期刊文献+
共找到5,336篇文章
< 1 2 250 >
每页显示 20 50 100
Laboratory or Department?Exploration and Creation in Computer Science and Technology
1
作者 Ann Copestake 《计算机教育》 2024年第3期13-16,共4页
In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in it... In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem. 展开更多
关键词 Laboratory or department University of Cambridge Boundaries Exploration and creativity
在线阅读 下载PDF
Editorial: Moving Forward to Respond to Rapid Changes of Computer Science and Technology
2
作者 Guo-Jie Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第1期1-1,共1页
Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating s... Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating scholarly and technical papers under a rigorous review process. 展开更多
关键词 EDITORIAL Moving Forward to Respond to Rapid Changes of Computer Science and Technology
原文传递
Analysis on the University-enterprise Collaborative Training Path for Engineering Doctor from the Perspective of Deep Integration—Innovative Synergies in Talent and Technology Development 被引量:1
3
作者 Peirong Guo Mingjian Song +1 位作者 Chunwei Tian Qi Zhu 《计算机教育》 2025年第3期138-144,共7页
With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a d... With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a direct impact on the progress of national technological innovation and the upgrading of industrial structure.Currently,there are still some issues in the university-enterprise collaboration for engineering doctor training in China,such as unclear cooperation mechanisms and responsibility divisions,insufficient corporate participation and enthusiasm,and imperfect evaluation and feedback mechanisms.This paper aims to explore the university-enterprise collaborative training path of engineering doctors from the perspective of deep integration,analyzing multiple dimensions including training objectives,curriculum design,practical sessions,mentor teams,and evaluation systems,in order to provide reference for the reform and practice of engineering doctor training in China. 展开更多
关键词 Engineering doctor Deep integration University-enterprise collaborative training
在线阅读 下载PDF
Exploration on the Construction of an Intelligent Educational Evaluation System Integrating the CIPP Model and Artificial Intelligence Technology from the Perspective of New Engineering
4
作者 Shun Yu Shasha Chen Yuxiu Li 《Journal of Contemporary Educational Research》 2025年第6期94-99,共6页
This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrat... This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrating the CIPP model with AI technology,a novel intelligent educational evaluation system was designed.Through experimental validation and case studies,the system demonstrated significant effectiveness in improving teaching quality,facilitating personalized student development,and optimizing educational resource allocation.Additionally,the study predicts potential changes this system could bring to the education industry and proposes relevant policy recommendations.Although the current research has limitations,with technological advancements in the future,this system is expected to provide stronger support for innovations in engineering education models. 展开更多
关键词 New engineering disciplines CIPP model Artificial intelligence Intelligent educational evaluation system Educational innovation
在线阅读 下载PDF
Detection of Rice Bacterial Leaf Blight Using Hyperspectral Technology and Continuous Wavelet Analysis
5
作者 Kaihao Shi Lin Yuan +5 位作者 Qimeng Yu Zhongting Shen Yingtan Yu Chenwei Nie Xingjian Zhou Jingcheng Zhang 《Phyton-International Journal of Experimental Botany》 2025年第7期2033-2054,共22页
Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-ban... Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-band spectra,hyperspectral technology has become a crucial tool to monitor crop diseases using remote sensing.However,existing continuous wavelet analysis(CWA)methods suffer from feature redundancy issues,while the continuous wavelet projection algorithm(CWPA),an optimization approach for feature selection,has not been fully validated to monitor plant diseases.This study utilized rice bacterial leaf blight(BLB)as an example by evaluating the performance of four wavelet basis functions-Gaussian2,Mexican hat,Meyer,andMorlet-within theCWAandCWPAframeworks.Additionally,the classification models were constructed using the k-nearest neighbors(KNN),randomforest(RF),and Naïve Bayes(NB)algorithms.The results showed the following:(1)Compared to traditional CWA,CWPA significantly reduced the number of required features.Under the CWPA framework,almost all the model combinations achieved maximum classification accuracy with only one feature.In contrast,the CWA framework required three to seven features.(2)Thechoice of wavelet basis functions markedly affected the performance of themodel.Of the four functions tested,the Meyer wavelet demonstrated the best overall performance in both the CWPA and CWA frameworks.(3)Under theCWPAframework,theMeyer-KNNandMeyer-NBcombinations achieved the highest overall accuracy of 93.75%using just one feature.In contrast,under the CWA framework,the CWA-RF combination achieved comparable accuracy(93.75%)but required six features.This study verified the technical advantages of CWPA for monitoring crop diseases,identified an optimal wavelet basis function selection scheme,and provided reliable technical support to precisely monitor BLB in rice(Oryza sativa).Moreover,the proposed methodological framework offers a scalable approach for the early diagnosis and assessment of plant stress,which can contribute to improved accuracy and timeliness when plant stress is monitored. 展开更多
关键词 HYPERSPECTRAL continuous wavelet analysis continuous wavelet projection algorithm wavelet basis function disease monitoring
在线阅读 下载PDF
Rockfall kinematics and restitution coefficients via inertial navigation technology
6
作者 XIE Hui LIANG Feng +3 位作者 SHI Wenbing LU Yancheng CONG Junyu LUO Yixin 《Journal of Mountain Science》 2025年第11期4093-4112,共20页
Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters ... Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters of rockfall movement is critical for understanding motion patterns and effectively preventing and controlling rockfall hazards.In this study,a monitoring system consisting of selfdeveloped inertial navigation equipment,high-speed cameras,and an unmanned aerial vehicle was used to conduct onsite motion tests involving four differently shaped rock specimens on three types of slopes(bedrock,detritus,and clast bedding).The selfdeveloped inertial navigation system integrated a highdynamic-range accelerometer(±400 g)and a shockresistant gyroscope(±4000°/s),capable of robustly collecting data during the test.The data collected from these tests were processed to extract key kinematic parameters such as velocity,trajectory,restitution coefficients,and friction coefficients.The test results demonstrated that the inertial navigation system accurately recorded the acceleration and angular velocity of the rocks during motion,with these measurements closely aligning with the field data.The normal and tangential restitution coefficients were found to be influenced primarily by the slope material and impact angle,with higher normal restitution coefficients observed for low-angle impacts.The normal restitution coefficients ranged from 0.35 to 0.86,whereas the tangential restitution coefficients ranged from 0.46 to 0.91,depending on the slope materials.Additionally,the sliding friction coefficient was calculated to be between 0.66 and 0.78,whereas the rolling friction coefficient for the slab-shaped specimen was determined to be 0.53.These findings provide valuable data for improving the accuracy of rockfall trajectory predictions and the design of protective structures. 展开更多
关键词 ROCKFALL Inertial navigation technology Field tests Rockfall kinematic parameters Restitution coefficients
原文传递
Speech Emotion Recognition Based on the Adaptive Acoustic Enhancement and Refined Attention Mechanism
7
作者 Jun Li Chunyan Liang +1 位作者 Zhiguo Liu Fengpei Ge 《Computers, Materials & Continua》 2026年第3期2015-2039,共25页
To enhance speech emotion recognition capability,this study constructs a speech emotion recognition model integrating the adaptive acoustic mixup(AAM)and improved coordinate and shuffle attention(ICASA)methods.The AAM... To enhance speech emotion recognition capability,this study constructs a speech emotion recognition model integrating the adaptive acoustic mixup(AAM)and improved coordinate and shuffle attention(ICASA)methods.The AAM method optimizes data augmentation by combining a sample selection strategy and dynamic interpolation coefficients,thus enabling information fusion of speech data with different emotions at the acoustic level.The ICASA method enhances feature extraction capability through dynamic fusion of the improved coordinate attention(ICA)and shuffle attention(SA)techniques.The ICA technique reduces computational overhead by employing depth-separable convolution and an h-swish activation function and captures long-range dependencies of multi-scale time-frequency features using the attention weights.The SA technique promotes feature interaction through channel shuffling,which helps the model learn richer and more discriminative emotional features.Experimental results demonstrate that,compared to the baseline model,the proposed model improves the weighted accuracy by 5.42%and 4.54%,and the unweighted accuracy by 3.37%and 3.85%on the IEMOCAP and RAVDESS datasets,respectively.These improvements were confirmed to be statistically significant by independent samples t-tests,further supporting the practical reliability and applicability of the proposed model in real-world emotion-aware speech systems. 展开更多
关键词 Speech emotion recognition adaptive acoustic mixup enhancement improved coordinate attention shuffle attention attention mechanism deep learning
在线阅读 下载PDF
Keyword Spotting Based on Dual-Branch Broadcast Residual and Time-Frequency Coordinate Attention
8
作者 Zeyu Wang Jian-Hong Wang Kuo-Chun Hsu 《Computers, Materials & Continua》 2026年第4期333-352,共20页
In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and rec... In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge.To address this,we propose a novel time-frequency dual-branch parallel residual network,which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module.The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features,effectively avoiding the potential information loss caused by serial stacking,while enhancing information flow and multi-scale feature fusion.In terms of training strategy,a curriculum learning approach is introduced to progressively improve model robustness fromeasy to difficult tasks.Experimental results demonstrate that the proposed method consistently outperforms existing lightweight models under various signal-to-noise ratio(SNR)conditions,achieving superior far-field recognition performance on the Google Speech Commands V2 dataset.Notably,the model maintains stable performance even in low-SNR environments such as–10 dB,and generalizes well to unseen SNR conditions during training,validating its robustness to novel noise scenarios.Furthermore,the proposed model exhibits significantly fewer parameters,making it highly suitable for deployment on resource-limited devices.Overall,the model achieves a favorable balance between performance and parameter efficiency,demonstrating strong potential for practical applications. 展开更多
关键词 Keyword spotting convolutional neural network residual learning ATTENTION small footprint noisy far-field
在线阅读 下载PDF
ADCP-YOLO:A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops
9
作者 Changjun Zhou Dongfang Chen +1 位作者 Chenyang Shi Taiyong Li 《Computers, Materials & Continua》 2026年第3期1895-1919,共25页
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc... With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops. 展开更多
关键词 YOLO violation behavior detection AKConv CRGAM DWR Powerful-IoU
在线阅读 下载PDF
An Enhanced Feature Neural Network and Its Application in Detection of Colorectal Polyps
10
作者 LI Hailong LIU Guohua ZHAO Meng 《Journal of Donghua University(English Edition)》 2026年第1期32-40,共9页
The colorectal cancer is one of the most common and lethal cancers,and colorectal polyps,as precancerous lesions,can lead to diagnostic oversight or misdiagnosis due to their varied shapes and sizes,thereby promoting ... The colorectal cancer is one of the most common and lethal cancers,and colorectal polyps,as precancerous lesions,can lead to diagnostic oversight or misdiagnosis due to their varied shapes and sizes,thereby promoting the irreversible progression of colorectal cancer.We propose a YOLO based model and name it EF-YOLO.It incorporates transformer to extract contextual information about the colorectal polyps.Simultaneously,leveraging the morphological characteristics of colorectal polyps,we design a brand-new module,namely advanced multi-scale aggregation(AMSA),to replace the traditional multi-scale module.The backbone adopts deformable convolutional network-maxpool(DCN-MP)to enhance feature extraction while adaptively sampling points to better match the shapes of colorectal polyps.By combining coordinate attention(CA),this model maximizes the use of positional and channel information,more effectively extracting features of colorectal polyps,directing the model’s attention toward the colorectal polyp region.EF-YOLO has made advancement on the merged Kvasir-SEG and CVC-ClinicDB dataset.Compared to the original model,the mean average precision(mAP)of EF-YOLO increases and reaches 96.60%,meeting automated colorectal polyp detection requirements. 展开更多
关键词 colorectal polyp YOLO transformer deformable convolutional network-maxpool(DCN-MP) coordinate attention(CA)
在线阅读 下载PDF
FedReg^(*):Addressing Non-Independent and Identically Distributed Challenges in Federated Learning
11
作者 SHI Xiujin ZHU Xiaolong XIAO Wentao 《Journal of Donghua University(English Edition)》 2026年第1期41-49,共9页
In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a meth... In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency. 展开更多
关键词 federated learning non-independent and identically distributed(non-IID)data hybrid regularization cosine similarity
在线阅读 下载PDF
Object-oriented Software Construction Based on the Integration of OBE and BOPPPS Models
12
作者 Jianghong Ma Cuiyun Gao +5 位作者 Min Fang Jianlong Wu Miao Zhang Zhiting Zhao Haijun Zhang Yunming Ye 《计算机教育》 2026年第3期148-157,共10页
This study presents a teaching reform for the Object-oriented Software Construction(OOSC)course by integrating outcome-based education(OBE)and the BOPPPS(bridge-In,objectives,pre-assessment,participatory learning,post... This study presents a teaching reform for the Object-oriented Software Construction(OOSC)course by integrating outcome-based education(OBE)and the BOPPPS(bridge-In,objectives,pre-assessment,participatory learning,post-assessment,summary)instructional model.The reform addresses the gap between syntax-based programming instruction and the need for higher-level skills in abstraction,modularity,and software architecture.The course is anchored in a semester-long,project-based learning platform centered on a Java-based Aircraft Battle Game,progressing through six iterative experiments.Each experiment targets specific competencies within the structured BOPPPS teaching cycle and is aligned with specific OBE learning outcomes.A case study on the Factory Pattern illustrates how the BOPPPS model fosters conceptual understanding and practical application.Evaluation results from the 2023 and 2024 spring semesters show improved outcomes:Project completion rose from 87%to 95%,37%of students implemented innovative features,and average final grades increased by 7%.The results affirm that the OBE+BOPPPS integration strengthens engagement,deepens understanding,and equips students with real-world software development competencies. 展开更多
关键词 OOSC JAVA Design pattern OBE+BOPPPS
在线阅读 下载PDF
A Comprehensive Literature Review on YOLO-Based Small Object Detection:Methods,Challenges,and Future Trends
13
作者 Hui Yu Jun Liu Mingwei Lin 《Computers, Materials & Continua》 2026年第4期258-309,共52页
Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of... Small object detection has been a focus of attention since the emergence of deep learning-based object detection.Although classical object detection frameworks have made significant contributions to the development of object detection,there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes.In particular,the YOLO(You Only Look Once)series of detection models,renowned for their real-time performance,have undergone numerous adaptations aimed at improving the detection of small targets.In this survey,we summarize the state-of-the-art YOLO-based small object detection methods.This review presents a systematic categorization of YOLO-based approaches for small-object detection,organized into four methodological avenues,namely attention-based feature enhancement,detection-head optimization,loss function,and multi-scale feature fusion strategies.We then examine the principal challenges addressed by each category.Finally,we analyze the performance of thesemethods on public benchmarks and,by comparing current approaches,identify limitations and outline directions for future research. 展开更多
关键词 Small object detection YOLO real-time detection feature fusion deep learning
在线阅读 下载PDF
ES-YOLO:Edge and Shape Fusion-Based YOLO for Tra.c Sign Detection
14
作者 Weiguo Pan Songjie Du +2 位作者 Bingxin Xu Bin Zhang Hongzhe Liu 《Computers, Materials & Continua》 2026年第4期2127-2145,共19页
Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approa... Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approach in current practices.However,in complex and dynamic traffic scenes,particularly with smaller traffic sign objects,challenges such as missed and false detections can lead to reduced overall detection accuracy.To address this issue,this paper proposes a detection algorithm that integrates edge and shape information.Recognizing that traffic signs have specific shapes and distinct edge contours,this paper introduces an edge feature extraction branch within the backbone network,enabling adaptive fusion with features of the same hierarchical level.Additionally,a shape prior convolution module is designed to replaces the first two convolutional modules of the backbone network,aimed at enhancing the model's perception ability for specific shape objects and reducing its sensitivity to background noise.The algorithm was evaluated on the CCTSDB and TT100k datasets,and compared to YOLOv8s,the mAP50 values increased by 3.0%and 10.4%,respectively,demonstrating the effectiveness of the proposed method in improving the accuracy of traffic sign detection. 展开更多
关键词 Traffic sign edge information shape prior feature fusion object detection
在线阅读 下载PDF
Command-agent:Reconstructing warfare simulation and command decision-making using large language models
15
作者 Mengwei Zhang Minchi Kuang +3 位作者 Heng Shi Jihong Zhu Jingyu Zhu Xiao Jiang 《Defence Technology(防务技术)》 2026年第2期294-313,共20页
War rehearsals have become increasingly important in national security due to the growing complexity of international affairs.However,traditional rehearsal methods,such as military chess simulations,are inefficient an... War rehearsals have become increasingly important in national security due to the growing complexity of international affairs.However,traditional rehearsal methods,such as military chess simulations,are inefficient and inflexible,with particularly pronounced limitations in command and decision-making.The overwhelming volume of information and high decision complexity hinder the realization of autonomous and agile command and control.To address this challenge,an intelligent warfare simulation framework named Command-Agent is proposed,which deeply integrates large language models(LLMs)with digital twin battlefields.By constructing a highly realistic battlefield environment through real-time simulation and multi-source data fusion,the natural language interaction capabilities of LLMs are leveraged to lower the command threshold and to enable autonomous command through the Observe-Orient-Decide-Act(OODA)feedback loop.Within the Command-Agent framework,a multimodel collaborative architecture is further adopted to decouple the decision-generation and command-execution functions of LLMs.By combining specialized models such as Deep Seek-R1 and MCTool,the limitations of single-model capabilities are overcome.MCTool is a lightweight execution model fine-tuned for military Function Calling tasks.The framework also introduces a Vector Knowledge Base to mitigate hallucinations commonly exhibited by LLMs.Experimental results demonstrate that Command-Agent not only enables natural language-driven simulation and control but also deeply understands commander intent.Leveraging the multi-model collaborative architecture,during red-blue UAV confrontations involving 2 to 8 UAVs,the integrated score is improved by an average of 41.8%compared to the single-agent system(MCTool),accompanied by a 161.8%optimization in the battle loss ratio.Furthermore,when compared with multi-agent systems lacking the knowledge base,the inclusion of the Vector Knowledge Base further improves overall performance by 16.8%.In comparison with the general model(Qwen2.5-7B),the fine-tuned MCTool leads by 5%in execution efficiency.Therefore,the proposed Command-Agent introduces a novel perspective to the military command system and offers a feasible solution for intelligent battlefield decision-making. 展开更多
关键词 Digital twin battlefield Large language models Multi-agent system Military command
在线阅读 下载PDF
Toward Secure and Auditable Data Sharing:A Cross-Chain CP-ABE Framework
16
作者 Ye Tian Zhuokun Fan Yifeng Zhang 《Computers, Materials & Continua》 2026年第4期1509-1529,共21页
Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy a... Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys. 展开更多
关键词 Data sharing blockchain attribute-based encryption dynamic permissions
在线阅读 下载PDF
A Workflow Scheduling Method Based on the Combination of Tunicate Swarm Algorithm and Highest Response Ratio Next Scheduling
17
作者 Yujie Tian Ming Zhu +2 位作者 Jing Li Cong Liu Ziyang Zhang 《Computers, Materials & Continua》 2026年第5期1950-1963,共14页
Workflow scheduling is critical for efficient cloud resource management.This paper proposes Tunicate Swarm-Highest Response Ratio Next,a novel scheduler that synergistically combines the Tunicate Swarm Algorithm with ... Workflow scheduling is critical for efficient cloud resource management.This paper proposes Tunicate Swarm-Highest Response Ratio Next,a novel scheduler that synergistically combines the Tunicate Swarm Algorithm with the Highest Response Ratio Next policy.The Tunicate Swarm Algorithm generates a cost-minimizing task-to-VM mapping scheme,while the Highest Response Ratio Next dynamically dispatches tasks in the ready queue with the highest-priority.Experimental results demonstrate that the Tunicate Swarm-Highest Response RatioNext reduces costs by up to 94.8%compared to meta-heuristic baselines.It also achieves competitive cost efficiency vs.a learning-based method while offering superior operational simplicity and efficiency,establishing it as a highly practical solution for dynamic cloud environments. 展开更多
关键词 Workflow scheduling cloud computing tunicate swarm algorithm highest response ratio next scheduling
在线阅读 下载PDF
Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks
18
作者 Haoxin Sun XiaoYu +5 位作者 Jiale Li Yitong Xu JieYu Huanhuan Li Yuanzhang Li Yu-An Tan 《Computers, Materials & Continua》 2026年第2期1474-1488,共15页
Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequ... Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities. 展开更多
关键词 Smart contracts graph neural networks symbolic execution vulnerability detection
在线阅读 下载PDF
LUAR:Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems
19
作者 Fei Tang Ping Wang +3 位作者 Jiang Yu Huihui Zhu Mengxue Qin Ling Yang 《Computers, Materials & Continua》 2026年第3期1628-1646,共19页
Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a piv... Attribute-Based Encryption(ABE)has emerged as a fundamental access control mechanism in data sharing,enabling data owners to define flexible access policies.A critical aspect of ABE is key revocation,which plays a pivotal role in maintaining security.However,existing key revocation mechanisms face two major challenges:(1)High overhead due to ciphertext and key updates,primarily stemming from the reliance on revocation lists during attribute revocation,which increases computation and communication costs.(2)Limited universality,as many attribute revocation mechanisms are tailored to specific ABE constructions,restricting their broader applicability.To address these challenges,we propose LUAR(Lightweight and Universal Attribute Revocation),a novel revocation mechanism that leverages Intel Software Guard Extensions(SGX)while minimizing its inherent limitations.Given SGX’s constrained memory(≈90 MB in a personal computer)and susceptibility to side-channel attacks,we carefully manage its usage to reduce reliance while mitigating potential collusion risks between cloud service providers and users.To evaluate LUAR’s lightweight and universality,we integrate it with the classic BSW07 scheme,which can be seamlessly replaced with other ABE constructions.Experimental results demonstrate that LUAR enables secure attribute revocation with low computation and communication overhead.The processing time within the SGX environment remains stable at approximately 55 ms,regardless of the complexity of access policies,ensuring no additional storage or computational burden on SGX.Compared to the Hardware-based Revocable Attribute-Based Encryption(HR-ABE)scheme(IEEE S&P 2024),LUAR incurs a slightly higher computational cost within SGX;however,the overall time from initiating a data request to obtaining plaintext is shorter.As access policies grow more complex,LUAR’s advantages become increasingly evident,showcasing its superior efficiency and broader applicability. 展开更多
关键词 Attribute-based encryption attribute revocation LIGHTWEIGHT UNIVERSALITY
在线阅读 下载PDF
FastCheck:fast checkpointing and recovery for DNN training via parallel transmission and compression
20
作者 Yun TENG Dawei SUN +4 位作者 Shipeng HU Zhiyue LI Guangyan ZHANG Haidong TIAN Rui CHANG 《ENGINEERING Information Technology & Electronic Engineering》 2026年第2期39-51,共13页
Training large-scale deep neural networks(DNNs)is prone to software and hardware failures,with critical failures often requiring full-machine reboots that substantially prolong training.Existing checkpoint-recovery so... Training large-scale deep neural networks(DNNs)is prone to software and hardware failures,with critical failures often requiring full-machine reboots that substantially prolong training.Existing checkpoint-recovery solutions either cannot tolerate such critical failures or suffer from slow checkpointing and recovery due to constrained input/output bandwidth.In this paper,we propose FastCheck,a checkpoint-recovery framework that accelerates checkpointing and recovery through parallel transmission and tailored compression.First,FastCheck partitions checkpoints into shards and leverages multiple nodes for parallel checkpointing and recovery.Second,it further reduces checkpoint size and overhead with delta compression for weights and index compression for momentum.Third,FastCheck employs lightweight and consistent health status maintenance that accurately tracks node health,preventing checkpoint transmission to failed nodes.We implement FastCheck in PyTorch and evaluate it on multiple DNN models against two baselines.Experimental results show that FastCheck reduces the checkpointing time by up to 78.42%and the recovery time by up to 77.41%,while consistently improving efficiency across different training stages. 展开更多
关键词 Deep neural network models Critical failures Parallel transmission Data compression Checkpointing and recovery
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部