With the rapid development of express logistics business side, the traditional sorting has been unable to meet the needs of the logistics courier logistics development. In this case, the article combined with RFID rad...With the rapid development of express logistics business side, the traditional sorting has been unable to meet the needs of the logistics courier logistics development. In this case, the article combined with RFID radio frequency technology, put forward new ideas on the transformation of traditional logistics sorted. By adding RFID tags and binding RFID tags on waybill number, Comparison test validate and affirm that the RFID technology of sorting system is usability and ease of use.展开更多
With the development of new information technologies such as cloud computing, Internet of Things, and mobile Internet of Things, Industry 4.0, Smart Manufacturing and Made in China 2025 have been proposed as the main ...With the development of new information technologies such as cloud computing, Internet of Things, and mobile Internet of Things, Industry 4.0, Smart Manufacturing and Made in China 2025 have been proposed as the main content of the development of the next industrial revolution. In order to realize these projects with the common characteristics of intelligence, service, and green, a new manufacturing model, digital twin, is proposed, which combines the digital twin with industrial systems, that is, the industrial control virtualization system. However, due to the frequent occurrence of industrial control system security incidents in recent years, the industrial control virtualization system is vulnerable to attacks. The industrial control system is huge and cumbersome. Once attacked, it will cause consequences that affect the whole body. In response to this problem, this article carried out a research on DoS attack detection methods for Modbus TCP in OpenPLC, using OpenPLC as a tool for industrial control system virtualization, building a digital twin system with Raspberry Pi, and launching DoS attacks on the system, combined with Snort Intrusion detection is carried out, and the experimental results show that the built digital twin system can detect DoS attacks in OpenPLC.展开更多
This paper mainly studies the risk management of equity investment projects and the identification and evaluation of the main risks in each stage of investment. The main risk described is whether the project benefit c...This paper mainly studies the risk management of equity investment projects and the identification and evaluation of the main risks in each stage of investment. The main risk described is whether the project benefit can reach the expectation, and the deep-seated reasons lie in the risk of policy environment, industrial structure and market forecast. Therefore, we must attach great importance to the research on risk management and supervision system of equity investment projects, and constantly establish and improve the research on supervision system with risk assessment of major business decisions before investment, investigation of business management during investment and post-investment evaluation as the main line, so as to prevent problems before they happen.展开更多
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal ...With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal performance in fine-grained detection tasks,primarily due to imbalanced datasets and insufficient model representation capabilities.To address this challenge,this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection.During the data processing stage,Large Language Models(LLMs)are employed for data augmentation,mitigating dataset imbalance.In the data input stage,both word-level and character-level features are utilized as model inputs,enhancing the richness of features and preventing information loss.A dual-stream Transformer serves as the backbone network in the learning representation stage,complemented by a graph-based feature fusion mechanism.At the output stage,both supervised classification cross-entropy loss and supervised contrastive learning loss are used as multi-task optimization objectives,further enhancing the model’s feature representation.Experimental results demonstrate that the proposed method significantly outperforms baselines on a publicly available Chinese malicious SMS dataset.展开更多
Fusion methods based on multi-scale transforms have become the mainstream of the pixel-level image fusion. However,most of these methods cannot fully exploit spatial domain information of source images, which lead to ...Fusion methods based on multi-scale transforms have become the mainstream of the pixel-level image fusion. However,most of these methods cannot fully exploit spatial domain information of source images, which lead to the degradation of image.This paper presents a fusion framework based on block-matching and 3D(BM3D) multi-scale transform. The algorithm first divides the image into different blocks and groups these 2D image blocks into 3D arrays by their similarity. Then it uses a 3D transform which consists of a 2D multi-scale and a 1D transform to transfer the arrays into transform coefficients, and then the obtained low-and high-coefficients are fused by different fusion rules. The final fused image is obtained from a series of fused 3D image block groups after the inverse transform by using an aggregation process. In the experimental part, we comparatively analyze some existing algorithms and the using of different transforms, e.g. non-subsampled Contourlet transform(NSCT), non-subsampled Shearlet transform(NSST), in the 3D transform step. Experimental results show that the proposed fusion framework can not only improve subjective visual effect, but also obtain better objective evaluation criteria than state-of-the-art methods.展开更多
The explosion inside tunnel would generate blast wave which transmits through the longitudinal tunnel. Because of the close-in effects of the tunnel and the reflection by the confining tunnel structure, blast wave pro...The explosion inside tunnel would generate blast wave which transmits through the longitudinal tunnel. Because of the close-in effects of the tunnel and the reflection by the confining tunnel structure, blast wave propagation inside tunnel is distinguished from that in air. When the explosion happens inside tunnel, the overpressure peak is higher than that of explosion happening in air. The continuance time of the blast wave also becomes longer. With the help of the numerical simulation finite element software LS-DYNA, a three-dimensional nonlinear dynamic simulation analysis for an explosion experiment inside tunnel was carried out. LS-DYNA is a fully integrated analysis program specifically designed for nonlinear dynamics and large strain problems. Compared with the experimental results, the simulation results have made the material parameters of numerical simulation model available. By using the model and the same material parameters, many results were adopted by calculating the model under different TNT explosion dynamites. Then the method of dimensional analysis was used for the simulation results. As overpressures of the explosion blast wave are the governing factor in the tunnel responses, a formula for the explosion blast wave over-pressure at a certain distance from the detonation center point inside the tunnel was derived by using the dimensional analysis theory. By comparing the results computed by the formula with experimental results which were obtained before, the formula was proved to be very applicable at some instance. The research may be helpful to estimate rapidly the effect of internal explosion of tunnel on the structure.展开更多
This paper presents an effective method for motion classification using the surface electromyographic (sEMG) signal collected from the forearm. Given the nonlinear and time-varying nature of EMG signal, the wavelet pa...This paper presents an effective method for motion classification using the surface electromyographic (sEMG) signal collected from the forearm. Given the nonlinear and time-varying nature of EMG signal, the wavelet packet transform (WPT) is introduced to extract time-frequency joint information. Then the multi-class classifier based on the least squares support vector machine (LS-SVM) is constructed and verified in the various motion classification tasks. The results of contrastive experiments show that different motions can be identified with high accuracy by the presented method. Furthermore, compared with other classifiers with different features, the performance indicates the potential of the SVM techniques combined with WPT in motion classification.展开更多
In view of the limited bandwidth of underwater video image transmission,a low bit rate underwater video compression coding method is proposed.Based on the preprocessing process of wavelet transform and coefficient dow...In view of the limited bandwidth of underwater video image transmission,a low bit rate underwater video compression coding method is proposed.Based on the preprocessing process of wavelet transform and coefficient down-sampling,the visual redundancy of underwater image is removed and the computational coefficients and coding bits are reduced.At the same time,combined with multi-level wavelet decomposition,inter frame motion compensation,entropy coding and other methods,according to the characteristics of different types of frame image data,reduce the number of calculations and improve the coding efficiency.The experimental results show that the reconstructed image quality can meet the visual requirements,and the average compression ratio of underwater video can meet the requirements of underwater acoustic channel transmission rate.展开更多
A super-resolution enhancement algorithm was proposed based on the combination of fractional calculus and Projection onto Convex Sets(POCS)for unmanned aerial vehicles(UAVs)images.The representative problems of UAV im...A super-resolution enhancement algorithm was proposed based on the combination of fractional calculus and Projection onto Convex Sets(POCS)for unmanned aerial vehicles(UAVs)images.The representative problems of UAV images including motion blur,fisheye effect distortion,overexposed,and so on can be improved by the proposed algorithm.The fractional calculus operator is used to enhance the high-resolution and low-resolution reference frames for POCS.The affine transformation parameters between low-resolution images and reference frame are calculated by Scale Invariant Feature Transform(SIFT)for matching.The point spread function of POCS is simulated by a fractional integral filter instead of Gaussian filter for more clarity of texture and detail.The objective indices and subjective effect are compared between the proposed and other methods.The experimental results indicate that the proposed method outperforms other algorithms in most cases,especially in the structure and detail clarity of the reconstructed images.展开更多
As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow...As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow method is developed for the ocean wave direction inversion of the ocean wave fields imaged by the X-band radar continuously. The proposed algorithm utilizes the echo images received by the X-band wave monitoring radar to estimate the optical flow motion, and then the actual wave propagation direction can be obtained by taking a weighted average of the motion vector for each pixel. Compared with the traditional ocean wave direction inversion method based on frequency-domain, the novel algorithm is fully using a time-domain signal processing method without determination of a current velocity and a modulation transfer function(MTF). In the meantime,the novel algorithm is simple, efficient and there is no need to do something more complicated here. Compared with traditional ocean wave direction inversion method, the ocean wave direction of derived by using this proposed method matches well with that measured by an in situ buoy nearby and the simulation data. These promising results demonstrate the efficiency and accuracy of the algorithm proposed in the paper.展开更多
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di...Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.展开更多
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, w...This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is exPected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version.展开更多
To research the reinforcement effect of a rock slope with group anchorage cables and the stress characteristics of pre-stressed anchorage cables in the fractured surface, the rock slope calculated model of a wedge blo...To research the reinforcement effect of a rock slope with group anchorage cables and the stress characteristics of pre-stressed anchorage cables in the fractured surface, the rock slope calculated model of a wedge block within the double-slide face was established by using the finite difference software according to the actual slope project combined with indoor model test. The pre-stress loss rule of the anchorage cable and the distribution of axial force and the force-transferring mechanism of the anchorage cable were analyzed during simulation. Also, based on the displacement contour and the safety factor of the calculated results, the quantitative analysis for the reinforcement ef- fect of the rock slope with group pre-stressed anchorage cable was discovered. The results computed by the software conform with the data in the experiment, which can prove the effectiveness and correctness of parameter selection and model building. Keywords group anchorage reinforcement, rock slope, joint fissure, pre-stressed anchorage cable, stress characteristics展开更多
The growth in biomedical data resources has raised potential privacy concerns and risks of genetic information leakage. For instance, exome sequencing aids clinical decisions by comparing data through web services, bu...The growth in biomedical data resources has raised potential privacy concerns and risks of genetic information leakage. For instance, exome sequencing aids clinical decisions by comparing data through web services, but it requires significant trust between users and providers. To alleviate privacy concerns, the most commonly used strategy is to anonymize sensitive data. Unfortunately, studies have shown that anonymization is insufficient to protect against reidentification attacks. Recently, privacy-preserving technologies have been applied to preserve application utility while protecting the privacy of biomedical data. We present the PICOTEES framework, a privacy-preserving online service of phenotype exploration for genetic-diagnostic variants (https://birthdefectlab.cn:3000/). PICOTEES enables privacy-preserving queries of the phenotype spectrum for a single variant by utilizing trusted execution environment technology, which can protect the privacy of the user's query information, backend models, and data, as well as the final results. We demonstrate the utility and performance of PICOTEES by exploring a bioinformatics dataset. The dataset is from a cohort containing 20,909 genetic testing patients with 3,152,508 variants from the Children's Hospital of Fudan University in China, dominated by the Chinese Han population (>99.9%). Our query results yield a large number of unreported diagnostic variants and previously reported pathogenicity.展开更多
To the Editor,Non-human primate(NHP)models are advantageous for mimicking human addiction with high behavioural validity.1 However,current NHP drug addiction models(eg,self-administration)often require a comprehensive...To the Editor,Non-human primate(NHP)models are advantageous for mimicking human addiction with high behavioural validity.1 However,current NHP drug addiction models(eg,self-administration)often require a comprehensive behavioural training paradigm,relatively expensive apparatus and invasive surgical procedures.展开更多
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression,...Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme.展开更多
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ...This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users' data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme.展开更多
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role...Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.展开更多
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req...In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user requirements to implement ecommerce activities like automated transactions.The difficulty lies in the uncertainty of user preferences that include uncertain description and contents,non-linear and dynamic variability.In this paper,fuzzy language was used to describe the uncertainty and combine with multiple classified artificial neural networks(ANNs) for self-adaptive learning of user preferences.The refinement learning results of various negotiation contracts' satisfaction degrees in the extent of fuzzy classification can be achieved.Compared to unclassified computation,the experimental results illustrate that the learning ability and effectiveness of agents have been improved.展开更多
The working stability of thinner-thick gaseous electron multipliers (THGEMs), which have been developed by the University of the Chinese Academy of Sciences and the Second Academy of China's Aerospace Science and I...The working stability of thinner-thick gaseous electron multipliers (THGEMs), which have been developed by the University of the Chinese Academy of Sciences and the Second Academy of China's Aerospace Science and Industry Corporation, is studied with an 8 keV x-ray on a Cu target. Gains of about 103–104 are achieved with a single board in Ar:iC4H10 (97:3). Environmental factors, such as pressure, temperature and humidity are considered. The thinner-THGEMs are shown to perform stably over two months of studies.展开更多
文摘With the rapid development of express logistics business side, the traditional sorting has been unable to meet the needs of the logistics courier logistics development. In this case, the article combined with RFID radio frequency technology, put forward new ideas on the transformation of traditional logistics sorted. By adding RFID tags and binding RFID tags on waybill number, Comparison test validate and affirm that the RFID technology of sorting system is usability and ease of use.
文摘With the development of new information technologies such as cloud computing, Internet of Things, and mobile Internet of Things, Industry 4.0, Smart Manufacturing and Made in China 2025 have been proposed as the main content of the development of the next industrial revolution. In order to realize these projects with the common characteristics of intelligence, service, and green, a new manufacturing model, digital twin, is proposed, which combines the digital twin with industrial systems, that is, the industrial control virtualization system. However, due to the frequent occurrence of industrial control system security incidents in recent years, the industrial control virtualization system is vulnerable to attacks. The industrial control system is huge and cumbersome. Once attacked, it will cause consequences that affect the whole body. In response to this problem, this article carried out a research on DoS attack detection methods for Modbus TCP in OpenPLC, using OpenPLC as a tool for industrial control system virtualization, building a digital twin system with Raspberry Pi, and launching DoS attacks on the system, combined with Snort Intrusion detection is carried out, and the experimental results show that the built digital twin system can detect DoS attacks in OpenPLC.
文摘This paper mainly studies the risk management of equity investment projects and the identification and evaluation of the main risks in each stage of investment. The main risk described is whether the project benefit can reach the expectation, and the deep-seated reasons lie in the risk of policy environment, industrial structure and market forecast. Therefore, we must attach great importance to the research on risk management and supervision system of equity investment projects, and constantly establish and improve the research on supervision system with risk assessment of major business decisions before investment, investigation of business management during investment and post-investment evaluation as the main line, so as to prevent problems before they happen.
基金supported by the Fundamental Research Funds for the Central Universities(2024JKF13)the Beijing Municipal Education Commission General Program of Science and Technology(No.KM202414019003).
文摘With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal performance in fine-grained detection tasks,primarily due to imbalanced datasets and insufficient model representation capabilities.To address this challenge,this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection.During the data processing stage,Large Language Models(LLMs)are employed for data augmentation,mitigating dataset imbalance.In the data input stage,both word-level and character-level features are utilized as model inputs,enhancing the richness of features and preventing information loss.A dual-stream Transformer serves as the backbone network in the learning representation stage,complemented by a graph-based feature fusion mechanism.At the output stage,both supervised classification cross-entropy loss and supervised contrastive learning loss are used as multi-task optimization objectives,further enhancing the model’s feature representation.Experimental results demonstrate that the proposed method significantly outperforms baselines on a publicly available Chinese malicious SMS dataset.
基金supported by the National Natural Science Foundation of China(6157206361401308)+6 种基金the Fundamental Research Funds for the Central Universities(2016YJS039)the Natural Science Foundation of Hebei Province(F2016201142F2016201187)the Natural Social Foundation of Hebei Province(HB15TQ015)the Science Research Project of Hebei Province(QN2016085ZC2016040)the Natural Science Foundation of Hebei University(2014-303)
文摘Fusion methods based on multi-scale transforms have become the mainstream of the pixel-level image fusion. However,most of these methods cannot fully exploit spatial domain information of source images, which lead to the degradation of image.This paper presents a fusion framework based on block-matching and 3D(BM3D) multi-scale transform. The algorithm first divides the image into different blocks and groups these 2D image blocks into 3D arrays by their similarity. Then it uses a 3D transform which consists of a 2D multi-scale and a 1D transform to transfer the arrays into transform coefficients, and then the obtained low-and high-coefficients are fused by different fusion rules. The final fused image is obtained from a series of fused 3D image block groups after the inverse transform by using an aggregation process. In the experimental part, we comparatively analyze some existing algorithms and the using of different transforms, e.g. non-subsampled Contourlet transform(NSCT), non-subsampled Shearlet transform(NSST), in the 3D transform step. Experimental results show that the proposed fusion framework can not only improve subjective visual effect, but also obtain better objective evaluation criteria than state-of-the-art methods.
基金Supported by National Natural Science Foundation of China(No.50678094)
文摘The explosion inside tunnel would generate blast wave which transmits through the longitudinal tunnel. Because of the close-in effects of the tunnel and the reflection by the confining tunnel structure, blast wave propagation inside tunnel is distinguished from that in air. When the explosion happens inside tunnel, the overpressure peak is higher than that of explosion happening in air. The continuance time of the blast wave also becomes longer. With the help of the numerical simulation finite element software LS-DYNA, a three-dimensional nonlinear dynamic simulation analysis for an explosion experiment inside tunnel was carried out. LS-DYNA is a fully integrated analysis program specifically designed for nonlinear dynamics and large strain problems. Compared with the experimental results, the simulation results have made the material parameters of numerical simulation model available. By using the model and the same material parameters, many results were adopted by calculating the model under different TNT explosion dynamites. Then the method of dimensional analysis was used for the simulation results. As overpressures of the explosion blast wave are the governing factor in the tunnel responses, a formula for the explosion blast wave over-pressure at a certain distance from the detonation center point inside the tunnel was derived by using the dimensional analysis theory. By comparing the results computed by the formula with experimental results which were obtained before, the formula was proved to be very applicable at some instance. The research may be helpful to estimate rapidly the effect of internal explosion of tunnel on the structure.
基金Supported by the National Basic Research Program("973"Program, No2005CB724303 )
文摘This paper presents an effective method for motion classification using the surface electromyographic (sEMG) signal collected from the forearm. Given the nonlinear and time-varying nature of EMG signal, the wavelet packet transform (WPT) is introduced to extract time-frequency joint information. Then the multi-class classifier based on the least squares support vector machine (LS-SVM) is constructed and verified in the various motion classification tasks. The results of contrastive experiments show that different motions can be identified with high accuracy by the presented method. Furthermore, compared with other classifiers with different features, the performance indicates the potential of the SVM techniques combined with WPT in motion classification.
文摘In view of the limited bandwidth of underwater video image transmission,a low bit rate underwater video compression coding method is proposed.Based on the preprocessing process of wavelet transform and coefficient down-sampling,the visual redundancy of underwater image is removed and the computational coefficients and coding bits are reduced.At the same time,combined with multi-level wavelet decomposition,inter frame motion compensation,entropy coding and other methods,according to the characteristics of different types of frame image data,reduce the number of calculations and improve the coding efficiency.The experimental results show that the reconstructed image quality can meet the visual requirements,and the average compression ratio of underwater video can meet the requirements of underwater acoustic channel transmission rate.
基金This work is supported by the National Key Research and Development Program of China[grant number 2016YFB0502602]the National Natural Science Foundation of China[grant number 61471272]the Natural Science Foundation of Hubei Province,China[grant number 2016CFB499].
文摘A super-resolution enhancement algorithm was proposed based on the combination of fractional calculus and Projection onto Convex Sets(POCS)for unmanned aerial vehicles(UAVs)images.The representative problems of UAV images including motion blur,fisheye effect distortion,overexposed,and so on can be improved by the proposed algorithm.The fractional calculus operator is used to enhance the high-resolution and low-resolution reference frames for POCS.The affine transformation parameters between low-resolution images and reference frame are calculated by Scale Invariant Feature Transform(SIFT)for matching.The point spread function of POCS is simulated by a fractional integral filter instead of Gaussian filter for more clarity of texture and detail.The objective indices and subjective effect are compared between the proposed and other methods.The experimental results indicate that the proposed method outperforms other algorithms in most cases,especially in the structure and detail clarity of the reconstructed images.
基金The National Key Research and Development Program of China under contract No.2016YFC0800405the Shanghai Municipal Science and Technology Project of China under contract No.15DZ0500600the Specialized Research Fund for the Doctoral Program of Higher Education of China under contract No.2014212020203
文摘As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow method is developed for the ocean wave direction inversion of the ocean wave fields imaged by the X-band radar continuously. The proposed algorithm utilizes the echo images received by the X-band wave monitoring radar to estimate the optical flow motion, and then the actual wave propagation direction can be obtained by taking a weighted average of the motion vector for each pixel. Compared with the traditional ocean wave direction inversion method based on frequency-domain, the novel algorithm is fully using a time-domain signal processing method without determination of a current velocity and a modulation transfer function(MTF). In the meantime,the novel algorithm is simple, efficient and there is no need to do something more complicated here. Compared with traditional ocean wave direction inversion method, the ocean wave direction of derived by using this proposed method matches well with that measured by an in situ buoy nearby and the simulation data. These promising results demonstrate the efficiency and accuracy of the algorithm proposed in the paper.
文摘Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.
文摘This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is exPected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version.
基金Supported by the National Natural Science Foundation of China(50874085)
文摘To research the reinforcement effect of a rock slope with group anchorage cables and the stress characteristics of pre-stressed anchorage cables in the fractured surface, the rock slope calculated model of a wedge block within the double-slide face was established by using the finite difference software according to the actual slope project combined with indoor model test. The pre-stress loss rule of the anchorage cable and the distribution of axial force and the force-transferring mechanism of the anchorage cable were analyzed during simulation. Also, based on the displacement contour and the safety factor of the calculated results, the quantitative analysis for the reinforcement ef- fect of the rock slope with group pre-stressed anchorage cable was discovered. The results computed by the software conform with the data in the experiment, which can prove the effectiveness and correctness of parameter selection and model building. Keywords group anchorage reinforcement, rock slope, joint fissure, pre-stressed anchorage cable, stress characteristics
基金funded by the Shanghai Hospital Development Center(SHDC2020CR6028-002 to W.Zhou)National Key R&D Program of China(2020YFC2006402 to Y.Lu)+7 种基金National Key R&D Program of China(2022ZD0116003 to X.Dong)the Science and Technology Commission of Shanghai(22002400700 to S.Wu)Shanghai Municipal Science and Technology Major Project(20Z11900600 to W.Zhou)National Key Research and Development Program(2018YFC0116903 to W.Zhou)Major Research Projects for Young and Middle-aged People of Fujian Province(2021ZQNZD017 to Y.Lu)supported by Key Lab Information Network Security,Ministry of Public Security(to H.Zheng and S.Wang)“Pioneer”and”Leading Goose”R&D Program of Zhejiang(No.2022C01126 to Q.Sun and S.Wang)National Key R&D Program of China(2021YFC2500802 and 2021YFC2500806 to H.Zheng and S.Wang).
文摘The growth in biomedical data resources has raised potential privacy concerns and risks of genetic information leakage. For instance, exome sequencing aids clinical decisions by comparing data through web services, but it requires significant trust between users and providers. To alleviate privacy concerns, the most commonly used strategy is to anonymize sensitive data. Unfortunately, studies have shown that anonymization is insufficient to protect against reidentification attacks. Recently, privacy-preserving technologies have been applied to preserve application utility while protecting the privacy of biomedical data. We present the PICOTEES framework, a privacy-preserving online service of phenotype exploration for genetic-diagnostic variants (https://birthdefectlab.cn:3000/). PICOTEES enables privacy-preserving queries of the phenotype spectrum for a single variant by utilizing trusted execution environment technology, which can protect the privacy of the user's query information, backend models, and data, as well as the final results. We demonstrate the utility and performance of PICOTEES by exploring a bioinformatics dataset. The dataset is from a cohort containing 20,909 genetic testing patients with 3,152,508 variants from the Children's Hospital of Fudan University in China, dominated by the Chinese Han population (>99.9%). Our query results yield a large number of unreported diagnostic variants and previously reported pathogenicity.
基金This study was financially supported by the National Natural Science Foundation of China(81822017,82171493,52003021)the Lingang Laboratory(LG-QS-202203-10)the Shanghai Municipal Education Commission-Gaofeng Clinical Medicine Grant Support(20181715).
文摘To the Editor,Non-human primate(NHP)models are advantageous for mimicking human addiction with high behavioural validity.1 However,current NHP drug addiction models(eg,self-administration)often require a comprehensive behavioural training paradigm,relatively expensive apparatus and invasive surgical procedures.
基金the National Natural Science Foundation of China(Nos.61071152 and 61271316)the National Basic Research Program (973) of China(Nos.2010CB731406 and 2013CB329605)the National "Twelfth Five-Year" Plan for Science&Technology Support(No.2012BAH38B04)
文摘Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme.
基金Supported by the National Natural Science Foundation of China(61101088)the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(C13607)
文摘This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users' data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme.
文摘Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.
基金National Natural Science Foundation of China (No. 70631003)
文摘In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user requirements to implement ecommerce activities like automated transactions.The difficulty lies in the uncertainty of user preferences that include uncertain description and contents,non-linear and dynamic variability.In this paper,fuzzy language was used to describe the uncertainty and combine with multiple classified artificial neural networks(ANNs) for self-adaptive learning of user preferences.The refinement learning results of various negotiation contracts' satisfaction degrees in the extent of fuzzy classification can be achieved.Compared to unclassified computation,the experimental results illustrate that the learning ability and effectiveness of agents have been improved.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11205240 and 11265003, and the China Postdoctoral Science Foundation under Grant No 2012M510587.
文摘The working stability of thinner-thick gaseous electron multipliers (THGEMs), which have been developed by the University of the Chinese Academy of Sciences and the Second Academy of China's Aerospace Science and Industry Corporation, is studied with an 8 keV x-ray on a Cu target. Gains of about 103–104 are achieved with a single board in Ar:iC4H10 (97:3). Environmental factors, such as pressure, temperature and humidity are considered. The thinner-THGEMs are shown to perform stably over two months of studies.