期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
An OpenFlow-Based Load Balancing Strategy in SDN 被引量:5
1
作者 Xiaojun Shi Yangyang Li +5 位作者 Haiyong Xie Tengfei Yang Linchao Zhang Panyu Liu Heng Zhang zhiyao liang 《Computers, Materials & Continua》 SCIE EI 2020年第1期385-398,共14页
In today’s datacenter network,the quantity growth and complexity increment of traffic is unprecedented,which brings not only the booming of network development,but also the problem of network performance degradation,... In today’s datacenter network,the quantity growth and complexity increment of traffic is unprecedented,which brings not only the booming of network development,but also the problem of network performance degradation,such as more chance of network congestion and serious load imbalance.Due to the dynamically changing traffic patterns,the state-of the-art approaches that do this all require forklift changes to data center networking gear.The root of problem is lack of distinct strategies for elephant and mice flows.Under this condition,it is essential to enforce accurate elephant flow detection and come up with a novel load balancing solution to alleviate the network congestion and achieve high bandwidth utilization.This paper proposed an OpenFlow-based load balancing strategy for datacenter networks that accurately detect elephant flows and enforce distinct routing schemes with different flow types so as to achieve high usage of network capacity.The prototype implemented in Mininet testbed with POX controller and verify the feasibility of our load-balancing strategy when dealing with flow confliction and network degradation.The results show the proposed strategy can adequately generate flow rules and significantly enhance the performance of the bandwidth usage compared against other solutions from the literature in terms of load balancing. 展开更多
关键词 Load balancing OpenFlow data center network elephant flow multi-path routing
在线阅读 下载PDF
Research on Data Fusion of Adaptive Weighted Multi-Source Sensor 被引量:4
2
作者 Donghui Li Cong Shen +5 位作者 Xiaopeng Dai Xinghui Zhu Jian Luo Xueting Li Haiwen Chen zhiyao liang 《Computers, Materials & Continua》 SCIE EI 2019年第9期1217-1231,共15页
Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data mu... Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor.The data of water quality in the environment comes from different sensors,thus the data must be fused.In our research,self-adaptive weighted data fusion method is used to respectively integrate the data from the PH value,temperature,oxygen dissolved and NH3 concentration of water quality environment.Based on the fusion,the Grubbs method is used to detect the abnormal data so as to provide data support for estimation,prediction and early warning of the water quality. 展开更多
关键词 Adaptive weighting multi-source sensor data fusion loss of data processing grubbs elimination
在线阅读 下载PDF
Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’Propensity of Live-Streaming:An Extended TAM Method 被引量:8
3
作者 Donghui Li Guozheng Zhang +4 位作者 Zeng Xu Yong Lan Yongdong Shi zhiyao liang Haiwen Chen 《Computers, Materials & Continua》 SCIE EI 2018年第4期137-150,共14页
Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from t... Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from that of other e-commerce areas.There are two major dimensions of trust in the live streaming context:platform trust and cewebrity trust,which are both important for customers to adopt and reuse a specific live streaming service.We collected questionnaire data from 520 participates who have used live streaming services in China.We model the collected data and identified factors that can influence users’propensity by an extended technology acceptance model(TAM)method.According to our analysis,both cewebrity trust and platform trust will greatly influence users’intention to reuse a certain platform.Moreover,results also indicate that cewebrity trust is far more important than platform trust.These findings can lead to several management strategies to improve the adherence of users to streaming platforms. 展开更多
关键词 Live streaming extended TAM approach consumers’propensity cewebrity trust platform trust
在线阅读 下载PDF
Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis 被引量:5
4
作者 Shengqun Fang Zhiping Cai +4 位作者 Wencheng Sun Anfeng Liu Fang Liu zhiyao liang Guoyan Wang 《Computers, Materials & Continua》 SCIE EI 2018年第6期419-433,共15页
By using efficient and timely medical diagnostic decision making,clinicians can positively impact the quality and cost of medical care.However,the high similarity of clinical manifestations between diseases and the li... By using efficient and timely medical diagnostic decision making,clinicians can positively impact the quality and cost of medical care.However,the high similarity of clinical manifestations between diseases and the limitation of clinicians’knowledge both bring much difficulty to decision making in diagnosis.Therefore,building a decision support system that can assist medical staff in diagnosing and treating diseases has lately received growing attentions in the medical domain.In this paper,we employ a multi-label classification framework to classify the Chinese electronic medical records to establish corresponding relation between the medical records and disease categories,and compare this method with the traditional medical expert system to verify the performance.To select the best subset of patient features,we propose a feature selection method based on the composition and distribution of symptoms in electronic medical records and compare it with the traditional feature selection methods such as chi-square test.We evaluate the feature selection methods and diagnostic models from two aspects,false negative rate(FNR)and accuracy.Extensive experiments have conducted on a real-world Chinese electronic medical record database.The evaluation results demonstrate that our proposed feature selection method can improve the accuracy and reduce the FNR compare to the traditional feature selection methods,and the multi-label classification framework have better accuracy and lower FNR than the traditional expert system. 展开更多
关键词 Medical expert system EMR multi-label classification feature selection class discriminative degree
在线阅读 下载PDF
Ensemble Learning Based on GBDT and CNN for Adoptability Prediction 被引量:1
5
作者 Yunfan Ye Fang Liu +2 位作者 Shan Zhao Wanting Hu zhiyao liang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1361-1372,共12页
By efficiently and accurately predicting the adoptability of pets,shelters and rescuers can be positively guided on improving attraction of pet profiles,reducing animal suffering and euthanization.Previous prediction ... By efficiently and accurately predicting the adoptability of pets,shelters and rescuers can be positively guided on improving attraction of pet profiles,reducing animal suffering and euthanization.Previous prediction methods usually only used a single type of content for training.However,many pets contain not only textual content,but also images.To make full use of textual and visual information,this paper proposed a novel method to process pets that contain multimodal information.We employed several CNN(Convolutional Neural Network)based models and other methods to extract features from images and texts to obtain the initial multimodal representation,then reduce the dimensions and fuse them.Finally,we trained the fused features with two GBDT(Gradient Boosting Decision Tree)based models and a Neural Network(NN)and compare the performance of them and their ensemble.The evaluation result demonstrates that the proposed ensemble learning can improve the accuracy of prediction. 展开更多
关键词 Adoptability of pets multimodal representation CNN GBDT ensemble learning
在线阅读 下载PDF
Intuitionistic Fuzzy Petri Nets Model Based on Back Propagation Algorithm for Information Services 被引量:1
6
作者 Junhua Xi Kouquan Zheng +2 位作者 Jianfeng Ma Jungang Yang zhiyao liang 《Computers, Materials & Continua》 SCIE EI 2020年第5期605-619,共15页
Intuitionistic fuzzy Petri net is an important class of Petri nets,which can be used to model the knowledge base system based on intuitionistic fuzzy production rules.In order to solve the problem of poor self-learnin... Intuitionistic fuzzy Petri net is an important class of Petri nets,which can be used to model the knowledge base system based on intuitionistic fuzzy production rules.In order to solve the problem of poor self-learning ability of intuitionistic fuzzy systems,a new Petri net modeling method is proposed by introducing BP(Error Back Propagation)algorithm in neural networks.By judging whether the transition is ignited by continuous function,the intuitionistic fuzziness of classical BP algorithm is extended to the parameter learning and training,which makes Petri network have stronger generalization ability and adaptive function,and the reasoning result is more accurate and credible,which is useful for information services.Finally,a typical example is given to verify the effectiveness and superiority of the parameter optimization method. 展开更多
关键词 Intuitionistic fuzzy set intuitionistic fuzzy Petri nets production rule BP algorithm
在线阅读 下载PDF
Sentence Similarity Measurement with Convolutional Neural Networks Using Semantic and Syntactic Features 被引量:1
7
作者 Shiru Zhang zhiyao liang Jian Lin 《Computers, Materials & Continua》 SCIE EI 2020年第5期943-957,共15页
Calculating the semantic similarity of two sentences is an extremely challenging problem.We propose a solution based on convolutional neural networks(CNN)using semantic and syntactic features of sentences.The similari... Calculating the semantic similarity of two sentences is an extremely challenging problem.We propose a solution based on convolutional neural networks(CNN)using semantic and syntactic features of sentences.The similarity score between two sentences is computed as follows.First,given a sentence,two matrices are constructed accordingly,which are called the syntax model input matrix and the semantic model input matrix;one records some syntax features,and the other records some semantic features.By experimenting with different arrangements of representing the syntactic and semantic features of the sentences in the matrices,we adopt the most effective way of constructing the matrices.Second,these two matrices are given to two neural networks,which are called the sentence model and the semantic model,respectively.The convolution process of the neural networks of the two models is carried out in multiple perspectives.The outputs of the two models are combined as a vector,which is the representation of the sentence.Third,given the representation vectors of two sentences,the similarity score of these representations is computed by a layer in the CNN.Experiment results show that our algorithm(SSCNN)surpasses the performance MPCPP,which noticeably the best recent work of using CNN for sentence similarity computation.Comparing with MPCNN,the convolution computation in SSCNN is considerably simpler.Based on the results of this work,we suggest that by further utilization of semantic and syntactic features,the performance of sentence similarity measurements has considerable potentials to be improved in the future. 展开更多
关键词 Sentence similarity neural network convolutional neural networks
在线阅读 下载PDF
Point cloud upsampling generative adversarial network based on residual multi-scale off-set attention 被引量:1
8
作者 Bin SHEN Li LI +3 位作者 Xinrong HU Shengyi GUO Jin HUANG zhiyao liang 《Virtual Reality & Intelligent Hardware》 2023年第1期81-91,共11页
Background Owing to the limitations of the working principle of three-dimensional(3D) scanning equipment, the point clouds obtained by 3D scanning are usually sparse and unevenly distributed. Method In this paper, we ... Background Owing to the limitations of the working principle of three-dimensional(3D) scanning equipment, the point clouds obtained by 3D scanning are usually sparse and unevenly distributed. Method In this paper, we propose a new generative adversarial network(GAN) that extends PU-GAN for upsampling of point clouds. Its core architecture aims to replace the traditional self-attention(SA) module with an implicit Laplacian offset attention(OA) module and to aggregate the adjacency features using a multiscale offset attention(MSOA)module, which adaptively adjusts the receptive field to learn various structural features. Finally, residual links are added to create our residual multiscale offset attention(RMSOA) module, which utilizes multiscale structural relationships to generate finer details. Result The results of several experiments show that our method outperforms existing methods and is highly robust. 展开更多
关键词 Point cloud upsampling Generative adversarial network ATTENTION
在线阅读 下载PDF
Optimization of Face Recognition System Based on Azure IoT Edge
9
作者 Shen Li Fang Liu +2 位作者 Jiayue liang Zhenhua Cai zhiyao liang 《Computers, Materials & Continua》 SCIE EI 2019年第9期1377-1389,共13页
With the rapid development of artificial intelligence,face recognition systems are widely used in daily lives.Face recognition applications often need to process large amounts of image data.Maintaining the accuracy an... With the rapid development of artificial intelligence,face recognition systems are widely used in daily lives.Face recognition applications often need to process large amounts of image data.Maintaining the accuracy and low latency is critical to face recognition systems.After analyzing the two-tier architecture“client-cloud”face recognition systems,it is found that these systems have high latency and network congestion when massive recognition requirements are needed to be responded,and it is very inconvenient and inefficient to deploy and manage relevant applications on the edge of the network.This paper proposes a flexible and efficient edge computing accelerated architecture.By offloading part of the computing tasks to the edge server closer to the data source,edge computing resources are used for image preprocessing to reduce the number of images to be transmitted,thus reducing the network transmission overhead.Moreover,the application code does not need to be rewritten and can be easily migrated to the edge server.We evaluate our schemes based on the open source Azure IoT Edge,and the experimental results show that the three-tier architecture“Client-Edge-Cloud”face recognition system outperforms the state-of-art face recognition systems in reducing the average response time. 展开更多
关键词 Face recognition edge computing azure iot edge computation offloading
在线阅读 下载PDF
Developing a New Security Framework for Bluetooth Low Energy Devices
10
作者 Qiaoyang Zhang zhiyao liang Zhiping Cai 《Computers, Materials & Continua》 SCIE EI 2019年第5期457-471,共15页
Wearable devices are becoming more popular in our daily life.They are usually used to monitor health status,track fitness data,or even do medical tests,etc.Since the wearable devices can obtain a lot of personal data,... Wearable devices are becoming more popular in our daily life.They are usually used to monitor health status,track fitness data,or even do medical tests,etc.Since the wearable devices can obtain a lot of personal data,their security issues are very important.Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy(BLE)are commonly impractical or insecure for many BLE based wearable devices nowadays,we design and implement a security framework in order to protect the communication between these devices.The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible with all BLE based wearable devices.The framework is a module between the application layer and the GATT(Generic Attribute Profile)layer in the BLE architecture stack.When the framework starts,a client and a server can automatically and securely establish shared fresh keys following a designed protocol;the services of encrypting and decrypting messages are provided to the applications conveniently by two functions;application data are securely transmitted following another protocol using the generated keys.Prudential principles are followed by the design of the framework for security purposes.It can protect BLE based wearable devices from replay attacks,Man-in-The-Middle attacks,data tampering,and passive eavesdropping.We conduct experiments to show that the framework can be conveniently deployed with practical operational cost of power consumption.The protocols in this framework have been formally verified that the designed security goals are satisfied. 展开更多
关键词 Bluetooth Low Energy security PRIVACY protocol wearable devices Internet of Things
在线阅读 下载PDF
A Survey on Security Threats and Solutions of Bitcoin
11
作者 Le Lai Tongqing Zhou +2 位作者 Zhiping Cai zhiyao liang Hao Bai 《Journal of Cyber Security》 2021年第1期29-44,共16页
Bitcoin is known as the first decentralized digital currency around the world.It uses blockchain technology to store transaction data in a distributed public ledger,is a distributed ledger that removes third-party tru... Bitcoin is known as the first decentralized digital currency around the world.It uses blockchain technology to store transaction data in a distributed public ledger,is a distributed ledger that removes third-party trust institutions.Since its invention,bitcoin has achieved great success,has a market value of about$200 billion.However,while bitcoin has brought a wide and far-reaching impact in the financial field,it has also exposed some security problems,such as selfish mining attacks,Sybil attack,eclipse attacks,routing attacks,EREBUS attacks,and so on.This paper gives a comprehensive overview of various attack scenarios that the bitcoin network may be subjected to,and the methods used to implement the attacks,and reviews the solutions and countermeasures proposed against these attacks.Finally,we summarized other security challenges and proposed further optimizations for the security of the bitcoin network. 展开更多
关键词 Bitcoin blockchain SECURITY ATTACK P2P network
在线阅读 下载PDF
平板运动试验联合心肌超声造影在冠状动脉支架植入术后的应用价值分析
12
作者 谢微 张源祥 +3 位作者 邱银汝 梁志尧 刘福秀 徐静思 《心电图杂志(电子版)》 2017年第3期15-17,共3页
目的探讨平板运动试验联合心肌超声造影在冠状动脉支架植入术后的应用价值。方法以2015年5月-2017年7月我院38例冠状动脉支架植入1年后患者为研究对象,全部患者支架置入术前及术后1年均行平板运动试验联合心肌超声造影检查,观察平板试... 目的探讨平板运动试验联合心肌超声造影在冠状动脉支架植入术后的应用价值。方法以2015年5月-2017年7月我院38例冠状动脉支架植入1年后患者为研究对象,全部患者支架置入术前及术后1年均行平板运动试验联合心肌超声造影检查,观察平板试验结果及超声诊断下节段室壁运动与灌注情况。结果 PCI术后,平板试验ST段最大压低水平(0.85±0.17)m V,最大心率(140.26±13.12)次/min,实验结果阳性9.78%,与术前比较有统计学差异(P<0.05);术后1年超声造影下室壁运动计分(1.2±0.4)分,心肌灌注评分(1.1±0.2)分,与术前比较差异有统计学意义(P<0.05)。结论冠状动脉支架植入术后以平板运动试验联合心肌超声造影对患者进行检查可较好的预判患者心肌活性,明确有无再狭窄,能为疗效及预后评估以及患者后续治疗方案选择提供指导依据,值得临床推广使用。 展开更多
关键词 冠状动脉支架植入 平板运动试验 心机超声造影 应用价值
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部