期刊文献+
共找到1,423篇文章
< 1 2 72 >
每页显示 20 50 100
Crushing and embedment of proppant packs under cyclic loading: An insight to enhanced unconventional oil/gas recovery 被引量:2
1
作者 K.M.A.S.Bandara P.G.Ranjith +2 位作者 T.D.Rathnaweera W.A.M.Wanniarachchi S.Q.Yang 《Geoscience Frontiers》 SCIE CAS CSCD 2021年第6期376-393,共18页
Crushing and embedment are two critical downhole proppant degradation mechanisms that lead to a significant drop in production outputs in unconventional oil/gas stimulation projects. These persistent production drops ... Crushing and embedment are two critical downhole proppant degradation mechanisms that lead to a significant drop in production outputs in unconventional oil/gas stimulation projects. These persistent production drops due to the non-linear responses of proppants under reservoir conditions put the future utilization of such advanced stimulation techniques in unconventional energy extraction in doubt. The aim of this study is to address these issues by conducting a comprehensive experimental approach. According to the results, whatever the type of proppant, all proppant packs tend to undergo significant plastic deformation under the first loading cycle.Moreover, the utilization of ceramic proppants(which retain proppant pack porosity up to 75%), larger proppant sizes(which retain proppant pack porosity up to 15.2%) and higher proppant concentrations(which retain proppant pack porosity up to 29.5%) in the fracturing stimulations with higher in-situ stresses are recommended to de-escalate the critical consequences of crushing associated issues. Similarly, the selection of resin-coated proppants over ceramic and sand proppants may benefit in terms of obtaining reduced proppant embedment.In addition, selection of smaller proppant sizes and higher proppant concentrations are suggested for stimulation projects at depth with sedimentary formations and lower in-situ stresses where proppant embedment predominates. Furthermore, correlation between proppant embedment with repetitive loading cycles was studied.Importantly, microstructural analysis of the proppant-embedded siltstone rock samples revealed that the initiation of secondary induced fractures. Finally, the findings of this study can greatly contribute to accurately select optimum proppant properties(proppant type, size and concentration) depending on the oil/gas reservoir characteristics to minimize proppant crushing and embedment effects. 展开更多
关键词 PROPPANT Micro-CT analysis Proppant crushing Proppant embedment Secondary induced fractures Cyclic loading
下载PDF
Characterization of the fracture compressibility and its permeability for shale under the effects of proppant embedment and compaction:A preliminary study
2
作者 Jian-Hua Li Bo-Bo Li +1 位作者 Qiao-Yun Cheng Zheng Gao 《Petroleum Science》 SCIE CAS CSCD 2022年第3期1125-1138,共14页
Hydraulic fracturing technology plays a key role in improving the recovery rate of shale gas.The improvement of permeability in relation to hydraulic fracturing depends on changes brought about by the proppant on the ... Hydraulic fracturing technology plays a key role in improving the recovery rate of shale gas.The improvement of permeability in relation to hydraulic fracturing depends on changes brought about by the proppant on the fracture structure in reservoirs.Then it is of great significance to describe the microscopic changes during this process by means of an accurate theoretical model.In this study,based on the heterogeneity of shale fracture and the compaction and embedment of a proppant,we proposed a permeability model to examine the combined effects of a proppant and stress to describe the change mechanism in permeability.Further,changes in fracture width and porosity were considered,and a calculation model of fracture compressibility under proppant compaction and embedment was proposed.The difference from previous studies is that the compressibility and permeability of supported fractures can be further quantified and analyzed by this model.Moreover,its rationality was verified by publicly released test data.The results show that,the compressive effect of stress and the embedding of proppant both have a negative impact on shale permeability. 展开更多
关键词 SHALE Fracture compressibility PERMEABILITY Hydraulic fracturing Proppant embedment
下载PDF
Calculation method of proppant embedment depth in hydraulic fracturing
3
作者 CHEN Ming ZHANG Shicheng +5 位作者 LIU Ming MA Xinfang ZOU Yushi ZHOU Tong LI Ning LI Sihai 《Petroleum Exploration and Development》 2018年第1期159-166,共8页
For the issue of proppant embedment in hydraulic fracturing,a new calculation method of embedment depth considering elastic-plastic deformation was proposed based on the mechanism of proppant embedment into rocks by c... For the issue of proppant embedment in hydraulic fracturing,a new calculation method of embedment depth considering elastic-plastic deformation was proposed based on the mechanism of proppant embedment into rocks by combining proppant embedment constitutive equations and contact stresses on the rock-proppant system.And factors affecting embedment depth of proppant were analyzed using the new method.Compared with the elastic embedment model,the results calculated by the new method match well with the experimental data,proving the new method is more reliable and more convenient to make theoretical calculation and analysis.The simulation results show the process of proppant embedment into rocks is mainly elastic-plastic.The embedment depth of monolayer proppants decreases with higher proppant concentration.Under multi-layer distribution conditions,increasing the proppant concentration will not change its embedment depth.The larger the proppant embedment ratio,the more the stress-bearing proppants,and the smaller the embedment depth will be.The embedment depth under higher closure stress is more remarkable.The embedment depth increased with the drawdown of fluid pressure in the fracture.Increasing proppant radius or the ratio of proppant Young’s modulus to rock Young’s modulus can reduce the proppant embedment depth. 展开更多
关键词 hydraulic FRACTURING PROPPANT embedment DEPTH CONSTITUTIVE equation contact stress ELASTIC-PLASTIC deformation PROPPANT concentration
下载PDF
Morphological features of allogenic nerve segment in rats after subcutaneous embedment
4
作者 Mingtang Gao Dianming Jiang 《Neural Regeneration Research》 SCIE CAS CSCD 2006年第1期50-52,共3页
BACKGROUND: Some studies demonstrate that allogenic peripheral nerve segment embedded subcutaneously significantly reduce the infiltration of lymphocyte and decrease immunological reaction. OBJECTIVE: To observe the g... BACKGROUND: Some studies demonstrate that allogenic peripheral nerve segment embedded subcutaneously significantly reduce the infiltration of lymphocyte and decrease immunological reaction. OBJECTIVE: To observe the gross shape, optical and electron microscope results of allogenic nerve segment in rats 2 weeks after subcutaneous embedment, and compare with subcutaneous emdedment of autologous nerve segment. DESIGN: A randomized and controlled experiment. SETTING: Department of Orthopaedics of Fifth People’s Hospital of Zhengzhou; Department of Orthopaedics, First Hospital Affiliated to Chongqing Medical University. MATERIALS: Totally 30 adult healthy Wistar male rats , with body mass of (200±20) g, were enrolled . Ten rats were chosen as the donors of allogenic nerve transplantation. The other 20 rats were randomly divided into 2 groups: allogenic nerve embedment group and autologous nerve embedment group, with 10 rats in each one. JEM-1220 transmission electron microscope (Japan) and Olympus BX50 optical microscope (Japan) were used. METHODS: This experiment was carried out at the laboratory of Orthopaedic Department, Chongqing Medical University from October 2000 to April 2002.① Sciatic nerve of donor rats for allogenic nerve transplantation was cut off at 5 mm distant from pelvic strait.15 mm sciatic nerve segment was chosen from lateral part as graft. allogenic nerve embedment group: 15 mm sciatic nerve form the donor rats was embedded in the posterior part of right legs. Autologous nerve embedment group: 15 mm sciatic nerve segment of autologous left side was embedded in the posterior side of right legs. ② Nerve segment embedded subcutaneously was taken out at postoperative 2 weeks and performed gross observation; then 5 samples chosen randomly respectively from 2 groups and given haematoxylin-eosin staining and observation under optical microscope (×400);The other 5 samples were made into ultrathin sections(0.5 μm)and observed under transmission electron microscope(×17 000). MAIN OUTCOME MEASURES: Gross shape, optical and electron microscope results of nerve segments of rats between two groups at 2 weeks after subcutaneous embedment. RESULTS: ① Results of gross observation: Appearance of nerve segment was similar between 2 groups. ②Results of optical observation: medullary sheath denaturation, axonotmesis, vascular engorgement, desmoplasia of adventitia and infiltration of inflammatory cells were all found in both 2 groups. Inflammatory reaction was a little more severe in the allogenic nerve embedment group than in the autologous nerve embedment groups. ③Results of electron microscope : Similar cataplasia and denaturation of medullary sheath and cataplasia of Schwann cell were all found in the 2 groups. CONCLUSION: Some inflammatory reaction occurs after allogenic nerve embedment, but the activity of Schwann cell is similar to that of peripheral nerve after autologous nerve embedment. 展开更多
关键词 Morphological features of allogenic nerve segment in rats after subcutaneous embedment
下载PDF
Embedment Effect on Eliminating Damage of CFRP Pull-riveting Process by Simulation Study
5
作者 Yiqi WANG Zhiwei CONG +2 位作者 Guang XIAO Yongjie BAO Hang GAO Key 《Mechanical Engineering Science》 2021年第1期39-49,共11页
The rivet joints have been widely applied in aerospace and vehicle fields.During the joining process of the carbon fiber reinforced plastic(CFRP)laminates,the pre-tightening force of pulling-rivet was the key factor t... The rivet joints have been widely applied in aerospace and vehicle fields.During the joining process of the carbon fiber reinforced plastic(CFRP)laminates,the pre-tightening force of pulling-rivet was the key factor to ensure the connection performance.To predict the impact of clamping loads on stress and failure of laminates,the value of stress and damage evolution of the wall of a hole under the pre-tightening force were simulated by the finite element method.The results of the simulation showed that excessive clamping force led to the damage and failure of CFRP in the hole edge.Connection performance together with progressive failure process and failure modes of CFRP laminates with various pre-tightening forces were investigated.A kind of metal embedded parts embedded in the laminates was designed to reduce the damage by the simulation study.Simulation results showed that embedment reduced the failure and damage efficiently.The embedment reduced about 64%of the maximum stress. 展开更多
关键词 embedment effect CFRP riveted damage evolution damage removal
下载PDF
On Some Embedment of Groups into Wreath Products
6
作者 Enoch Suleiman Muhammed Salihu Audu 《Advances in Pure Mathematics》 2021年第2期109-120,共12页
In this paper, we showed how groups are embedded into wreath products, we gave a simpler proof of the theorem by Audu (1991) (see <a href="#ref1">[1]</a>), also proved that a group can be embedde... In this paper, we showed how groups are embedded into wreath products, we gave a simpler proof of the theorem by Audu (1991) (see <a href="#ref1">[1]</a>), also proved that a group can be embedded into the wreath product of a factor group by a normal subgroup and also proved that a factor group can be embedded inside a wreath product and the wreath product of a factor group by a factor group can be embedded into a group. We further showed that when the abstract group in the Universal Embedding Theorem is a <em>p</em>-group, cyclic and simple, the embedding becomes an isomorphism. Examples were given to justify the results. 展开更多
关键词 Wreath Product Direct Product HOMOMORPHISM Embedding p-Group Cyclic Simple
下载PDF
Multifunctional AlPO_(4)reconstructed LiMn_(2)O_(4)surface for electrochemical lithium extraction from brine
7
作者 Jun Gu Linlin Chen +5 位作者 Xiaowei Li Guiling Luo Linjing Fan Yanhong Chao Haiyan Ji Wenshuai Zhu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第2期410-421,I0010,共13页
LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal s... LiMn_(2)O_(4)(LMO)electrochemical lithium-ion pump has gained widespread attention due to its green,high efficiency,and low energy consumption in selectively extracting lithium from brine.However,collapse of crystal structure and loss of lithium extraction capacity caused by Mn dissolution loss limits its industrialized application.Hence,a multifunctional coating was developed by depositing amorphous AlPO_(4)on the surface of LMO using sol-gel method.The characterization and electrochemical performance test provided insights into the mechanism of Li^(+)embedment and de-embedment and revealed that multifunctional AlPO_(4)can reconstruct the physical and chemical state of LMO surface to improve the interface hydrophilicity,promote the transport of Li^(+),strengthen cycle stability.Remarkably,after 20 cycles,the capacity retention rate of 0.5AP-LMO reached 93.6%with only 0.147%Mn dissolution loss.The average Li^(+)release capacity of 0.5AP-LMO//Ag system in simulated brine is 28.77 mg/(g h),which is 90.4%higher than LMO.Encouragingly,even in the more complex Zabuye real brine,0.5AP-LMO//Ag can still maintain excellent lithium extraction performance.These results indicate that the 0.5AP-LMO//Ag lithium-ion pump shows promising potential as a Li^(+)selective extraction system. 展开更多
关键词 LiMn_(2)O_(4) Multifunctional AlPO_(4)coating Li^(+)embedment and de-embedment mechanism Stability HYDROPHILICITY Various solution
下载PDF
Oxygen functionalization-assisted anionic exchange toward unique construction of flower-like transition metal chalcogenide embedded carbon fabric for ultra-long life flexible energy storage and conversion 被引量:1
8
作者 Roshan M.Bhattarai Kisan Chhetri +5 位作者 Nghia Le Debendra Acharya Shirjana Saud Mai Cao Hoang Phuong Lan Nguyen Sang Jae Kim Young Sun Mok 《Carbon Energy》 SCIE EI CAS CSCD 2024年第1期72-93,共22页
The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag... The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications. 展开更多
关键词 carbon cloth energy conversion energy storage FLEXIBLE metal embedding ultra-stable
下载PDF
Decomposition and embedment of trajectories after explosion for a birth and death process 被引量:2
9
作者 杨向群 刘韶跃 《Science China Mathematics》 SCIE 2002年第9期1100-1105,共6页
Let X = {X(t),t <σ} (σ is lifespan) be a birth and death process with explosion whose characteristic triple (Mα,MC,MD) of MX in terms of (α, C, D) and M. This means that a lot of given birth and death processes c... Let X = {X(t),t <σ} (σ is lifespan) be a birth and death process with explosion whose characteristic triple (Mα,MC,MD) of MX in terms of (α, C, D) and M. This means that a lot of given birth and death processes can be embedded in one and the same birth and death process. If κ∈ E and M = {κ},we decompose X into κX, κ∈ E. 展开更多
关键词 BIRTH and DEATH process explosion TRAJECTORY decomposition embedment character-istic triple.
原文传递
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
10
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
原文传递
CO_(2)flooding in shale oil reservoir with radial borehole fracturing for CO_(2)storage and enhanced oil recovery
11
作者 Jia-Cheng Dai Tian-Yu Wang +3 位作者 Jin-Tao Weng Kang-Jian Tian Li-Ying Zhu Gen-Sheng Li 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期519-534,共16页
This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume i... This study introduces a novel method integrating CO_(2)flooding with radial borehole fracturing for enhanced oil recovery and CO_(2)underground storage,a solution to the limited vertical stimulation reservoir volume in horizontal well fracturing.A numerical model is established to investigate the production rate,reservoir pressure field,and CO_(2)saturation distribution corresponding to changing time of CO_(2)flooding with radial borehole fracturing.A sensitivity analysis on the influence of CO_(2)injection location,layer spacing,pressure difference,borehole number,and hydraulic fractures on oil production and CO_(2)storage is conducted.The CO_(2)flooding process is divided into four stages.Reductions in layer spacing will significantly improve oil production rate and gas storage capacity.However,serious gas channeling can occur when the spacing is lower than 20 m.Increasing the pressure difference between the producer and injector,the borehole number,the hydraulic fracture height,and the fracture width can also increase the oil production rate and gas storage rate.Sensitivity analysis shows that layer spacing and fracture height greatly influence gas storage and oil production.Research outcomes are expected to provide a theoretical basis for the efficient development of shale oil reservoirs in the vertical direction. 展开更多
关键词 Shale oil Radial borehole fracturing Embedded discrete fracture model Enhanced oil recovery Carbon storage
下载PDF
Advancements in machine learning for material design and process optimization in the field of additive manufacturing
12
作者 Hao-ran Zhou Hao Yang +8 位作者 Huai-qian Li Ying-chun Ma Sen Yu Jian shi Jing-chang Cheng Peng Gao Bo Yu Zhi-quan Miao Yan-peng Wei 《China Foundry》 SCIE EI CAS CSCD 2024年第2期101-115,共15页
Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is co... Additive manufacturing technology is highly regarded due to its advantages,such as high precision and the ability to address complex geometric challenges.However,the development of additive manufacturing process is constrained by issues like unclear fundamental principles,complex experimental cycles,and high costs.Machine learning,as a novel artificial intelligence technology,has the potential to deeply engage in the development of additive manufacturing process,assisting engineers in learning and developing new techniques.This paper provides a comprehensive overview of the research and applications of machine learning in the field of additive manufacturing,particularly in model design and process development.Firstly,it introduces the background and significance of machine learning-assisted design in additive manufacturing process.It then further delves into the application of machine learning in additive manufacturing,focusing on model design and process guidance.Finally,it concludes by summarizing and forecasting the development trends of machine learning technology in the field of additive manufacturing. 展开更多
关键词 additive manufacturing machine learning material design process optimization intersection of disciplines embedded machine learning
下载PDF
Binary Program Vulnerability Mining Based on Neural Network
13
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 Vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
下载PDF
Ice-Induced Vibrational Response of Single-Pile Offshore Wind-Turbine Foundations
14
作者 Zhoujie Zhu Gang Wang +3 位作者 Qingquan Liu Guojun Wang Rui Dong Dayong Zhang 《Fluid Dynamics & Materials Processing》 EI 2024年第3期625-639,共15页
Important challenges must be addressed to make wind turbines sustainable renewable energy sources.A typical problem concerns the design of the foundation.If the pile diameter is larger than that of the jacket platform... Important challenges must be addressed to make wind turbines sustainable renewable energy sources.A typical problem concerns the design of the foundation.If the pile diameter is larger than that of the jacket platform,traditional mechanical models cannot be used.In this study,relying on the seabed soil data of an offshore wind farm,the m-method and the equivalent embedded method are used to address the single-pile wind turbine foundation problem for different pile diameters.An approach to determine the equivalent pile length is also proposed accordingly.The results provide evidence for the effectiveness and reliability of the model based on the equivalent embedded method. 展开更多
关键词 Wind turbine ice-induced vibration dynamic response equivalent embedded method
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
15
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
16
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
原文传递
A Review on the Recent Trends of Image Steganography for VANET Applications
17
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(VANET) transportation system
下载PDF
Hybrid Scalable Researcher Recommendation System Using Azure Data Lake Analytics
18
作者 Dinesh Kalla Nathan Smith +1 位作者 Fnu Samaah Kiran Polimetla 《Journal of Data Analysis and Information Processing》 2024年第1期76-88,共13页
This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of co... This research paper has provided the methodology and design for implementing the hybrid author recommender system using Azure Data Lake Analytics and Power BI. It offers a recommendation for the top 1000 Authors of computer science in different fields of study. The technique used in this paper is handling the inadequate Information for citation;it removes the problem of cold start, which is encountered by very many other recommender systems. In this paper, abstracts, the titles, and the Microsoft academic graphs have been used in coming up with the recommendation list for every document, which is used to combine the content-based approaches and the co-citations. Prioritization and the blending of every technique have been allowed by the tuning system parameters, allowing for the authority in results of recommendation versus the paper novelty. In the end, we do observe that there is a direct correlation between the similarity rankings that have been produced by the system and the scores of the participant. The results coming from the associated scrips of analysis and the user survey have been made available through the recommendation system. Managers must gain the required expertise to fully utilize the benefits that come with business intelligence systems [1]. Data mining has become an important tool for managers that provides insights about their daily operations and leverage the information provided by decision support systems to improve customer relationships [2]. Additionally, managers require business intelligence systems that can rank the output in the order of priority. Ranking algorithm can replace the traditional data mining algorithms that will be discussed in-depth in the literature review [3]. 展开更多
关键词 Azure Data Lake U-SQL Author Recommendation System Power BI Microsoft Academic Big Data Word Embedding
下载PDF
Research on Node Classification Based on Joint Weighted Node Vectors
19
作者 Li Dai 《Journal of Applied Mathematics and Physics》 2024年第1期210-225,共16页
Node of network has lots of information, such as topology, text and label information. Therefore, node classification is an open issue. Recently, one vector of node is directly connected at the end of another vector. ... Node of network has lots of information, such as topology, text and label information. Therefore, node classification is an open issue. Recently, one vector of node is directly connected at the end of another vector. However, this method actually obtains the performance by extending dimensions and considering that the text and structural information are one-to-one, which is obviously unreasonable. Regarding this issue, a method by weighting vectors is proposed in this paper. Three methods, negative logarithm, modulus and sigmoid function are used to weight-trained vectors, then recombine the weighted vectors and put them into the SVM classifier for evaluation output. By comparing three different weighting methods, the results showed that using negative logarithm weighting achieved better results than the other two using modulus and sigmoid function weighting, and was superior to directly concatenating vectors in the same dimension. 展开更多
关键词 Node Classification Network Embedding Representation Learning Weighted Vectors Training
下载PDF
Teaching Reform and Practice of Embedded System Design Based on Outcome-Based Education
20
作者 Tao Zhang Xiangwu Deng 《Journal of Contemporary Educational Research》 2024年第3期13-18,共6页
Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditio... Embedded system design is the core course of the telecommunication major in engineering universities,which combines software and hardware through embedded development boards.Aiming at the problems existing in traditional teaching,this paper proposes curriculum teaching reform based on the outcome-based education(OBE)concept,including determining course objectives,reforming teaching modes and methods,and improving the curriculum assessment and evaluation system.After two semesters of practice,this method not only enhances students’learning initiative but also improves teaching quality. 展开更多
关键词 Embedded system design Outcome-based education(OBE) Teaching reform
下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部