wang +3 位作者 Yong Ding Qianhong Wu Changsong Yang Hai Liang 《Digital Communications and Networks》 2025年第3期757-767,共11页
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai... The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment. 展开更多
关键词 Privacy protection Redactable blockchain Chameleon hash Consistency check SCALABILITY
在线阅读 下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network 被引量:2
11
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
在线阅读 下载PDF
GRSA: Service-Aware Flow Scheduling for Cloud Storage Datacenter Networks 被引量:2
12
作者 Wenlong Ke Yong Wang Miao Ye 《China Communications》 SCIE CSCD 2020年第6期164-179,共16页
The proliferation of the global datasphere has forced cloud storage systems to evolve more complex architectures for different applications.The emergence of these application session requests and system daemon service... The proliferation of the global datasphere has forced cloud storage systems to evolve more complex architectures for different applications.The emergence of these application session requests and system daemon services has created large persistent flows with diverse performance requirements that need to coexist with other types of traffic.Current routing methods such as equal-cost multipath(ECMP)and Hedera do not take into consideration specific traffic characteristics nor performance requirements,which make these methods difficult to meet the quality of service(QoS)for high-priority flows.In this paper,we tailored the best routing for different kinds of cloud storage flows as an integer programming problem and utilized grey relational analysis(GRA)to solve this optimization problem.The resulting method is a GRAbased service-aware flow scheduling(GRSA)framework that considers requested flow types and network status to select appropriate routing paths for flows in cloud storage datacenter networks.The results from experiments carried out on a real traffic trace show that the proposed GRSA method can better balance traffic loads,conserve table space and reduce the average transmission delay for high-priority flows compared to ECMP and Hedera. 展开更多
关键词 cloud storage datacenter networks flow scheduling grey relational analysis QOS SDN
在线阅读 下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles 被引量:2
13
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
在线阅读 下载PDF
Position Vectors Based Efcient Indoor Positioning System 被引量:1
14
作者 Ayesha Javed Mir Yasir Umair +3 位作者 Alina Mirza Abdul Wakeel Fazli Subhan Wazir Zada Khan 《Computers, Materials & Continua》 SCIE EI 2021年第5期1781-1799,共19页
With the advent and advancements in the wireless technologies,Wi-Fi ngerprinting-based Indoor Positioning System(IPS)has become one of the most promising solutions for localization in indoor environments.Unlike the ou... With the advent and advancements in the wireless technologies,Wi-Fi ngerprinting-based Indoor Positioning System(IPS)has become one of the most promising solutions for localization in indoor environments.Unlike the outdoor environment,the lack of line-of-sight propagation in an indoor environment keeps the interest of the researchers to develop efcient and precise positioning systems that can later be incorporated in numerous applications involving Internet of Things(IoTs)and green computing.In this paper,we have proposed a technique that combines the capabilities of multiple algorithms to overcome the complexities experienced indoors.Initially,in the database development phase,Motley Kennan propagation model is used with Hough transformation to classify,detect,and assign different attenuation factors related to the types of walls.Furthermore,important parameters for system accuracy,such as,placement and geometry of Access Points(APs)in the coverage area are also considered.New algorithm for deployment of an additional AP to an already existing infrastructure is proposed by using Genetic Algorithm(GA)coupled with Enhanced Dilution of Precision(EDOP).Moreover,classication algorithm based on k-Nearest Neighbors(k-NN)is used to nd the position of a stationary or mobile user inside the given coverage area.For k-NN to provide low localization error and reduced space dimensionality,three APs are required to be selected optimally.In this paper,we have suggested an idea to select APs based on Position Vectors(PV)as an input to the localization algorithm.Deducing from our comprehensive investigations,it is revealed that the accuracy of indoor positioning system using the proposed technique unblemished the existing solutions with signicant improvements. 展开更多
关键词 Indoor positioning systems Internet of Things access points position vectors genetic algorithm k-nearest neighbors
在线阅读 下载PDF
Minimum Cost Multi-Path Parallel Transmission with Delay Constraint by Extending Openflow 被引量:1
15
作者 Kuangyu Qin Chuanhe Huang +2 位作者 N.Ganesan Kewei Liu Xi Chen 《China Communications》 SCIE CSCD 2018年第3期15-26,共12页
Sometimes user has the requirement to run a high bandwidth application over a low bandwidth network. But its implementation is not easy as the traditional network transmits data with only one path where its bandwidth ... Sometimes user has the requirement to run a high bandwidth application over a low bandwidth network. But its implementation is not easy as the traditional network transmits data with only one path where its bandwidth is lower than the demand. Although the current network technology like SDN has the ability to precisely control the data transmission in the network, but till now the standard openflow protocol does not support splitting one flow to multiple flows. In this paper, a flow splitting algorithm is proposed. The algorithm splits a data flow to multiple sub-flows by extending the openflow protocol. A multiple paths routing algorithm is also proposed to implement the multi-path parallel transmission in the paper. The algorithm selects multiple paths and minimizes the cost of transmission under the constraint of maximum delay and delay variance. The simulations show the algorithms can significantly improve the transmission performance. 展开更多
关键词 SDN OpenFlow multi-pathtransmission
在线阅读 下载PDF
SpectraTr:A novel deep learning model for qualitative analysis of drug spectroscopy based on transformer structure
16
作者 Pengyou Fu Yue Wen +4 位作者 Yuke Zhang Lingqiao Li Yanchun Feng Lihui Yin Huihua Yang 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2022年第3期107-117,共11页
The drug supervision methods based on near-infrared spectroscopy analysis are heavily dependent on the chemometrics model which characterizes the relationship between spectral data and drug categories.The preliminary ... The drug supervision methods based on near-infrared spectroscopy analysis are heavily dependent on the chemometrics model which characterizes the relationship between spectral data and drug categories.The preliminary application of convolution neural network in spectral analysis demonstrates excellent end-to-end prediction ability,but it is sensitive to the hyper-parameters of the network.The transformer is a deep-learning model based on self-attention mechanism that compares convolutional neural networks(CNNs)in predictive performance and has an easy-todesign model structure.Hence,a novel calibration model named SpectraTr,based on the transformer structure,is proposed and used for the qualitative analysis of drug spectrum.The experimental results of seven classes of drug and 18 classes of drug show that the proposed SpectraTr model can automatically extract features from a huge number of spectra,is not dependent on pre-processing algorithms,and is insensitive to model hyperparameters.When the ratio of the training set to test set is 8:2,the prediction accuracy of the SpectraTr model reaches 100%and 99.52%,respectively,which outperforms PLS DA,SVM,SAE,and CNN.The model is also tested on a public drug data set,and achieved classification accuracy of 96.97%without preprocessing algorithm,which is 34.85%,28.28%,5.05%,and 2.73%higher than PLS DA,SVM,SAE,and CNN,respectively.The research shows that the SpectraTr model performs exceptionally well in spectral analysis and is expected to be a novel deep calibration model after Autoencoder networks(AEs)and CNN. 展开更多
关键词 Near-infrared spectroscopy analysis drug supervision transformer structure deep learning CHEMOMETRICS
原文传递
Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm
17
作者 Zhao Chen Ning Xiong +6 位作者 Yujue Wang Yong Ding Hengkui Xiang Chenjun Tang Lingang Liu Xiuqing Zou Decun Luo 《国际计算机前沿大会会议论文集》 2019年第1期238-240,共3页
Existing interference protection systems lack automatic evaluation methods to provide scientific, objective and accurate assessment results. To address this issue, this paper develops a layout scheme by geometrically ... Existing interference protection systems lack automatic evaluation methods to provide scientific, objective and accurate assessment results. To address this issue, this paper develops a layout scheme by geometrically modeling the actual scene, so that the hand-held full-band spectrum analyzer would be able to collect signal field strength values for indoor complex scenes. An improved prediction algorithm based on the K-nearest neighbor non-parametric kernel regression was proposed to predict the signal field strengths for the whole plane before and after being shield. Then the highest accuracy set of data could be picked out by comparison. The experimental results show that the improved prediction algorithm based on the K-nearest neighbor non-parametric kernel regression can scientifically and objectively predict the indoor complex scenes’ signal strength and evaluate the interference protection with high accuracy. 展开更多
关键词 INTERFERENCE protection K-nearest NEIGHBOR algorithm NON-PARAMETRIC KERNEL regression SIGNAL field STRENGTH
在线阅读 下载PDF
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds
18
作者 Meng Zhao Yong Ding +3 位作者 Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu 《国际计算机前沿大会会议论文集》 2019年第1期342-345,共4页
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ... The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof. 展开更多
关键词 Cloud STORAGE INTEGRITY AUDITING Provable Data POSSESSION PROOFS of STORAGE PROOFS of Retrievability
在线阅读 下载PDF
Prediction of Online Consumers’Repeat Purchase Behavior via BERT-MLP Model
19
作者 Junchao Dong Tinghui Huang +1 位作者 Liang Min Wenyan Wang 《Journal of Electronic Research and Application》 2022年第3期12-19,共8页
It is an effective means for merchants to carry out precision marketing and improve ROI by using historical user behavior data obtained from promotional activities in order to build a model to predict the repeat purch... It is an effective means for merchants to carry out precision marketing and improve ROI by using historical user behavior data obtained from promotional activities in order to build a model to predict the repeat purchase behavior of users after promotional activities.Most of the existing prediction models are supervised learning,which does not work well with a small amount of labeled data.This paper proposes a BERT-MLP prediction model that uses“large-scale data unsupervised pre-training+small amount of labeled data fine-tuning.”The experimental results on Alibaba real dataset show that the accuracy of the BERT-MLP model is better than the baseline model. 展开更多
关键词 Data mining Business intelligence E-COMMERCE BERT Multilayer perceptron
在线阅读 下载PDF
Semi-Supervised Classification of Data Streams by BIRCH Ensemble and Local Structure Mapping 被引量:2
20
作者 Yi-Min Wen Shuai Liu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第2期295-304,共10页
Many researchers have applied clustering to handle semi-supervised classification of data streams with concept drifts.However,the generalization ability for each specific concept cannot be steadily improved,and the co... Many researchers have applied clustering to handle semi-supervised classification of data streams with concept drifts.However,the generalization ability for each specific concept cannot be steadily improved,and the concept drift detection method without considering the local structural information of data cannot accurately detect concept drifts.This paper proposes to solve these problems by BIRCH(Balanced Iterative Reducing and Clustering Using Hierarchies)ensemble and local structure mapping.The local structure mapping strategy is utilized to compute local similarity around each sample and combined with semi-supervised Bayesian method to perform concept detection.If a recurrent concept is detected,a historical BIRCH ensemble classifier is selected to be incrementally updated;otherwise a new BIRCH ensemble classifier is constructed and added into the classifier pool.The extensive experiments on several synthetic and real datasets demonstrate the advantage of the proposed algorithm. 展开更多
关键词 SEMI-SUPERVISED classification clustering data STREAM concept DRIFT
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部