期刊文献+
共找到66篇文章
< 1 2 4 >
每页显示 20 50 100
A Feasibility Study of Renewable Energy Generation from Palm Oil Waste in Malaysia
1
作者 Mujahid Tabassum Md.Bazlul Mobin Siddique +1 位作者 Hadi Nabipour Afrouzi Saad Bin Abdul Kashem 《Energy Engineering》 2025年第9期3433-3457,共25页
Malaysia,as one of the highest producers of palm oil globally and one of the largest exporters,has a huge potential to use palmoil waste to generate electricity since an abundance of waste is produced during the palmo... Malaysia,as one of the highest producers of palm oil globally and one of the largest exporters,has a huge potential to use palmoil waste to generate electricity since an abundance of waste is produced during the palmoil extraction process.In this paper,we have first examined and compared the use of palmoil waste as biomass for electricity generation in different countries with reference to Malaysia.Some areas with default accessibility in rural areas,like those in Sabah and Sarawak,require a cheap and reliable source of electricity.Palm oil waste possesses the potential to be the source.Therefore,this research examines the cost-effective comparison between electricity generated frompalm oil waste and standalone diesel electric generation in Marudi,Sarawak,Malaysia.This research aims to investigate the potential electricity generation using palm oil waste and the feasibility of implementing the technology in rural areas.To implement and analyze the feasibility,a case study has been carried out in a rural area in Sarawak,Malaysia.The finding shows the electricity cost calculation of small towns like Long Lama,Long Miri,and Long Atip,with ten nearby schools,and suggests that using EFB from palm oil waste is cheaper and reduces greenhouse gas emissions.The study also points out the need to conduct further research on power systems,such as energy storage andmicrogrids,to better understand the future of power systems.By collecting data through questionnaires and surveys,an analysis has been carried out to determine the approximate cost and quantity of palm oil waste to generate cheaper renewable energy.We concluded that electricity generation from palm oil waste is cost-effective and beneficial.The infrastructure can be a microgrid connected to the main grid. 展开更多
关键词 Electricity generation energy sustainability palm oil waste management rural areas energy source
在线阅读 下载PDF
A survey of edge computing-based designs for IoT security 被引量:15
2
作者 Kewei Sha T.Andrew Yang +1 位作者 Wei Wei Sadegh Davari 《Digital Communications and Networks》 SCIE 2020年第2期195-202,共8页
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi... Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues. 展开更多
关键词 Edge computing Internet of Things(IoT) SECURITY Architecture Secure protocols FIREWALL Intrusion detection Authentication AUTHORIZATION Privacy
在线阅读 下载PDF
Zero Trust Networks: Evolution and Application from Concept to Practice
3
作者 Yongjun Ren Zhiming Wang +3 位作者 Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 2025年第2期1593-1613,共21页
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ... In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions. 展开更多
关键词 Zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
在线阅读 下载PDF
Dietary and metabolomic determinants of relapse in ulcerative colitis patients: A pilot prospective cohort study 被引量:12
4
作者 Ammar Hassanzadeh Keshtel iFloris F van den Brand +9 位作者 Karen L Madsen Rupasri Mandal Rosica ValchevaKaren I Kroeker Beomsoo Han Rhonda C Bell Janis Cole Thomas Hoevers David S Wishart Richard N Fedorak Levinus A Dieleman 《World Journal of Gastroenterology》 SCIE CAS 2017年第21期3890-3899,共10页
AIM To identify demographic, clinical, metabolomic, and lifestyle related predictors of relapse in adult ulcerative colitis(UC) patients.METHODS In this prospective pilot study, UC patients in clinical remission were ... AIM To identify demographic, clinical, metabolomic, and lifestyle related predictors of relapse in adult ulcerative colitis(UC) patients.METHODS In this prospective pilot study, UC patients in clinical remission were recruited and followed-up at 12 mo to assess a clinical relapse, or not. At baseline information on demographic and clinical parameters was collected. Serum and urine samples were collected for analysis of metabolomic assays using a combined direct infusion/liquid chromatography tandem mass spectrometry and nuclear magnetic resolution spectroscopy. Stool samples were also collected to measure fecal calprotectin(FCP). Dietary assessment was performed using a validated self-administered food frequency questionnaire. RESULTS Twenty patients were included(mean age: 42.7 ± 14.8 years, females: 55%). Seven patients(35%) experienced a clinical relapse during the follow-up period. While 6 patients(66.7%) with normal body weight developed a clinical relapse, 1 UC patient(9.1%) who was overweight/obese relapsed during the follow-up(P = 0.02). At baseline, poultry intake was significantly higher in patients who were still in remission during follow-up(0.9 oz vs 0.2 oz, P = 0.002). Five patients(71.4%) with FCP > 150 μg/g and 2 patients(15.4%) with normal FCP(≤ 150 μg/g) at baseline relapsed during the follow-up(P = 0.02). Interestingly, baseline urinary and serum metabolomic profiling of UC patients with or without clinical relapse within 12 mo showed a significant difference. The most important metabolites that were responsible for this discrimination were trans-aconitate, cystine and acetamide in urine, and 3-hydroxybutyrate, acetoacetate and acetone in serum. CONCLUSION A combination of baseline dietary intake, fecal calprotectin, and metabolomic factors are associated with risk of UC clinical relapse within 12 mo. 展开更多
关键词 Ulcerative colitis RELAPSE Metabolomics DIET Fecal calprotectin
暂未订购
Neurocognitive Graphs of First-Episode Schizophrenia and Major Depression Based on Cognitive Features 被引量:7
5
作者 Sugai Liang Roberto Vega +8 位作者 Xiangzhen Kong Wei Deng Qiang Wang Xiaohong Ma Mingli Li Xun Hu Andrew J.Greenshaw Russell Greiner Tao Li 《Neuroscience Bulletin》 SCIE CAS CSCD 2018年第2期312-320,共9页
Neurocognitive deficits are frequently observed in patients with schizophrenia and major depressive disorder(MDD). The relations between cognitive features may be represented by neurocognitive graphs based on cognitiv... Neurocognitive deficits are frequently observed in patients with schizophrenia and major depressive disorder(MDD). The relations between cognitive features may be represented by neurocognitive graphs based on cognitive features, modeled as Gaussian Markov random fields. However, it is unclear whether it is possible to differentiate between phenotypic patterns associated with the differential diagnosis of schizophrenia and depression using this neurocognitive graph approach. In this study, we enrolled 215 first-episode patients with schizophrenia(FES), 125 with MDD, and 237 demographically-matched healthy controls(HCs). The cognitive performance of all participants was evaluated using a battery of neurocognitive tests. The graphical LASSO model was trained with aone-vs-one scenario to learn the conditional independent structure of neurocognitive features of each group. Participants in the holdout dataset were classified into different groups with the highest likelihood. A partial correlation matrix was transformed from the graphical model to further explore the neurocognitive graph for each group. The classification approach identified the diagnostic class for individuals with an average accuracy of 73.41% for FES vs HC, 67.07% for MDD vs HC, and 59.48% for FES vs MDD. Both of the neurocognitive graphs for FES and MDD had more connections and higher node centrality than those for HC. The neurocognitive graph for FES was less sparse and had more connections than that for MDD.Thus, neurocognitive graphs based on cognitive features are promising for describing endophenotypes that may discriminate schizophrenia from depression. 展开更多
关键词 SCHIZOPHRENIA Major depressive disorder NEUROCOGNITION Neurocognitive graph Graphical LASSO
原文传递
BIFURCATIONS OF TRAVELLING WAVE SOLUTIONS FOR THE GENERALIZED DODD-BULLOUGH-MIKHAILOV EQUATION 被引量:7
6
作者 Tang Shengqiang Huang Wentao 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2007年第1期21-28,共8页
In this paper, the generalized Dodd-Bullough-Mikhailov equation is studied. The existence of periodic wave and unbounded wave solutions is proved by using the method of bifurcation theory of dynamical systems. Under d... In this paper, the generalized Dodd-Bullough-Mikhailov equation is studied. The existence of periodic wave and unbounded wave solutions is proved by using the method of bifurcation theory of dynamical systems. Under different parametric conditions, various sufficient conditions to guarantee the existence of the above solutions are given.Some exact explicit parametric representations of the above travelling solutions are obtained. 展开更多
关键词 unbounded travelling wave solution periodic travelling wave solution the generalized Dodd- Bullough-Mikhailov equation.
在线阅读 下载PDF
Identification of candidate genes for drought stress tolerance in rice by the integration of a genetic (QTL) map with the rice genome physical map 被引量:6
7
作者 汪旭升 朱军 +1 位作者 MANSUETO Locedie BRUSKIEWICH Richard 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE EI CAS CSCD 2005年第5期382-388,共7页
Genetic improvement for drought stress tolerance in rice involves the quantitative nature of the trait, which reflects the additive effects of several genetic loci throughout the genome. Yield components and related t... Genetic improvement for drought stress tolerance in rice involves the quantitative nature of the trait, which reflects the additive effects of several genetic loci throughout the genome. Yield components and related traits under stressed and well-water conditions were assayed in mapping populations derived from crosses of Azucena×IR64 and Azucena×Bala. To find the candidate rice genes underlying Quantitative Trait Loci (QTL) in these populations, we conducted in silico analysis of a candidate region flanked by the genetic markers RM212 and RM319 on chromosome 1, proximal to the semi-dwarf (sd1) locus. A total of 175 annotated genes were identified from this region. These included 48 genes annotated by functional homology to known genes, 23 pseudogenes, 24 ab initio predicted genes supported by an alignment match to an EST (Expressed sequence tag) of unknown function, and 80 hypothetical genes predicted solely by ab initio means. Among these, 16 candidate genes could potentially be involved in drought stress response. 展开更多
关键词 Rice genome sequence Candidate genes Drought stress Quantitative Trait Loci (QTL)
在线阅读 下载PDF
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles 被引量:6
8
作者 Ziming Liu Yang Xu +2 位作者 Cheng Zhang Haroon Elahi Xiaokang Zhou 《Digital Communications and Networks》 SCIE CSCD 2022年第6期976-983,共8页
Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services w... Social Internet of Vehicles(SIoV)falls under the umbrella of social Internet of Things(IoT),where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology,which brings new opportunities and challenges,e.g.,collaborative power trading can address the mileage anxiety of electric vehicles.However,it relies on a trusted central party for scheduling,which introduces performance bottlenecks and cannot be set up in a distributed network,in addition,the lack of transparency in state-of-the-art Vehicle-to-Vehicle(V2V)power trading schemes can introduce further trust issues.In this paper,we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center.Based on the game theory,we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare.We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching.The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid. 展开更多
关键词 Social internet of vehicles Bl ockchain Collaborative power trading Vehicle-to-vehicle charging 5G
在线阅读 下载PDF
Software for Small-scale Robotics: A Review 被引量:2
9
作者 Tobias Tiemerding Sergej Fatikow 《International Journal of Automation and computing》 EI CSCD 2018年第5期515-524,共10页
In recent years, a large number of relatively advanced and often ready-to-use robotic hardware components and systems have been developed for small-scale use. As these tools are mature, there is now a shift towards ad... In recent years, a large number of relatively advanced and often ready-to-use robotic hardware components and systems have been developed for small-scale use. As these tools are mature, there is now a shift towards advanced applications. These often require automation and demand reliability, efficiency and decisional autonomy. New software tools and algorithms for artificial intelligence(AI) and machine learning(ML) can help here. However, since there are many software-based control approaches for small-scale robotics, it is rather unclear how these can be integrated and which approach may be used as a starting point. Therefore, this paper attempts to shed light on existing approaches with their advantages and disadvantages compared to established requirements. For this purpose, a survey was conducted in the target group. The software categories presented include vendor-provided software, robotic software frameworks(RSF), scientific software and in-house developed software(IHDS). Typical representatives for each category are described in detail, including Smar Act precision tool commander, Math Works Matlab and national instruments Lab VIEW, as well as the robot operating system(ROS). The identified software categories and their representatives are rated for end user satisfaction based on functional and non-functional requirements, recommendations and learning curves. The paper concludes with a recommendation of ROS as a basis for future work. 展开更多
关键词 Robotic control software engineering micro/nano robotics artificial intelligence (AI) machine learning (ML) OPEN
原文传递
An Analytical Model for Torus Networks in the Presence of Batch Message Arrivals with Hot-spot Destinations 被引量:1
10
作者 Yulei Wu Geyong Min +1 位作者 Mohamed Ould-Khaoua Hao Yin 《International Journal of Automation and computing》 EI 2009年第1期38-47,共10页
Interconnection networks are hardware fabrics supporting communications between individual processors in multi- computers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracted... Interconnection networks are hardware fabrics supporting communications between individual processors in multi- computers. The low-dimensional k-ary n-cubes (or torus) with adaptive wormhole switching have attracted significant research efforts to construct high-performance interconnection networks in contemporary multi-computers. The arrival process and destination distribution of messages have great effects on network performance. With the aim of capturing the characteristics of the realistic traffic pattern and obtaining a deep understanding of the performance behaviour of interconneetion networks, this paper presents an analytical model to investigate the message latency in adaptive-routed wormhole-switched torus networks where there exists hot-spot nodes and the message arrivals follow a batch arrival process. Each generated message has a given probability to be directed to the hot-spot node. The average degree of virtual channel multiplexing is computed by the GE/G/1/V queueing system with finite buffer capacity. We compare analytical results of message latency with those obtained through the simulation experiments in order to validate the accuracy of the derived model. 展开更多
关键词 Multi-computers interconnection networks non-uniform traffic generalised exponential distribution GE/G/1/V.
在线阅读 下载PDF
Thermal behaviors, combustion mechanisms,evolved gasses, and ash analysis of spent potlining for a hazardous waste management 被引量:1
11
作者 Guang Sun Gang Zhang +2 位作者 Jingyong Liu Deniz Eren Evrendilek Musa Buyukada 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2021年第9期124-137,共14页
An unavoidable but reusable waste so as to enhance a more circular waste utilization has been spent potlining(SPL) generated by the aluminum industry.The combustion mechanisms, evolved gasses, and ash properties of SP... An unavoidable but reusable waste so as to enhance a more circular waste utilization has been spent potlining(SPL) generated by the aluminum industry.The combustion mechanisms, evolved gasses, and ash properties of SPL were characterized dynamically in response to the elevated temperature and heating rates.Differential scanning calorimetric(DSC) results indicated an exothermic reaction behavior probably able to meet the energy needs of various industrial applications.The reaction mechanisms for the SPL combustion were best described using the 1.5-, 3-and 2.5-order reaction models.Fluoride volatilization rate of the flue gas was estimated at 2.24%.The SPL combustion emitted CO_(2), HNCO, NO, and NO_(2) but SO_(x).The joint optimization of remaining mass, derivative thermogravimetry, and derivative DSC was achieved with the optimal temperature and heating rate combination of 783.5 ℃, and 5 ℃/min, respectively.Interaction between temperature and heating rate exerted the strongest and weakest impact on DSC and remaining mass, respectively.The fluorine mainly as the formation of substantial NaF and CaF_(2) in the residual ash.Besides,the composition and effect of environment of residual solid were evaluated.The ash slagging tendency and its mineral deposition mechanisms were elucidated in terms of turning SPL waste into a benign input to a circular waste utilization. 展开更多
关键词 Spent potlining Thermal decomposition Heat release Reaction mechanism Gas emission
原文传递
3-D distribution of tensile stress in rock specimens for the Brazilian test 被引量:1
12
作者 Yong Yu Chunyan Meng 《Journal of University of Science and Technology Beijing》 CSCD 2005年第6期495-499,共5页
It is claimed that the formula used for calculating the tensile strength of a disk-shaped rock specimen in the Brazilian test is not accurate, because the formula is based on the 2-dimensional elastic theory and only ... It is claimed that the formula used for calculating the tensile strength of a disk-shaped rock specimen in the Brazilian test is not accurate, because the formula is based on the 2-dimensional elastic theory and only suitable for very long or very short cylinders. The Matlab software was used to obtain the 2-dimensional distribution of stress in the rock specimen for Brazilian test. Then the 2-dimensional stress distribution in Brazilian disk was analyzed by the Marc FEM software. It can be found that the results obtained by the two software packages can verify each other. Finally, the 3-dimensional elastic stress in the specimen was calculated. The results demonstrate that the distribution of stress on the cross section of the specimen is similar to that in 2-dimension. However, the value of the stress on the cross section varies along the thickness of the specimen and the stress is bigger when getting closer to the end of the specimen. For the specimen with a height-to-diameter ratio of 1 and a Poisson's ratio of 0.25, the tensile strength calculated with the classical 2-D formula is 23.3% smaller than the real strength. Therefore, the classical 2-D formula is too conservative. 展开更多
关键词 Brazilian test tensile strength FEM ROCK MARC MATLAB
在线阅读 下载PDF
Note on Implementation of Three-Qubit SWAP Gate
13
作者 魏海瑞 狄尧民 +1 位作者 王艳 张洁 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第1期78-82,共5页
In this paper, the synthesis and implementation of three-qubit SWAP gate is discussed. The three-qubit SWAP gate can be decomposed into product of 2 two-qubit SWAP gates, and it can be realized by 6 CNOT gates. Resear... In this paper, the synthesis and implementation of three-qubit SWAP gate is discussed. The three-qubit SWAP gate can be decomposed into product of 2 two-qubit SWAP gates, and it can be realized by 6 CNOT gates. Research illustrated that although the result is very simple, the current methods of matrix decomposition for multi-qubit gate can not get that. Then the implementation of three-qubit SWAP gate in the three spin system with Ising interaction is investigated and the sequence of control pulse and drift process to implement the gate is given. It needs 23 control pulses and 12 drift processes. Since the interaction can not be switched on and off at will, the realization of three-qubit SWAP gate in specific quantum system also can not simply come down to 2 two-qubit SWAP gates. 展开更多
关键词 three-qubit SWAP gate matrix decomposition three spin system Ising interaction
在线阅读 下载PDF
Lipschitz continuity of the optimal value function and KKT solution set in indefinite quadratic programs
14
作者 HAN You-pan CHEN Zhi-ping ZHANG Feng 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2015年第1期102-110,共9页
When all the involved data in indefinite quadratic programs change simultaneously, we show the locally Lipschtiz continuity of the KKT set of the quadratic programming problem firstly, then we establish the locally Li... When all the involved data in indefinite quadratic programs change simultaneously, we show the locally Lipschtiz continuity of the KKT set of the quadratic programming problem firstly, then we establish the locally Lipschtiz continuity of the KKT solution set. Finally, the similar conclusion for the corresponding optimal value function is obtained. 展开更多
关键词 quadratic program Lipschitz continuity value function feasible solution KKT solution set.
在线阅读 下载PDF
Reliability Analysis of Correlated Competitive and Dependent Components Considering Random Isolation Times
15
作者 Shuo Cai Tingyu Luo +3 位作者 Fei Yu Pradip Kumar Sharma Weizheng Wang Lairong Yin 《Computers, Materials & Continua》 SCIE EI 2023年第9期2763-2777,共15页
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosenso... In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency.In Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy efficiency.When the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting power.However,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the system.Therefore,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is considered.This approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing failures.Finally,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail. 展开更多
关键词 BSN Internet of Things reliability analysis random isolation time
在线阅读 下载PDF
Hierarchical annotation method for metal corrosion detection of power equipment
16
作者 Zhang Baili Cao YongZhang Pei +2 位作者 Zhang Zhao He Yina Zhong Mingjun 《Journal of Southeast University(English Edition)》 EI CAS 2021年第4期350-355,共6页
To solve the ambiguity and uncertainty in the labeling process of power equipment corrosion datasets,a novel hierarchical annotation method(HAM)is proposed.Firstly,large boxes are used to label a large area covering t... To solve the ambiguity and uncertainty in the labeling process of power equipment corrosion datasets,a novel hierarchical annotation method(HAM)is proposed.Firstly,large boxes are used to label a large area covering the range of corrosion,provided that the area is visually continuous and adjacent to corrosion that cannot be clearly divided.Secondly,in each labeling box established in the first step,regions with distinct corrosion and relative independence are labeled to form a second layer of nested boxes.Finally,a series of comparative experiments are conducted with other common annotation methods to validate the effectiveness of HAM.The experimental results show that,with the help of HAM,the recall of YOLOv5 increases from 50.79%to 59.41%;the recall of Faster R-CNN+VGG16 increases from 66.50%to 78.94%;the recall of Faster R-CNN+Res101 increases from 78.32%to 84.61%.Therefore,HAM can effectively improve the detection ability of mainstream models in detecting metal corrosion. 展开更多
关键词 deep learning Faster R-CNN YOLOv5 object detection hierarchical annotation
在线阅读 下载PDF
On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay
17
作者 Mznah AL-RODHAAN Lewis MACKENZIE Mohamed OULD-KHAOUA 《International Journal of Communications, Network and System Sciences》 2009年第3期203-210,共8页
In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a c... In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality where this set changes over time. We introduce a traffic locality oriented route discovery algorithm with delay, TLRDA-D. It utilises traffic locality by establishing a neighbourhood that includes the most likely destinations for a particular source node. The source node broadcasts the route request according to the original routing used. However, each intermediate node broadcasts the route request with a delay beyond this boundary to give priority for route requests that are travelling within their own source node’s neighbourhood region. This ap-proach improves the end-to-end delay and packet loss, as it generates less contention throughout the network. TLRDA-D is analysed using simulation to study the effect of adding a delay to route request propagation and to decide on the amount of the added delay. 展开更多
关键词 MANETS ON-DEMAND Routing Protocols ROUTE DISCOVERY DELAY CONGESTION Simulation Analysis
在线阅读 下载PDF
Early Diagnosis of Lung Tumors for Extending Patients’ Life Using Deep Neural Networks
18
作者 A.Manju R.Kaladevi +6 位作者 Shanmugasundaram Hariharan Shih-Yu Chen Vinay Kukreja Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 SCIE EI 2023年第7期993-1007,共15页
The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tum... The medical community has more concern on lung cancer analysis.Medical experts’physical segmentation of lung cancers is time-consuming and needs to be automated.The research study’s objective is to diagnose lung tumors at an early stage to extend the life of humans using deep learning techniques.Computer-Aided Diagnostic(CAD)system aids in the diagnosis and shortens the time necessary to detect the tumor detected.The application of Deep Neural Networks(DNN)has also been exhibited as an excellent and effective method in classification and segmentation tasks.This research aims to separate lung cancers from images of Magnetic Resonance Imaging(MRI)with threshold segmentation.The Honey hook process categorizes lung cancer based on characteristics retrieved using several classifiers.Considering this principle,the work presents a solution for image compression utilizing a Deep Wave Auto-Encoder(DWAE).The combination of the two approaches significantly reduces the overall size of the feature set required for any future classification process performed using DNN.The proposed DWAE-DNN image classifier is applied to a lung imaging dataset with Radial Basis Function(RBF)classifier.The study reported promising results with an accuracy of 97.34%,whereas using the Decision Tree(DT)classifier has an accuracy of 94.24%.The proposed approach(DWAE-DNN)is found to classify the images with an accuracy of 98.67%,either as malignant or normal patients.In contrast to the accuracy requirements,the work also uses the benchmark standards like specificity,sensitivity,and precision to evaluate the efficiency of the network.It is found from an investigation that the DT classifier provides the maximum performance in the DWAE-DNN depending on the network’s performance on image testing,as shown by the data acquired by the categorizers themselves. 展开更多
关键词 Lung tumor deep wave auto encoder decision tree classifier deep neural networks extraction techniques
在线阅读 下载PDF
Semi-supervised learning based hybrid beamforming under time-varying propagation environments
19
作者 Yin Long Hang Ding Simon Murphy 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1168-1177,共10页
Hybrid precoding is considered as a promising low-cost technique for millimeter wave(mm-wave)massive Multi-Input Multi-Output(MIMO)systems.In this work,referring to the time-varying propagation circumstances,with semi... Hybrid precoding is considered as a promising low-cost technique for millimeter wave(mm-wave)massive Multi-Input Multi-Output(MIMO)systems.In this work,referring to the time-varying propagation circumstances,with semi-supervised Incremental Learning(IL),we propose an online hybrid beamforming scheme.Firstly,given the constraint of constant modulus on analog beamformer and combiner,we propose a new broadnetwork-based structure for the design model of hybrid beamforming.Compared with the existing network structure,the proposed network structure can achieve better transmission performance and lower complexity.Moreover,to enhance the efficiency of IL further,by combining the semi-supervised graph with IL,we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning,where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk.Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update,all transmissions,even the ones during the model update,would make contributions to model update in the proposed method.During the model update,the amount of unlabelled transmissions is very large and they also carry some information,the prediction performance can be enhanced to some extent by these unlabelled channel data.Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach.Besides,we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach. 展开更多
关键词 Hybrid beamforming Time-varying environments Broad network Semi-supervised learning Online learning
在线阅读 下载PDF
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs
20
作者 Kui Zhu Yongjun Ren +2 位作者 Jian Shen Pandi Vijayakumar Pradip Kumar Sharma 《Digital Communications and Networks》 SCIE CSCD 2024年第1期142-149,共8页
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machi... With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep learning.Federated Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data sets.However,FDL can only guarantee data security and privacy among multiple clients during data training.If the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively affected.In this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs.Specifically,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and recovery.In addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data dynamics.Finally,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear groups.Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs. 展开更多
关键词 Internet of vehicles Federated deep learning Data security Data auditing Data locating and recovery
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部