期刊文献+
共找到334篇文章
< 1 2 17 >
每页显示 20 50 100
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:2
1
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
原文传递
Application of Big Data in Agricultural Informationization in Shandong Province under the Background of "Internet +" 被引量:1
2
作者 Xinling GAN Yong LI 《Asian Agricultural Research》 2019年第4期1-3,共3页
This paper explains the basic concepts of " Internet + " and big data,analyzes the main problems in the application of big data technology in agricultural informationization of Shandong Province,summarizes c... This paper explains the basic concepts of " Internet + " and big data,analyzes the main problems in the application of big data technology in agricultural informationization of Shandong Province,summarizes corresponding solutions from the aspects of government guidance,financial input,open sharing of agricultural big data,big data storage and processing,data mining,etc.,and prospects the application trend of big data technology in agricultural informationization to achieve the connotative development of agriculture in Shandong Province. 展开更多
关键词 AGRICULTURAL informationization 'Internet +' BIG DATA
在线阅读 下载PDF
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
3
作者 Jing Xu Fei Xu +2 位作者 Xiao-Jun Chen Jin-Qiao Shi Cheng Qi 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期16-21,共6页
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive... Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information leakage.This paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by Trojan.In particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content analysis.Heartbeat behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage happens.Experiments indicate that the system is reliable and efficient in detecting information leakage.The system can also help to collect and preserve digital evidence when information leakage incident occurs. 展开更多
关键词 information leakage heartbeat behavior Trojan detection digital forensics
在线阅读 下载PDF
Application of Web data mining technology in the information security management
4
作者 Wang Kun 《Journal of Zhouyi Research》 2014年第1期55-57,共3页
关键词 信息安全管理 应用模型 WEB挖掘技术 APRIORI算法 网络信息安全 数据挖掘技术 安全管理系统 关联分析
在线阅读 下载PDF
Subgroup Analysis of a Single-Index Threshold Penalty Quantile Regression Model Based on Variable Selection
5
作者 QI Hui XUE Yaxin 《Wuhan University Journal of Natural Sciences》 2025年第2期169-183,共15页
In clinical research,subgroup analysis can help identify patient groups that respond better or worse to specific treatments,improve therapeutic effect and safety,and is of great significance in precision medicine.This... In clinical research,subgroup analysis can help identify patient groups that respond better or worse to specific treatments,improve therapeutic effect and safety,and is of great significance in precision medicine.This article considers subgroup analysis methods for longitudinal data containing multiple covariates and biomarkers.We divide subgroups based on whether a linear combination of these biomarkers exceeds a predetermined threshold,and assess the heterogeneity of treatment effects across subgroups using the interaction between subgroups and exposure variables.Quantile regression is used to better characterize the global distribution of the response variable and sparsity penalties are imposed to achieve variable selection of covariates and biomarkers.The effectiveness of our proposed methodology for both variable selection and parameter estimation is verified through random simulations.Finally,we demonstrate the application of this method by analyzing data from the PA.3 trial,further illustrating the practicality of the method proposed in this paper. 展开更多
关键词 longitudinal data subgroup analysis threshold model quantile regression variable selection
原文传递
Walsh Spectral Characteristics and the Auto-Correlation Function Characteristics of Forming Orthomorphic Permutations of Multi-Output Functions 被引量:4
6
作者 ZHAO Yaqun WANG Jue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1895-1898,共4页
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize... Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained. 展开更多
关键词 orthomorphic permutation multi-output functions walsh spectral auto-correlation function
在线阅读 下载PDF
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack 被引量:5
7
作者 Xiaoyu Xu Hao Hu +3 位作者 Yuling Liu Jinglei Tan Hongqi Zhang Haotian Song 《Digital Communications and Networks》 SCIE CSCD 2022年第3期373-387,共15页
Eavesdropping attacks have become one of the most common attacks on networks because of their easy implementation. Eavesdropping attacks not only lead to transmission data leakage but also develop into other more harm... Eavesdropping attacks have become one of the most common attacks on networks because of their easy implementation. Eavesdropping attacks not only lead to transmission data leakage but also develop into other more harmful attacks. Routing randomization is a relevant research direction for moving target defense, which has been proven to be an effective method to resist eavesdropping attacks. To counter eavesdropping attacks, in this study, we analyzed the existing routing randomization methods and found that their security and usability need to be further improved. According to the characteristics of eavesdropping attacks, which are “latent and transferable”, a routing randomization defense method based on deep reinforcement learning is proposed. The proposed method realizes routing randomization on packet-level granularity using programmable switches. To improve the security and quality of service of legitimate services in networks, we use the deep deterministic policy gradient to generate random routing schemes with support from powerful network state awareness. In-band network telemetry provides real-time, accurate, and comprehensive network state awareness for the proposed method. Various experiments show that compared with other typical routing randomization defense methods, the proposed method has obvious advantages in security and usability against eavesdropping attacks. 展开更多
关键词 Routing randomization Moving target defense Deep reinforcement learning Deep deterministic policy gradient
在线阅读 下载PDF
A Practical Intrusion Detection System for Internet of Vehicles 被引量:2
8
作者 Wenliang Fu Xin Xin +1 位作者 Ping Guo Zhou Zhou 《China Communications》 SCIE CSCD 2016年第10期263-275,共13页
Internet of Vehicles(henceforth called IoV) is a public network system and high-value target for intrusions that may cause efficiency issues, privacy leakages or even physical damage. Conventional intrusion detection ... Internet of Vehicles(henceforth called IoV) is a public network system and high-value target for intrusions that may cause efficiency issues, privacy leakages or even physical damage. Conventional intrusion detection methods are normally designed for the Internet infrastructures which cannot directly apply in the context of IoV. This work proposes an FPGA based intrusion detection method that can not only achieve real-time scanning performance but also be applied in vehicular environment. We evaluate our scheme on a Xilinx FPGA based platform. Experiments show that the proposed system can achieve a throughput of more than 39 Gbps on existing FPGA platform which is about 15% higher than state-of-the-art techniques,and the total power consumption for the prototype is about 7.5 w. Moreover, the processing latency of the prototype is about 4 us and is about one sixtieth part of the popular software IDS systems. 展开更多
关键词 internet of vehicles intrusion detection VANET FPGA
在线阅读 下载PDF
2-D DIRECTION FINDING OF COHERENT SIGNALS VIA TEMPORO-SPATIAL PROCESSING 被引量:2
9
作者 Jin Liang Yao Minli Yin Qinye 《Journal of Electronics(China)》 2000年第1期31-37,共7页
In most wireless communication systems, two-dimensional Directions-Of-Arrival (DOA) of multipath signals need to be found for spatial selective transmission. However, it is quite difficult to find their DOAs due to th... In most wireless communication systems, two-dimensional Directions-Of-Arrival (DOA) of multipath signals need to be found for spatial selective transmission. However, it is quite difficult to find their DOAs due to the coherent nature of multipath signals and considerable computations when performing 2-D searches. In this paper, a new algorithm to estimate 2-D DOA of multiple narrow-band signals is proposed. A DOA cyclic matrix is constructed whose eigenvalues and eigenvectors can be simultaneously used to extract 2-D DOA without 2-D searches. By exploiting the temporal property of cyclostationarity, the signal detection capability is significantly improved. Besides, based on the decorrelation model for mobile terminal signals, the algorithm can be effectively extended to the coherent case without spatial smoothing and the loss of array aperture. Simulation results are given to illustrate the performance of the new algorithm. 展开更多
关键词 DOA Coherent signal Temporo-Spatial processing
在线阅读 下载PDF
Structural and optical properties of ZnO films prepared by ion beam sputtering 被引量:2
10
作者 吴慎将 苏俊宏 王稳奇 《Optoelectronics Letters》 EI 2012年第6期449-452,共4页
Based on the ion beam sputtering deposition technology,ZnO thin films are deposited on the glass substrate.The four-factor and three-level L 9(34)orthogonal experiment is used to obtain the best technological paramete... Based on the ion beam sputtering deposition technology,ZnO thin films are deposited on the glass substrate.The four-factor and three-level L 9(34)orthogonal experiment is used to obtain the best technological parameters of the deposited ZnO thin films,which are the discharge voltage of 3.5 kV,the oxygen current capacity of 8 sccm,the coil current of 8 A and the distance between target and substrate of 140 mm.The purity of the deposited ZnO thin film is 85.77%,and it has good crystallization in orientation.The experimental results show that research and development of the ion beam sputtering source are advanced,and the ion beam sputtering deposition technology can be used to deposit the orientation preferred thin films with good performance. 展开更多
关键词 DEPOSITS Optical films Optical properties SUBSTRATES
原文传递
40 Hz Auditory Steady State Response to Linguistic Features of Stimuli during Auditory Hallucinations 被引量:1
11
作者 应俊 闫铮 高小榕 《Journal of Huazhong University of Science and Technology(Medical Sciences)》 SCIE CAS 2013年第5期748-753,共6页
The auditory steady state response (ASSR) may reflect activity from different regions of the brain, depending on the modulation frequency used. In general, responses induced by low rates (_〈40 Hz) emanate mostly ... The auditory steady state response (ASSR) may reflect activity from different regions of the brain, depending on the modulation frequency used. In general, responses induced by low rates (_〈40 Hz) emanate mostly from central structures of the brain, and responses from high rates (〉80 Hz) emanate mostly from the peripheral auditory nerve or brainstem structures. Besides, it was reported that the gamma band ASSR (30-90 Hz) played an important role in working memory, speech understanding and recognition. This paper investigated the 40 Hz ASSR evoked by modulated speech and reversed speech. The speech was Chinese phrase voice, and the noise-like reversed speech was obtained by temporally reversing the speech. Both auditory stimuli were modulated with a frequency of 40 Hz. Ten healthy subjects and 5 patients with hallucination symptom participated in the experiment. Results showed re- duction in left auditory cortex response when healthy subjects listened to the reversed speech compared with the speech. In contrast, when the patients who experienced auditory hallucinations listened to the reversed speech, the auditory cortex of left hemispheric responded more actively. The ASSR results were consistent with the behavior results of patients. Therefore, the gamma band ASSR is expected to be helpful for rapid and objective diagnosis of hallucination in clinic. 展开更多
关键词 auditory steady state response gamma band speech recognition auditory hallucination ELECTROENCEPHALOGRAPH
暂未订购
Deterministic Joint Remote Preparation of an Arbitrary Two-Qubit State Using the Cluster State 被引量:1
12
作者 王明明 陈秀波 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期568-572,共5页
Recently, deterministic joint remote state preparation (JRSP) schemes have been proposed to achieve 100% success probability. In this paper, we propose a new version of deterministic JRSP scheme of an arbitrary two-qu... Recently, deterministic joint remote state preparation (JRSP) schemes have been proposed to achieve 100% success probability. In this paper, we propose a new version of deterministic JRSP scheme of an arbitrary two-qubit state by using the six-qubit cluster state as shared quantum resource. Compared with previous schemes, our scheme has high efficiency since less quantum resource is required, some additional unitary operations and measurements are unnecessary. We point out that the existing two types of deterministic JRSP schemes based on GHZ states and EPR pairs are equivalent. 展开更多
关键词 joint remote state preparation cluster state unit success probability
原文传递
Walsh Spectrum Properties of Rotation Symmetric Boolean Function 被引量:1
13
作者 WANG Yongjuan HAN Wenbao LI Shiqu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1862-1864,共3页
Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function is special. For a Rots n variables function f(x1, x2, …, xn) we have f(ρn^k (x1, x2, …x... Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function is special. For a Rots n variables function f(x1, x2, …, xn) we have f(ρn^k (x1, x2, …xn))=f(x1, x2, …, xn) for k=0, 1, …, n-1. In this paper, useing probability method we find that when the parameters of RotS function is under circular translation of indices, its walsh spectrum is invariant. And we prove the result is both sufficient and necessary. 展开更多
关键词 rotation symmetric function rotation shift Walsh spectra
在线阅读 下载PDF
Spatio-Temporal Distribution of Individual Filaments in a Square Superlattice Pattern in Atmospheric Dielectric Barrier Discharge 被引量:1
14
作者 董丽芳 范伟丽 潘宇扬 《Plasma Science and Technology》 SCIE EI CAS CSCD 2010年第2期172-176,共5页
Spatio-temporal distribution of individual filament in a square superlattice pattern, which consists of large and small spots (filaments), is studied in atmospheric dielectric barrier discharges. The spatial distrib... Spatio-temporal distribution of individual filament in a square superlattice pattern, which consists of large and small spots (filaments), is studied in atmospheric dielectric barrier discharges. The spatial distributions of the two discharges for individual large filament along the direction perpendicular to the electrode are estimated by the distributions of light signals along the electrode. It is found that the discharge at the rising edge of the applied voltage is with a wider column, weaker current, and longer current pulse duration in comparison with that at the falling edge 展开更多
关键词 dielectric barrier charge square superlattice individual filament wall charge
在线阅读 下载PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme 被引量:1
15
作者 Ching-Nung Yang Chih-Cheng Wu Feng Liu 《Journal of Electronic Science and Technology》 CAS 2011年第4期317-324,共8页
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistie VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded. A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS. In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS. 展开更多
关键词 Probabilistic visual cryptography visual cryptography visual secret sharing.
在线阅读 下载PDF
An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things 被引量:1
16
作者 LI Wei TAO Zhi +4 位作者 GU Dawu SUN Li QU Bo LIU Zhiqiang LIU Ya 《China Communications》 SCIE CSCD 2014年第6期129-139,共11页
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ... Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems. 展开更多
关键词 internet of things CRYPTANALYSIS differential fault analysis serpent.
在线阅读 下载PDF
Detection of Coal Mine Spontaneous Combustion by Fuzzy Inference System 被引量:1
17
作者 SUN Ji-ping SONG Shu +1 位作者 MA Feng-ying ZHANG Ya-li 《Journal of China University of Mining and Technology》 EI 2006年第3期258-260,265,共4页
The spontaneous combustion is a smoldering process and characterized by a slow burning speed and a long duration. Therefore, it is a hazard to coal mines. Early detection of coal mine spontaneous combustion is quite d... The spontaneous combustion is a smoldering process and characterized by a slow burning speed and a long duration. Therefore, it is a hazard to coal mines. Early detection of coal mine spontaneous combustion is quite difficult because of the complexity of different coal mines. And the traditional threshold discriminance is not suitable for spontaneous combustion detection due to the uncertainty of coalmine combustion. Restrictions of the single detection method will also affect the detection precision in the early time of spontaneous combustion. Although multiple detection methods can be adopted as a complementarity to improve the accuracy of detection, the synthesized method will in- crease the complicacy of criterion, making it difficult to estimate the combustion. To solve this problem, a fuzzy inference system based on CRI (Compositional Rule of Inference) and fuzzy reasoning method FITA (First Infer Then Aggregate) are presented. And the neural network is also developed to realize the fuzzy inference system. Finally, the effectiveness of the inference system is demonstrated bv means of an experiment. 展开更多
关键词 spontaneous combustion fuzzy inference system CRI FITA neural network
在线阅读 下载PDF
Performance analysis and simulation of TH-PPM UWB system in image transmission 被引量:1
18
作者 YANG Jie WENG Li-na 《通讯和计算机(中英文版)》 2007年第3期60-62,共3页
关键词 仿真 图象传输 TH-PPM-UWB系统 性能 附加怀特高斯噪音通道 误比特率 超频
在线阅读 下载PDF
L^2(R^n) BOUNDEDNESS FOR COMMUTATORS OF OSCILLATORY SINGULAR INTEGRAL OPERATORS 被引量:1
19
作者 Ma Bolin Hu Guoen 《Analysis in Theory and Applications》 2000年第2期37-44,共8页
The commutators of oscillatory singular integral operators with homogeneous kernel $\frac{{\Omega (x)}}{{\left| x \right|^n }}$ are studied, where Ω is homogeneous of degree zero, has mean value zero on the unit sphe... The commutators of oscillatory singular integral operators with homogeneous kernel $\frac{{\Omega (x)}}{{\left| x \right|^n }}$ are studied, where Ω is homogeneous of degree zero, has mean value zero on the unit sphere. It is proved that Ω∈L (logL)K+1(Sn-1) is a sufficient condition under which the k-th order commutator is bounded on L2(Rn). 展开更多
关键词 oscillatory integral operator MULTIPLIER SINGULARITY
在线阅读 下载PDF
A brief overview of traditional Chinese medicine prescription powered by artificial intelligence 被引量:1
20
作者 Hongyun Bao Ruijie Wen +2 位作者 Xuanya Li Chen Zhao Zhineng Chen 《TMR Modern Herbal Medicine》 2021年第2期44-51,共8页
Traditional Chinese medicine prescription is one of the treasures of traditional Chinese medicine(TCM).There are tens of thousands TCM prescriptions accumulated in the past thousands of years,corresponding to differen... Traditional Chinese medicine prescription is one of the treasures of traditional Chinese medicine(TCM).There are tens of thousands TCM prescriptions accumulated in the past thousands of years,corresponding to different diseases,symptoms and therapeutic goals.The correspondences are so complicated that there is an urgent need to leverage new technologies such as artificial intelligence(AI)to analyze,understand and utilize them effectively.In this paper,we present a brief overview of this direction,where current research progress on TCM prescription powered by AI is summarized.Our summarization focuses on three aspects,TCM prescription mining that aims at understanding the TCM prescription,TCM prescription or herb knowledge base construction that aims at extracting knowledge to support the TCM prescription-related study,and TCM prescription discovery that aims at utilizing AI technologies to further energize TCM.It is encouraging to see that steady progress in this direction has been made recently.Besides,a toy experiment on image-based TCM herb recognition by using convolutional neural networks is also conducted.It basically verifies that it is promising to use AI technologies to address challenging tasks in TCM.We also point out several research topics that could be cooperatively performed by researchers from the two disciplines. 展开更多
关键词 Traditional Chinese medicine prescription Artificial intelligence Knowledge base Convolutional neural network Herb recognition
暂未订购
上一页 1 2 17 下一页 到第
使用帮助 返回顶部