期刊文献+
共找到2,394篇文章
< 1 2 120 >
每页显示 20 50 100
Computing the ground state solution of Bose-Einstein condensates by an energy-minimizing normalized residual network
1
作者 Ren-Tao Wu Ji-Dong Gao +3 位作者 Yu-Han Wang Zhen-Wei Deng Ming-Jun Li Rong-Pei Zhang 《Chinese Physics B》 2025年第10期321-329,共9页
This paper introduces a novel numerical method based on an energy-minimizing normalized residual network(EMNorm Res Net)to compute the ground-state solution of Bose-Einstein condensates at zero or low temperatures.Sta... This paper introduces a novel numerical method based on an energy-minimizing normalized residual network(EMNorm Res Net)to compute the ground-state solution of Bose-Einstein condensates at zero or low temperatures.Starting from the three-dimensional Gross-Pitaevskii equation(GPE),we reduce it to the 1D and 2D GPEs because of the radial symmetry and cylindrical symmetry.The ground-state solution is formulated by minimizing the energy functional under constraints,which is directly solved using the EM-Norm Res Net approach.The paper provides detailed solutions for the ground states in 1D,2D(with radial symmetry),and 3D(with cylindrical symmetry).We use the Thomas-Fermi approximation as the target function to pre-train the neural network.Then,the formal network is trained using the energy minimization method.In contrast to traditional numerical methods,our neural network approach introduces two key innovations:(i)a novel normalization technique designed for high-dimensional systems within an energy-based loss function;(ii)improved training efficiency and model robustness by incorporating gradient stabilization techniques into residual networks.Extensive numerical experiments validate the method's accuracy across different spatial dimensions. 展开更多
关键词 Bose-Einstein condensate Gross-Pitaevskii equation energy minimization normalized residual network
原文传递
Comparative study of IoT-and AI-based computing disease detection approaches
2
作者 Wasiur Rhmann Jalaluddin Khan +8 位作者 Ghufran Ahmad Khan Zubair Ashraf Babita Pandey Mohammad Ahmar Khan Ashraf Ali Amaan Ishrat Abdulrahman Abdullah Alghamdi Bilal Ahamad Mohammad Khaja Shaik 《Data Science and Management》 2025年第1期94-106,共13页
The emergence of different computing methods such as cloud-,fog-,and edge-based Internet of Things(IoT)systems has provided the opportunity to develop intelligent systems for disease detection.Compared to other machin... The emergence of different computing methods such as cloud-,fog-,and edge-based Internet of Things(IoT)systems has provided the opportunity to develop intelligent systems for disease detection.Compared to other machine learning models,deep learning models have gained more attention from the research community,as they have shown better results with a large volume of data compared to shallow learning.However,no comprehensive survey has been conducted on integrated IoT-and computing-based systems that deploy deep learning for disease detection.This study evaluated different machine learning and deep learning algorithms and their hybrid and optimized algorithms for IoT-based disease detection,using the most recent papers on IoT-based disease detection systems that include computing approaches,such as cloud,edge,and fog.Their analysis focused on an IoT deep learning architecture suitable for disease detection.It also recognizes the different factors that require the attention of researchers to develop better IoT disease detection systems.This study can be helpful to researchers interested in developing better IoT-based disease detection and prediction systems based on deep learning using hybrid algorithms. 展开更多
关键词 Deep learning Internet of Things(IoT) Cloud computing Fog computing Edge computing
在线阅读 下载PDF
Pressure-Modulated Activation Energy as a Unified Descriptor of Mechanical Behavior in Metallic Glass
3
作者 Huanrong Liu Jian Li +1 位作者 Shan Zhang Pengfei Guan 《Chinese Physics Letters》 2026年第1期71-82,共12页
The functional properties of glasses are governed by their formation history and the complex relaxation processes they undergo.However,under extreme conditions,glass behaviors are still elusive.In this study,we employ... The functional properties of glasses are governed by their formation history and the complex relaxation processes they undergo.However,under extreme conditions,glass behaviors are still elusive.In this study,we employ simulations with varied protocols to evaluate the effectiveness of different descriptors in predicting mechanical properties across both low-and high-pressure regimes.Our findings demonstrate that conventional structural and configurational descriptors fail to correlate with the mechanical response following pressure release,whereas the activation energy descriptor exhibits robust linearity with shear modulus after correcting for pressure effects.Notably,the soft mode parameter emerges as an ideal and computationally efficient alternative for capturing this mechanical behavior.These findings provide critical insights into the influence of pressure on glassy properties,integrating the distinct features of compressed glasses into a unified theoretical framework. 展开更多
关键词 pressure modulated activation energy predicting mechanical properties metallic glass relaxation processes functional properties mechanical behavior simulations varied protocols structural configurational descriptors
原文传递
A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection
4
作者 Qasem Abu Al-Haija Shahad Al Tamimi 《Computers, Materials & Continua》 2026年第4期26-94,共69页
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr... Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation. 展开更多
关键词 Reinforcement learning network intrusion detection adversarial training deep learning cybersecurity defense intrusion detection system and machine learning
在线阅读 下载PDF
Centralized Circumcentered-Reflection Method for Solving the Convex Feasibility Problem in Sparse Signal Recovery
5
作者 Chunmei LI Bangjun CHEN Xuefeng DUAN 《Journal of Mathematical Research with Applications》 2026年第1期119-133,共15页
Convex feasibility problems are widely used in image reconstruction, sparse signal recovery, and other areas. This paper is devoted to considering a class of convex feasibility problem arising from sparse signal recov... Convex feasibility problems are widely used in image reconstruction, sparse signal recovery, and other areas. This paper is devoted to considering a class of convex feasibility problem arising from sparse signal recovery. We first derive the projection formulas for a vector onto the feasible sets. The centralized circumcentered-reflection method is designed to solve the convex feasibility problem. Some numerical experiments demonstrate the feasibility and effectiveness of the proposed algorithm, showing superior performance compared to conventional alternating projection methods. 展开更多
关键词 convex feasibility problem centralized circumcentered-re ection method sparse signal recovery compressed sensing
原文传递
Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity
6
作者 Md Shohel Rana Tonmoy Ghosh +2 位作者 Mohammad Nur Nobi Anichur Rahman Andrew HSung 《Computers, Materials & Continua》 2026年第1期29-66,共38页
Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulner... Zero-click attacks represent an advanced cybersecurity threat,capable of compromising devices without user interaction.High-profile examples such as Pegasus,Simjacker,Bluebugging,and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access,exfiltrate data,and enable long-term surveillance.Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging.This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework,a widely adopted standard for modeling adversarial behavior.Through this mapping,we categorize real-world attack vectors and better understand how such attacks operate across the cyber-kill chain.To support threat detection efforts,we propose an Active Learning-based method to efficiently label the Pegasus spyware dataset in alignment with the MITRE ATT&CK framework.This approach reduces the effort of manually annotating data while improving the quality of the labeled data,which is essential to train robust cybersecurity models.In addition,our analysis highlights the structured execution paths of zero-click attacks and reveals gaps in current defense strategies.The findings emphasize the importance of forward-looking strategies such as continuous surveillance,dynamic threat profiling,and security education.By bridging zero-click attack analysis with the MITRE ATT&CK framework and leveraging machine learning for dataset annotation,this work provides a foundation for more accurate threat detection and the development of more resilient and structured cybersecurity frameworks. 展开更多
关键词 Bluebugging bluesnarfing CYBERSECURITY MITRE ATT&CK PEGASUS simjacker zero-click attacks
在线阅读 下载PDF
Harvesting Wave Energy:An Economic and Technological Assessment of the CoastalAreas in Sarawak
7
作者 Dexiecia Anak Francis Jalal Tavalaei Hadi Nabipour Afrouzi 《Energy Engineering》 2026年第2期259-278,共20页
Wave energy is a promising form of marine renewable energy that offers a sustainable pathway for electricity generation in coastal regions.Despite Malaysia’s extensive coastline,the exploration of wave energy in Sara... Wave energy is a promising form of marine renewable energy that offers a sustainable pathway for electricity generation in coastal regions.Despite Malaysia’s extensive coastline,the exploration of wave energy in Sarawak remains limited due to economic,technical,and environmental challenges that hinder its implementation.Compared to other renewable energy sources,wave energy is underutilized largely because of cost uncertainties and the lack of local performance data.This research aims to identify themost suitable coastal zone in Sarawak that achieves an optimal balance between energy potential,cost-effectiveness,and environmental impact,particularly in relation to infrastructure and regional development.The findings indicate that wave energy generation in Sarawak is technically feasible based on MOGA analysis.Among the studied sites,Bintulu emerged as the most balanced option,with a levelized cost of electricity(LCOE)of 0.778–0.864 USD/kWh and a CO_(2) emission factor as low as 0.019–0.020 CO_(2)/k Wh.Miri,while producing lower emissions than Sematan,recorded a higher LCOE of 1.045 USD/kWh with moderate emissions at 0.029 CO_(2)/kWh.Sematan,characterized by weaker wave conditions and higher installation penalties,resulted in the least favorable outcome,with an LCOE of 3.735 USD/kWh.Bintulu’s strategic location reduces CAPEX requirements,making it the most suitable site for large-scale wave energy deployment in Sarawak. 展开更多
关键词 Capital expenditure(CAPEX) operational expenditure(OPEX) levelized cost of electricity(LCOE) wave energy converter(WEC) SARAWAK
在线阅读 下载PDF
AI ethics in geoscience:Toward trustworthy and responsible innovation
8
作者 Jinran Wu Xin Tian +8 位作者 You-Gan Wang Tong Li Qingyang Liu Yayong Li Lizhen Cui Zhuangcai Tian Jing Xu Xianzhou Lyu Yuming Mo 《Geography and Sustainability》 2026年第1期249-252,共4页
1.Introduction Artificial intelligence(AI)is rapidly reshaping geoscience,from Earth observation interpretation and hazard forecasting to subsurface characterisation and Earth system modelling(Kochupillai et al.,2022;... 1.Introduction Artificial intelligence(AI)is rapidly reshaping geoscience,from Earth observation interpretation and hazard forecasting to subsurface characterisation and Earth system modelling(Kochupillai et al.,2022;Sun et al.,2024).These capabilities emerge at a time when geoscientific evidence is increasingly informing high-stakes decisions about climate adaptation,resource development,and disaster risk reduction(McGovern et al.,2022). 展开更多
关键词 climate adaptationresource developmentand subsurface characterisation earth system modelling kochupillai hazard forecasting earth observation interpretation disaster risk reduction mcgovern artificial intelligence ai geoscientific evidence
在线阅读 下载PDF
Computational screening for novel solid-state electrolytes in Li_(3)MX_(6) composition
9
作者 Olgert L.Dallakyan Alexey P.Maltsev +8 位作者 Ilya V.Chepkasov Misha A.Aghamalyan Areg A.Hunanyan Nane Z.Petrosyan Mikayel S.Chobanyan Mikayel T.Sahakyan Luiza G.Khachatryan Artem R.Oganov Hayk A.Zakaryan 《Journal of Energy Chemistry》 2026年第1期495-504,I0011,共11页
Halide solid-state electrolytes have gained significant attention in recent years due to their high ionic conductivity,making them promising candidates for future all-solid-state batteries.Recent studies have identifi... Halide solid-state electrolytes have gained significant attention in recent years due to their high ionic conductivity,making them promising candidates for future all-solid-state batteries.Recent studies have identified numerous crystal structures with the Li_(3)MX_(6)composition,although many remain unexplored across various chemical systems.In this research,we developed a comprehensive method to examine all conceivable space groups and structures within theLi-M-X system,where M includes In,Ga,and La,and X includes F,Cl,Br,and 1.Our findings revealed two metastable structures:Li_(3)InF_(6)with P3c1 symmetry and Li_(3)InI_(6)with C2/c symmetry,exhibiting ionic conductivities of 0.55 and 2.18mS/cm at 300K,respectively.Notably,the trigonal symmetry of Li3InF6 demonstrates that high ionic conductivities are not limited to monoclinic structures but can also be achieved with trigonal symmetries.The electrochemical stability windows,mechanical properties,and reaction energies of these materials with known cathodes suggest their potential for use in all-solid-state batteries.Additionally,we predicted the stability of novel materials,including Li_(5)InCl_(8),Li_(5)InBr_(8),Li_(5)InI_(8),LiIn_(2)Cl_(9),LiIn_(2)Br_(9),and LiIn_(2)I_(9). 展开更多
关键词 Solid state electrolyte HALIDES Novel materials DFT
在线阅读 下载PDF
A survey of edge computing-based designs for IoT security 被引量:15
10
作者 Kewei Sha T.Andrew Yang +1 位作者 Wei Wei Sadegh Davari 《Digital Communications and Networks》 SCIE 2020年第2期195-202,共8页
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi... Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues. 展开更多
关键词 Edge computing Internet of Things(IoT) SECURITY Architecture Secure protocols FIREWALL Intrusion detection Authentication AUTHORIZATION Privacy
在线阅读 下载PDF
Parallel Computing of a Variational Data Assimilation Model for GPS/MET Observation Using the Ray-Tracing Method 被引量:5
11
作者 张昕 刘月巍 +1 位作者 王斌 季仲贞 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2004年第2期220-226,共7页
The Spectral Statistical Interpolation (SSI) analysis system of NCEP is used to assimilate meteorological data from the Global Positioning Satellite System (GPS/MET) refraction angles with the variational technique. V... The Spectral Statistical Interpolation (SSI) analysis system of NCEP is used to assimilate meteorological data from the Global Positioning Satellite System (GPS/MET) refraction angles with the variational technique. Verified by radiosonde, including GPS/MET observations into the analysis makes an overall improvement to the analysis variables of temperature, winds, and water vapor. However, the variational model with the ray-tracing method is quite expensive for numerical weather prediction and climate research. For example, about 4 000 GPS/MET refraction angles need to be assimilated to produce an ideal global analysis. Just one iteration of minimization will take more than 24 hours CPU time on the NCEP's Cray C90 computer. Although efforts have been taken to reduce the computational cost, it is still prohibitive for operational data assimilation. In this paper, a parallel version of the three-dimensional variational data assimilation model of GPS/MET occultation measurement suitable for massive parallel processors architectures is developed. The divide-and-conquer strategy is used to achieve parallelism and is implemented by message passing. The authors present the principles for the code's design and examine the performance on the state-of-the-art parallel computers in China. The results show that this parallel model scales favorably as the number of processors is increased. With the Memory-IO technique implemented by the author, the wall clock time per iteration used for assimilating 1420 refraction angles is reduced from 45 s to 12 s using 1420 processors. This suggests that the new parallelized code has the potential to be useful in numerical weather prediction (NWP) and climate studies. 展开更多
关键词 parallel computing variational data assimilation GPS/MET
在线阅读 下载PDF
Intelligent Traffic Scheduling for Mobile Edge Computing in IoT via Deep Learning 被引量:1
12
作者 Shaoxuan Yun Ying Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1815-1835,共21页
Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing i... Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms. 展开更多
关键词 Mobile Edge Computing(MEC) traffic scheduling deep learning Internet of Things(IoT)
在线阅读 下载PDF
Computing Paradigms in Emerging Vehicular Environments:A Review 被引量:2
13
作者 Lion Silva Naercio Magaia +5 位作者 Breno Sousa Anna Kobusińska António Casimiro Constandinos X.Mavromoustakis George Mastorakis Victor Hugo C.de Albuquerque 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第3期491-511,共21页
Determining how to structure vehicular network environments can be done in various ways.Here,we highlight vehicle networks’evolution from vehicular ad-hoc networks(VANET)to the internet of vehicles(Io Vs),listing the... Determining how to structure vehicular network environments can be done in various ways.Here,we highlight vehicle networks’evolution from vehicular ad-hoc networks(VANET)to the internet of vehicles(Io Vs),listing their benefits and limitations.We also highlight the reasons in adopting wireless technologies,in particular,IEEE 802.11 p and 5 G vehicle-toeverything,as well as the use of paradigms able to store and analyze a vast amount of data to produce intelligence and their applications in vehicular environments.We also correlate the use of each of these paradigms with the desire to meet existing intelligent transportation systems’requirements.The presentation of each paradigm is given from a historical and logical standpoint.In particular,vehicular fog computing improves on the deficiences of vehicular cloud computing,so both are not exclusive from the application point of view.We also emphasize some security issues that are linked to the characteristics of these paradigms and vehicular networks,showing that they complement each other and share problems and limitations.As these networks still have many opportunities to grow in both concept and application,we finally discuss concepts and technologies that we believe are beneficial.Throughout this work,we emphasize the crucial role of these concepts for the well-being of humanity. 展开更多
关键词 Computing paradigm CLOUD EDGE FOG internet of vehicle(IoV) vehicular networks
在线阅读 下载PDF
Predicting rock size distribution in mine blasting using various novel soft computing models based on meta-heuristics and machine learning algorithms 被引量:5
14
作者 Chengyu Xie Hoang Nguyen +3 位作者 Xuan-Nam Bui Yosoon Choi Jian Zhou Thao Nguyen-Trang 《Geoscience Frontiers》 SCIE CAS CSCD 2021年第3期458-472,共15页
Blasting is well-known as an effective method for fragmenting or moving rock in open-pit mines.To evaluate the quality of blasting,the size of rock distribution is used as a critical criterion in blasting operations.A... Blasting is well-known as an effective method for fragmenting or moving rock in open-pit mines.To evaluate the quality of blasting,the size of rock distribution is used as a critical criterion in blasting operations.A high percentage of oversized rocks generated by blasting operations can lead to economic and environmental damage.Therefore,this study proposed four novel intelligent models to predict the size of rock distribution in mine blasting in order to optimize blasting parameters,as well as the efficiency of blasting operation in open mines.Accordingly,a nature-inspired algorithm(i.e.,firefly algorithm-FFA)and different machine learning algorithms(i.e.,gradient boosting machine(GBM),support vector machine(SVM),Gaussian process(GP),and artificial neural network(ANN))were combined for this aim,abbreviated as FFA-GBM,FFA-SVM,FFA-GP,and FFA-ANN,respectively.Subsequently,predicted results from the abovementioned models were compared with each other using three statistical indicators(e.g.,mean absolute error,root-mean-squared error,and correlation coefficient)and color intensity method.For developing and simulating the size of rock in blasting operations,136 blasting events with their images were collected and analyzed by the Split-Desktop software.In which,111 events were randomly selected for the development and optimization of the models.Subsequently,the remaining 25 blasting events were applied to confirm the accuracy of the proposed models.Herein,blast design parameters were regarded as input variables to predict the size of rock in blasting operations.Finally,the obtained results revealed that the FFA is a robust optimization algorithm for estimating rock fragmentation in bench blasting.Among the models developed in this study,FFA-GBM provided the highest accuracy in predicting the size of fragmented rocks.The other techniques(i.e.,FFA-SVM,FFA-GP,and FFA-ANN)yielded lower computational stability and efficiency.Hence,the FFA-GBM model can be used as a powerful and precise soft computing tool that can be applied to practical engineering cases aiming to improve the quality of blasting and rock fragmentation. 展开更多
关键词 Mine blasting Rock fragmentation Artificial intelligence Hybrid model Gradient boosting machine Meta-heuristic algorithm
在线阅读 下载PDF
Dominance-based rough set approach as a paradigm of knowledge discovery and granular computing
15
作者 Roman Slowinski 《重庆邮电大学学报(自然科学版)》 北大核心 2010年第6期708-719,共12页
Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computin... Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications. 展开更多
关键词 rough sets dominance-based rough set approach(DRSA) ordinal classification variable-consistency DRSA monotonic decision rules granular computing
在线阅读 下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
16
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
在线阅读 下载PDF
CLOUD COMPUTING
17
作者 崔勇 Rajkumar Buyya 刘江川 《China Communications》 SCIE CSCD 2014年第4期I0001-I0002,共2页
Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance computation.Cloud provides infrastructure,platform and software as different on-demand services.China ha... Cloud computing is a novel computing paradigm that utilizes remote cloud resources to achieve a high-performance computation.Cloud provides infrastructure,platform and software as different on-demand services.China has made remarkable progress in cloudbased products and operating system technology.The government,enterprises and research institutions are all active in the development of cloud computing-related projects.Despite the progress,many important 展开更多
关键词 计算模式 性能计算 基础设施 操作系统 科研机构 远程 软件
在线阅读 下载PDF
Identity-Based Edge Computing Anonymous Authentication Protocol
18
作者 Naixin Kang Zhenhu Ning +2 位作者 Shiqiang Zhang Sadaqat ur Rehman Waqas 《Computers, Materials & Continua》 SCIE EI 2023年第2期3931-3943,共13页
With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing ... With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing system,in order to ensure the credibility of the source of terminal data,mobile edge computing(MEC)needs to verify the signature of the terminal node on the data.During the signature process,the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance.Therefore,it is very necessary to improve efficiency through computational offloading.Therefore,this paper proposes an identitybased edge computing anonymous authentication protocol.The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information.The encryption algorithm is implemented through a thresholded identity-based proxy ring signature.When a large number of terminals offload computing,MEC can set the priority of offloading tasks according to the user’s identity and permissions,thereby improving offloading efficiency.Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures.The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle.According to the efficiency analysis,in the case of MEC offloading,the computational complexity is significantly reduced,the computing power of edge devices is liberated,and the signature efficiency is improved. 展开更多
关键词 Identity authentication anonymous authentication edge computing
在线阅读 下载PDF
Characterization and quantification of gait deficits within gait phases using fuzzy-granular computing
19
作者 Melaku A. Bogale Huiying Yu +1 位作者 Thompson Sarkodie-Gyan Amr Abdelgawad 《Journal of Biomedical Science and Engineering》 2012年第12期720-728,共9页
People with neurological disorders like Cerebral Palsy (CP) and Multiple Sclerosis (MS) suffer associated functional gait problems. The symptoms and sign of these gait deficits are different between subjects and even ... People with neurological disorders like Cerebral Palsy (CP) and Multiple Sclerosis (MS) suffer associated functional gait problems. The symptoms and sign of these gait deficits are different between subjects and even within a subject at different stage of the disease. Identifying these gait related abnormalities helps in the treatment planning and rehabilitation process. The current gait assessment process does not provide very specific information within the seven gait phases. The objective of this study is to investigate the possible application of granular computing to quantify gait parameters within the seven gait phases. In this process we applied fuzzy-granular computing on the vertical ground reaction force (VGRF) and surface electromyography (sEMG) data to obtain respective characteristic values for each gait phase. A fuzzy similarity (FS) measure is used to compare patient values with age and sex matched control able-bodied group. We specifically applied and tested this approach on 10 patients (4 Cerebral Palsy and 6 Multiple Sclerosis) to identify possible gait abnormalities. Different FS values for VGRF for right and left leg is observed. The VGRF analysis shows smaller FS values during the swing phase in CP and MS subjects that are evidence of associated stability problem. Similarly, FS values for muscle activates of the four-selected muscle display a broad range of values due to difference between subjects. Degraded FS values for different muscles at different stage of the gait cycle are reported. Smaller FS values are sign of abnormal activity of the respective muscles. This approach provides individual centered and very specific information within the gait phases that can be employed for diagnosis, treatment and rehabilitation process. 展开更多
关键词 Fuzzy-Granular Algorithm GAIT PHASES FUZZY Similarity Cerebral PALSY Multiple SCLEROSIS
暂未订购
上一页 1 2 120 下一页 到第
使用帮助 返回顶部