期刊文献+
共找到1,946篇文章
< 1 2 98 >
每页显示 20 50 100
嵌入式Linux中基于Qt/Embeded触摸屏驱动的设计 被引量:7
1
作者 申伟杰 彭楚武 胡辉红 《中国仪器仪表》 2006年第4期48-51,共4页
本文主要介绍了在嵌入式Linux系统下基于Qt/Embeded的触摸屏驱动的设计,通过对Linux设备驱动和Qt/Embedded设备驱动接口的工作原理和机制介绍,并结合大量源代码进行分析,提出了基于Qt/Embeded的触摸屏驱动的开发方案。
关键词 嵌入式系统 LINUX QT/EMBEDDED 触摸屏 设备驱动
在线阅读 下载PDF
基于DCNN-Transformer模型的XSS攻击检测方法
2
作者 何志伟 高大鹏 《信息技术》 2025年第3期93-100,共8页
为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引... 为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引入了Embedding层,还综合了一维深度卷积神经网络快速处理序列数据和Transformer模型并行处理序列数据及学习序列元素间依赖关系的能力。实验结果表明,DCNN-Transformer模型相比于LSTM、GRU、DCNN和DCNN-GRU模型,收敛速度最快且效果更优,准确率、召回率和f1值最高,模型轻量、检测速度快,综合表现显著优于其他4个模型,为XSS攻击检测提供了一个更优的方法。 展开更多
关键词 XSS攻击检测 卷积神经网络 Transformer Embedding层 TF-IDF
在线阅读 下载PDF
A portable,low-cost lactate measurement system
3
作者 WANG Qingqing PAN Yu +3 位作者 YU Chuanxin WANG Yanyan ZHANG Kaikai LIU Sheng 《Journal of Measurement Science and Instrumentation》 2025年第1期37-46,共10页
Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbers... Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement. 展开更多
关键词 lactate measurement portable device embedded development lactate sensor electrochemical analysis
在线阅读 下载PDF
PIAFGNN:Property Inference Attacks against Federated Graph Neural Networks
4
作者 Jiewen Liu Bing Chen +2 位作者 Baolu Xue Mengya Guo Yuntao Xu 《Computers, Materials & Continua》 2025年第2期1857-1877,共21页
Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and so... Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack (PIA) against FedGNNs. Compared with prior works on centralized GNNs, in PIAFGNN, the attacker can only obtain the global embedding gradient distributed by the central server. The attacker converts the task of stealing the target user’s local embeddings into a regression problem, using a regression model to generate the target graph node embeddings. By training shadow models and property classifiers, the attacker can infer the basic property information within the target graph that is of interest. Experiments on three benchmark graph datasets demonstrate that PIAFGNN achieves attack accuracy of over 70% in most cases, even approaching the attack accuracy of inference attacks against centralized GNNs in some instances, which is much higher than the attack accuracy of the random guessing method. Furthermore, we observe that common defense mechanisms cannot mitigate our attack without affecting the model’s performance on mainly classification tasks. 展开更多
关键词 Federated graph neural networks GNNs privacy leakage regression model property inference attacks EMBEDDINGS
在线阅读 下载PDF
Pagoda as Grottos: Rethinking the Architectural Form of Cave 4 of Maijishan Grottoes
5
作者 Weixiao Zhang 《Journal of World Architecture》 2025年第1期7-25,共19页
This paper mainly explores the architectural form of the interior of Maiji Mountain’s Cave 4 and the spiritual realm it establishes.Previous research holds the view that the niche within Cave 4 is architecturally mod... This paper mainly explores the architectural form of the interior of Maiji Mountain’s Cave 4 and the spiritual realm it establishes.Previous research holds the view that the niche within Cave 4 is architecturally modeled after a tent-like structure.However,after in-depth research,this paper suggests that the niche in Cave 4 is more of an imitation of an embedded stupa,or rather,it reconstructs the stupa in an embedded form within the cave.In prior studies,analysis historical background and architectural details of Cave 4 remains inadequate,thus,this paper aims to take a thorough investigation on this point,and further clarify the significance of the form of the Buddha niche in Cave 4,as well as its construction design origins.Specifically,the octagonal wooden-imitating column,lotus-shaped clamp,inverted lotus pedestal,five lotus petals,and shadow sculptures within the niche,the shallow-relief ceiling and small platform outside the niche,as well as the banana leaf decorations,all suggest that the architectural form Cave 4 imitates is likely a single-story wooden stupa.In this way,the connection that this embedded stupa creates between the Budda and the faithful,is more direct and intimate,especially compared to the one built in traditional Buddhist activities.Moreover,by coordinating with various visual materials inside the cave,such as the layout of the Dharma assembly and the exquisite details of the Buddha images,it reconstructs the“realm of the mind”in Buddhism,reinforcing the faithful’s dual experience both in physical and spiritual fields.The Master Teacher Studio of basic education came into being with the new curriculum reform,which has become a new mechanism for the construction of teaching staff in social situations in China.As a brand-new way in the construction of teaching staff in the new era,through reviewing the relevant research,it is found that the focus of academic circles on Master Teacher Studio is mainly in four aspects:clarifying the conceptual boundary,seeking theoretical support,defining the functional orientation,and exploring status quo of development.The exploration of the research process is not only a process of summary but also a process of reflection.By reviewing relevant research,reflecting on the problems that have appeared in the process of building the Master Teacher Studio in basic education,clarify the development path of the Master Teacher Studio and further affirm its advantages to the construction of teaching staff in the Chinese context. 展开更多
关键词 Fourth grotto of Maiji Mountain Four-gabled pyramid roof structure PAGODA One-floor wooden pagoda Embedded pagoda Grotto as pagoda Topography of mind
在线阅读 下载PDF
当前新就业群体党建的实践机制与提升策略
6
作者 王可园 丘淑媛 《中共山东大学委党校学报》 2024年第1期24-33,共10页
快递员、外卖员等为代表的新就业群体正在成为服务市民生活、助力城市发展、优化基层治理的一支重要力量,对这一群体的党建工作进行研究也成为城市基层党建工作的新领域和新课题。目前,各地基层组织部门创造出各种各样的新就业群体党建... 快递员、外卖员等为代表的新就业群体正在成为服务市民生活、助力城市发展、优化基层治理的一支重要力量,对这一群体的党建工作进行研究也成为城市基层党建工作的新领域和新课题。目前,各地基层组织部门创造出各种各样的新就业群体党建工作形态,主要是组织嵌入、精英吸纳、服务吸引与意识整合等,大大提高了党在新就业群体中的号召力。在取得这些成效的同时,新就业群体党建还存在着传统党建模式与新就业群体灵活工作特性间的矛盾等问题。应当从创新组织设置、延伸组织触角,加大服务力度、打造暖心阵地,引导参与治理、激发治理活力,完善工作保障、夯实党建基础等方面,进一步提高新就业群体的党建质量。 展开更多
关键词 新就业群体 党建引领 精英吸纳 组织嵌入
在线阅读 下载PDF
基于Transformer结构增强的神经网络架构搜索性能预测器
7
作者 王继禾 吴颖 +2 位作者 迟恒喆 王党辉 梅魁志 《计算机学报》 EI CAS CSCD 北大核心 2024年第7期1469-1484,共16页
神经网络架构搜索(Neural Architecture Search,NAS)作为一种通过搜索算法设计神经网络架构的方法,在计算机视觉和自然语言处理等领域得到广泛应用,相较于人工设计网络,NAS方法可以减少设计成本并提高模型性能.但是NAS的性能评估需要对... 神经网络架构搜索(Neural Architecture Search,NAS)作为一种通过搜索算法设计神经网络架构的方法,在计算机视觉和自然语言处理等领域得到广泛应用,相较于人工设计网络,NAS方法可以减少设计成本并提高模型性能.但是NAS的性能评估需要对候选架构进行大量训练,由此带来的计算量占整个NAS的80%以上.为降低计算开销和时间成本,近年来已提出许多基于Transformer的NAS预测器,由于Transformer出色的结构编码能力可以更好地表示拓扑信息,因而得到广泛应用.但是,现有基于Transformer的NAS预测器依然存在三个问题:其一是在预处理阶段,传统的One-hot编码方式描述节点特征的能力较弱,只能区分不同操作节点类型,而难以表达操作的细节特征,如卷积核尺寸等.其二是在编码阶段,Transformer的自注意力机制导致模型结构信息缺失;其三是在评估阶段,现有的Transformer预测器仅使用多层感知机(Multilayer Perceptron,MLP)对前向传播图进行精度预测,忽略了反向传播梯度流对预测精度的影响,因此难以真正拟合NAS评估中的正、反向交替信息流图,导致预测器精度与实际运行精度误差波动极大(10%~90%).为解决上述问题,本文提出了一种基于Transformer结构增强的NAS性能预测方法.首先,在预处理阶段,本文提出了一种超维嵌入方法增加输入数据维度以强化节点操作的参数描述能力,其次,在编码阶段将Transformer编码后的信息与图结构信息共同输人一个图卷积网络(Graph Convolutional Network,GCN),弥补由自注意力机制引起的结构缺失.最后,在性能评估阶段,本文构建了同时包含前向传播和反向传播的全训练图,并将数据集信息、图结构编码与梯度编码共同输入到GCN网络预测器中,使预测结果更贴近模型真实性能.实验结果表明,本方法与目前最先进方法相比,肯德尔相关系数提高了7.45%,训练时间减少了1.55倍。 展开更多
关键词 预测器 NAS TRANSFORMER GCN EMBEDDING
在线阅读 下载PDF
Oxygen functionalization-assisted anionic exchange toward unique construction of flower-like transition metal chalcogenide embedded carbon fabric for ultra-long life flexible energy storage and conversion 被引量:1
8
作者 Roshan M.Bhattarai Kisan Chhetri +5 位作者 Nghia Le Debendra Acharya Shirjana Saud Mai Cao Hoang Phuong Lan Nguyen Sang Jae Kim Young Sun Mok 《Carbon Energy》 SCIE EI CAS CSCD 2024年第1期72-93,共22页
The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag... The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications. 展开更多
关键词 carbon cloth energy conversion energy storage FLEXIBLE metal embedding ultra-stable
在线阅读 下载PDF
Application of buried auricular point combined with Wenjing Sanhan prescription in arteriosclerosis obliterans patients with resting pain 被引量:2
9
作者 Ya-Ping Li Tian Su +3 位作者 Xiao-Li Xue Huan-Ren Shi Zhi-Hui Su Jun Li 《World Journal of Clinical Cases》 SCIE 2024年第24期5558-5567,共10页
BACKGROUND Research on the combined use of ear acupoint embedding beans and warming meridians with cold-dispersing formulas for alleviating resting pain in patients with arteriosclerosis obliterans(ASO)remains limited... BACKGROUND Research on the combined use of ear acupoint embedding beans and warming meridians with cold-dispersing formulas for alleviating resting pain in patients with arteriosclerosis obliterans(ASO)remains limited.AIM To explore the therapeutic efficacy of auricular point embedding beans combined with Wenjing Sanhan prescription in alleviating resting pain in patients with lower-limb ASO.METHODS A total of 100 patients with ASO experiencing resting pain who were treated at our hospital from January 2022 to January 2023 were enrolled.They were randomly allocated into two groups using a double-blind approach.The control group was treated using a warming meridian with a cold-dispersing formula,while the study group received additional treatment with ear acupoint embedding beans.The clinical efficacy,ankle-brachial artery pressure ratio,hemorheological indicators,and traditional Chinese medicine symptom scores were compared between the two groups.RESULTS The clinical efficacy rate in the study group was significantly higher(94.00%)than that in the control group(72.00%,P<0.05).Moreover,the ankle-brachial artery pressure ratio was significantly higher in the study group after treatment(P<0.05).Hemorheological parameters,including whole blood viscosity,plasma viscosity(1.83±0.11)mPa/s,fibrinogen levels(3.30±0.21)g/L,platelet adhesion rate(49.87%±10.51%),and erythrocyte aggregation index(1.79±0)were improved in the study group compared to the control group.In addition,the scores for decreased skin temperature(1.41±0.26),intermittent claudication(1.30±0.20),and resting pain(1.23±0.31)were significantly lower in the study group than those in the control group(all P<0.05).The level of oxidative stress in the study group also exhibited significant improvement(P<0.05),and the levels of inflammatory factors were considerably lower than those in the control group.CONCLUSION The combination of ear point embedding beans and Wenjing Sanhan prescription demonstrates promising clinical efficacy in alleviating resting pain associated with ASO. 展开更多
关键词 Embedding beans in ear acupoints Prescription for warming channels and dispelling cold Lower limb arteriosclerosis obliterans Resting pain Blood flow rheology Curative effect
在线阅读 下载PDF
Multifunctional AlPO_(4)reconstructed LiMn_(2)O_(4)surface for electrochemical lithium extraction from brine 被引量:1
10
作者 Jun Gu Linlin Chen +5 位作者 Xiaowei Li Guiling Luo Linjing Fan Yanhong Chao Haiyan Ji Wenshuai Zhu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第2期410-421,I0010,共13页
LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal s... LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal structure and loss of lithium extraction capacity caused by Mn dissolution loss limits its industrialized application.Hence,a multifunctional coating was developed by depositing amorphous AlPO_(4)on the surface of LMO using sol-gel method.The characterization and electrochemical performance test provided insights into the mechanism of Li^(+)embedment and de-embedment and revealed that multifunctional AlPO_(4)can reconstruct the physical and chemical state of LMO surface to improve the interface hydrophilicity,promote the transport of Li^(+),strengthen cycle stability.Remarkably,after 20 cycles,the capacity retention rate of 0.5AP-LMO reached 93.6%with only 0.147%Mn dissolution loss.The average Li^(+)release capacity of 0.5AP-LMO//Ag system in simulated brine is 28.77 mg/(g h),which is 90.4%higher than LMO.Encouragingly,even in the more complex Zabuye real brine,0.5AP-LMO//Ag can still maintain excellent lithium extraction performance.These results indicate that the 0.5AP-LMO//Ag lithium-ion pump shows promising potential as a Li^(+)selective extraction system. 展开更多
关键词 LiMn_(2)O_(4) Multifunctional AlPO_(4)coating Li^(+)embedment and de-embedment mechanism Stability HYDROPHILICITY Various solution
在线阅读 下载PDF
Hyperbolic map unravels eight regions in temperature volatility regionalization of China' Mainland
11
作者 Yuxuan Song Changgui Gu +4 位作者 Muhua Zheng Aixia Feng Yufei Xi Haiying Wang Huijie Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期526-534,共9页
Abrupt temperature volatility has detrimental effects on daily activities,macroeconomic growth,and human health.Predicting abrupt temperature volatility and thus diminishing its negative impacts can be achieved by exp... Abrupt temperature volatility has detrimental effects on daily activities,macroeconomic growth,and human health.Predicting abrupt temperature volatility and thus diminishing its negative impacts can be achieved by exploring homogeneous regions of temperature volatility and analyzing the driving factors.To investigate the regionalization of temperature volatility in China's mainland,a network constructed by the cosine similarity of temperature volatility series from China's mainland was embedded in hyperbolic space.Subsequently,we partitioned the network on the hyperbolic map using the critical gap method and then found eight regions in all.Ultimately,a network of communities was constructed while the interaction among communities was quantified.This yields a perspective of temperature volatility regionalization that can accurately reflect factors including altitude,climate type,and the geographic location of mountains.Further analysis demonstrates that the regionalization in the hyperbolic map is distinct from provinces and has a realistic basis:communities in southwest China show strong correlations due to the temperature sensitivity to altitude,and communities in northern China show a convergence in the area of Dingxi,Gansu,mainly owing to the strong temperature sensitivity to climate types.As a consequence,node distributions and community divisions in the hyperbolic map can offer new insights into the regionalization of temperature volatility in China's mainland.The results demonstrate the potential of hyperbolic embedding of complex networks in forecasting future node associations in real-world data. 展开更多
关键词 complex network hyperbolic embedding community detection REGIONALIZATION
在线阅读 下载PDF
Teaching Reform and Practice of Embedded System Design Based on Outcome-Based Education 被引量:1
12
作者 Tao Zhang Xiangwu Deng 《Journal of Contemporary Educational Research》 2024年第3期13-18,共6页
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio... Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality. 展开更多
关键词 Embedded system design Outcome-based education(OBE) Teaching reform
在线阅读 下载PDF
A Linked List Encryption Scheme for Image Steganography without Embedding
13
作者 Pengbiao Zhao Qi Zhong +3 位作者 Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期331-352,共22页
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks. 展开更多
关键词 STEGANOGRAPHY ENCRYPTION steganography without embedding coverless steganography
在线阅读 下载PDF
Intelligent casting:Empowering the future foundry industry
14
作者 Jin-wu Kang Bao-lin Liu +1 位作者 Tao Jing Hou-fa Shen 《China Foundry》 SCIE EI CAS CSCD 2024年第5期409-426,共18页
Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which... Emerging technological advances are reshaping the casting sector in latest decades.Casting technology is evolving towards intelligent casting paradigm that involves automation,greenization and intelligentization,which attracts more and more attention from the academic and industry communities.In this paper,the main features of casting technology were briefly summarized and forecasted,and the recent developments of key technologies and the innovative efforts made in promoting intelligent casting process were discussed.Moreover,the technical visions of intelligent casting process were also put forward.The key technologies for intelligent casting process comprise 3D printing technologies,intelligent mold technologies and intelligent process control technologies.In future,the intelligent mold that derived from mold with sensors,control devices and actuators will probably incorporate the Internet of Things,online inspection,embedded simulation,decision-making and control system,and other technologies to form intelligent cyber-physical casting system,which may pave the way to realize intelligent casting.It is promising that the intelligent casting process will eventually achieve the goal of real-time process optimization and full-scale control,with the defects,microstructure,performance,and service life of the fabricated castings can be accurately predicted and tailored. 展开更多
关键词 intelligent casting 3D printing intelligent mold process control cyber-physical casting system embedded simulation
在线阅读 下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
15
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
在线阅读 下载PDF
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
16
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
在线阅读 下载PDF
CO_(2)flooding in shale oil reservoir with radial borehole fracturing for CO_(2)storage and enhanced oil recovery
17
作者 Jia-Cheng Dai Tian-Yu Wang +3 位作者 Jin-Tao Weng Kang-Jian Tian Li-Ying Zhu Gen-Sheng Li 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期519-534,共16页
This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume i... This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume in horizontal well fracturing.A numerical model is established to investigate the production rate,reservoir pressure field,and CO_(2)saturation distribution corresponding to changing time of CO_(2)flooding with radial borehole fracturing.A sensitivity analysis on the influence of CO_(2)injection location,layer spacing,pressure difference,borehole number,and hydraulic fractures on oil production and CO_(2)storage is conducted.The CO_(2)flooding process is divided into four stages.Reductions in layer spacing will significantly improve oil production rate and gas storage capacity.However,serious gas channeling can occur when the spacing is lower than 20 m.Increasing the pressure difference between the producer and injector,the borehole number,the hydraulic fracture height,and the fracture width can also increase the oil production rate and gas storage rate.Sensitivity analysis shows that layer spacing and fracture height greatly influence gas storage and oil production.Research outcomes are expected to provide a theoretical basis for the efficient development of shale oil reservoirs in the vertical direction. 展开更多
关键词 Shale oil Radial borehole fracturing Embedded discrete fracture model Enhanced oil recovery Carbon storage
在线阅读 下载PDF
Advancements in machine learning for material design and process optimization in the field of additive manufacturing
18
作者 Hao-ran Zhou Hao Yang +8 位作者 Huai-qian Li Ying-chun Ma Sen Yu Jian shi Jing-chang Cheng Peng Gao Bo Yu Zhi-quan Miao Yan-peng Wei 《China Foundry》 SCIE EI CAS CSCD 2024年第2期101-115,共15页
Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is co... Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is constrained by issues like unclear fundamental principles,complex experimental cycles,and high costs.Machine learning,as a novel artificial intelligence technology,has the potential to deeply engage in the development of additive manufacturing process,assisting engineers in learning and developing new techniques.This paper provides a comprehensive overview of the research and applications of machine learning in the field of additive manufacturing,particularly in model design and process development.Firstly,it introduces the background and significance of machine learning-assisted design in additive manufacturing process.It then further delves into the application of machine learning in additive manufacturing,focusing on model design and process guidance.Finally,it concludes by summarizing and forecasting the development trends of machine learning technology in the field of additive manufacturing. 展开更多
关键词 additive manufacturing machine learning material design process optimization intersection of disciplines embedded machine learning
在线阅读 下载PDF
Binary Program Vulnerability Mining Based on Neural Network
19
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 Vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
在线阅读 下载PDF
Advances of embedded resistive random access memory in industrial manufacturing and its potential applications
20
作者 Zijian Wang Yixian Song +7 位作者 Guobin Zhang Qi Luo Kai Xu Dawei Gao Bin Yu Desmond Loke Shuai Zhong Yishu Zhang 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2024年第3期175-214,共40页
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en... Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence. 展开更多
关键词 embedded resistive random access memory industrial manufacturing intelligent computing advanced process node
在线阅读 下载PDF
上一页 1 2 98 下一页 到第
使用帮助 返回顶部