期刊文献+
共找到18,114篇文章
< 1 2 250 >
每页显示 20 50 100
The viscous strip approach to simplify the calculation of the surface acoustic wave generated streaming
1
作者 F.JAZINI DORCHEH M.GHASSEMI 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第4期711-724,共14页
In recent decades,the importance of surface acoustic waves,as a biocompatible tool to integrate with microfluidics,has been proven in various medical and biological applications.The numerical modeling of acoustic stre... In recent decades,the importance of surface acoustic waves,as a biocompatible tool to integrate with microfluidics,has been proven in various medical and biological applications.The numerical modeling of acoustic streaming caused by surface acoustic waves in microchannels requires the effect of viscosity to be considered in the equations which complicates the solution.In this paper,it is shown that the major contribution of viscosity and the horizontal component of actuation is concentrated in a narrow region alongside the actuation boundary.Since the inviscid equations are considerably easier to solve,a division into the viscous and inviscid domains would alleviate the computational load significantly.The particles'traces calculated by this approximation are excellently alongside their counterparts from the completely viscous model.It is also shown that the optimum thickness for the viscous strip is about 9-fold the acoustic boundary layer thickness for various flow patterns and amplitudes of actuation. 展开更多
关键词 surface acoustic wave MICROFLUIDICS numerical simulation particle tracing acoustic streaming
下载PDF
Improved Data Stream Clustering Method: Incorporating KD-Tree for Typicality and Eccentricity-Based Approach
2
作者 Dayu Xu Jiaming Lu +1 位作者 Xuyao Zhang Hongtao Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期2557-2573,共17页
Data stream clustering is integral to contemporary big data applications.However,addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research.This paper aims... Data stream clustering is integral to contemporary big data applications.However,addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research.This paper aims to elevate the efficiency and precision of data stream clustering,leveraging the TEDA(Typicality and Eccentricity Data Analysis)algorithm as a foundation,we introduce improvements by integrating a nearest neighbor search algorithm to enhance both the efficiency and accuracy of the algorithm.The original TEDA algorithm,grounded in the concept of“Typicality and Eccentricity Data Analytics”,represents an evolving and recursive method that requires no prior knowledge.While the algorithm autonomously creates and merges clusters as new data arrives,its efficiency is significantly hindered by the need to traverse all existing clusters upon the arrival of further data.This work presents the NS-TEDA(Neighbor Search Based Typicality and Eccentricity Data Analysis)algorithm by incorporating a KD-Tree(K-Dimensional Tree)algorithm integrated with the Scapegoat Tree.Upon arrival,this ensures that new data points interact solely with clusters in very close proximity.This significantly enhances algorithm efficiency while preventing a single data point from joining too many clusters and mitigating the merging of clusters with high overlap to some extent.We apply the NS-TEDA algorithm to several well-known datasets,comparing its performance with other data stream clustering algorithms and the original TEDA algorithm.The results demonstrate that the proposed algorithm achieves higher accuracy,and its runtime exhibits almost linear dependence on the volume of data,making it more suitable for large-scale data stream analysis research. 展开更多
关键词 Data stream clustering TEDA KD-TREE scapegoat tree
下载PDF
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code
3
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
下载PDF
Research on Current Situation and Legal Regulation of Cosmetics Live Streaming E-commerce in China
4
作者 Jiang Ying 《China Detergent & Cosmetics》 CAS 2024年第1期63-70,共8页
Analyze the compatibility between cosmetics and live streaming e-commerce from its own nature,marketing means and supply chain characteristics.According to the prominent problems,sort out the relationship between all ... Analyze the compatibility between cosmetics and live streaming e-commerce from its own nature,marketing means and supply chain characteristics.According to the prominent problems,sort out the relationship between all parties in the cosmetics live e-commerce industry chain.Combined with the latest regulatory policies of live streaming e-commerce and cosmetics,the responsibilities of different subjects in cosmetics live streaming e-commerce are summarized,and relevant suggestions and countermeasures are put forward for the standardization and development of live streaming e-commerce.Cosmetics brand owners are the first responsible persons for product quality.Anchors,as a mixed identity between intermediary,advertising spokesperson and operator,should bear stricter joint and several liability when recommending products related to consumers’health.If anchors fail to clearly identify themselves in the recommendation process,thus causing consumers to mistake them for the operator of the cosmetics,they should assume the obligations of the operator. 展开更多
关键词 COSMETICS live streaming e-commerce legal relationship responsibilities of parties
下载PDF
STREAM理念在中学化学核心素养的教学实践
5
作者 尚俊 《学苑教育》 2024年第10期91-93,共3页
核心素养理念再次激发了教师践行课改意识、创新思路、品质观念的踊跃性与自觉性,教师积极推动化学教学实现方法进阶、提质增效。为了提升化学教学的素养型,教师开始将STREAM理念引入课堂活动,简要解析STREAM理念是核心素养的落实支持,... 核心素养理念再次激发了教师践行课改意识、创新思路、品质观念的踊跃性与自觉性,教师积极推动化学教学实现方法进阶、提质增效。为了提升化学教学的素养型,教师开始将STREAM理念引入课堂活动,简要解析STREAM理念是核心素养的落实支持,扼要概括STREAM理念下核心素养培养的研究价值,全面总结STREAM理念下核心素养培养的教学方法。因此,STREAM理念开启了核心素养培养活动的新方法、新导向,能科学培养初中生的高阶思维与课程能力。 展开更多
关键词 stream理念 核心素养培养 落实支持 研究价值 教学方法
下载PDF
STREAM教育背景下小学跨学科课程实施路径研究
6
作者 侯跃芳 岳丽 杨帆 《小学教学研究》 2024年第5期21-23,共3页
当前跨学科课程的有效开展面临诸多困难和挑战,将STREAM教育理念融入跨学科主题学习中,为跨学科课程实施提供新思路。文章分别从设计真实驱动问题、深化学生合作探究、促进多门学科整合、优化课程评价体系四个维度对STREAM教育理念指导... 当前跨学科课程的有效开展面临诸多困难和挑战,将STREAM教育理念融入跨学科主题学习中,为跨学科课程实施提供新思路。文章分别从设计真实驱动问题、深化学生合作探究、促进多门学科整合、优化课程评价体系四个维度对STREAM教育理念指导下小学跨学科课程的实施方式进行归纳总结,旨在为小学跨学科课程的有效开展提供理论指导和实践参考。 展开更多
关键词 stream教育 跨学科课程 课程实施
下载PDF
Subspace Clustering in High-Dimensional Data Streams:A Systematic Literature Review
7
作者 Nur Laila Ab Ghani Izzatdin Abdul Aziz Said Jadid AbdulKadir 《Computers, Materials & Continua》 SCIE EI 2023年第5期4649-4668,共20页
Clustering high dimensional data is challenging as data dimensionality increases the distance between data points,resulting in sparse regions that degrade clustering performance.Subspace clustering is a common approac... Clustering high dimensional data is challenging as data dimensionality increases the distance between data points,resulting in sparse regions that degrade clustering performance.Subspace clustering is a common approach for processing high-dimensional data by finding relevant features for each cluster in the data space.Subspace clustering methods extend traditional clustering to account for the constraints imposed by data streams.Data streams are not only high-dimensional,but also unbounded and evolving.This necessitates the development of subspace clustering algorithms that can handle high dimensionality and adapt to the unique characteristics of data streams.Although many articles have contributed to the literature review on data stream clustering,there is currently no specific review on subspace clustering algorithms in high-dimensional data streams.Therefore,this article aims to systematically review the existing literature on subspace clustering of data streams in high-dimensional streaming environments.The review follows a systematic methodological approach and includes 18 articles for the final analysis.The analysis focused on two research questions related to the general clustering process and dealing with the unbounded and evolving characteristics of data streams.The main findings relate to six elements:clustering process,cluster search,subspace search,synopsis structure,cluster maintenance,and evaluation measures.Most algorithms use a two-phase clustering approach consisting of an initialization stage,a refinement stage,a cluster maintenance stage,and a final clustering stage.The density-based top-down subspace clustering approach is more widely used than the others because it is able to distinguish true clusters and outliers using projected microclusters.Most algorithms implicitly adapt to the evolving nature of the data stream by using a time fading function that is sensitive to outliers.Future work can focus on the clustering framework,parameter optimization,subspace search techniques,memory-efficient synopsis structures,explicit cluster change detection,and intrinsic performance metrics.This article can serve as a guide for researchers interested in high-dimensional subspace clustering methods for data streams. 展开更多
关键词 CLUSTERING subspace clustering projected clustering data stream stream clustering high dimensionality evolving data stream concept drift
下载PDF
脑卒中偏瘫患者步态特征及其与STREAM量表下肢运动部分评分间的相关性分析 被引量:2
8
作者 江炎 周云 +4 位作者 刘奕 丁呈彪 冯小军 冀磊磊 熊斌 《生物医学工程与临床》 CAS 2023年第4期434-441,共8页
脑卒中偏瘫患者的步态异常会严重影响其日常生活活动能力。步态分析作为定量评估方法已广泛应用于步态异常的科学研究,但步态分析数据繁杂,如何高效且规范化进行偏瘫患者的下肢运动功能的临床评估仍有待研究。目的探究脑卒中偏瘫患者步... 脑卒中偏瘫患者的步态异常会严重影响其日常生活活动能力。步态分析作为定量评估方法已广泛应用于步态异常的科学研究,但步态分析数据繁杂,如何高效且规范化进行偏瘫患者的下肢运动功能的临床评估仍有待研究。目的探究脑卒中偏瘫患者步态特征,并通过步态特征及脑卒中康复运动评价(STREAM)量表下肢运动部分评分的相关性分析筛选出一些步态的定量指标为偏瘫患者的下肢运动功能的临床评估和诊断提供规范化数据。方法 选择2021年5月至2022年6月在安徽医科大学第二附属医院康复医学科接受治疗的脑卒中后偏瘫患者21例为卒中组,其中男性12例,女性9例;年龄14~77岁,平均年龄49.29岁;身高153~181 cm,平均身高168.90 cm;体质量53~94 kg,平均体质量69.88岁;其中脑出血恢复期患者9例,脑梗死恢复期患者12例。选取同时间段自愿参与该研究的健康者21例作为健康组,其中男性11例,女性10例;年龄24~71岁,平均年龄49.14岁;身高155~183 cm,平均身高167.67 cm;体质量48~80 kg,平均体质量65.95 kg。应用步态分析系统及运动障碍数字化测试平台分别采集两组受试者步态参数,对采集的数据进行统计分析,并对STREAM量表下肢运动部分评分与卒中组各指标进行相关性分析。结果 卒中组步幅小于健康组,步宽、触地时长百分比大于健康组,步速小于健康组,步相角大于健康组,差异均有统计学意义(P <0.05);两组T区、M1区、M2区足底压力占比差异均无统计学意义(P> 0.05);卒中组MF区压力占比较健康组高,差异有显著统计学意义(P <0.01);卒中组HEEL区压力占比较健康组低,差异有统计学意义(P <0.05);卒中组在COP-X、COP-Y方向的偏移值均高于健康组,差异均有统计学意义(P <0.05);卒中组患侧峰值屈髋角度较健康组减少,差异有统计学意义(P <0.05);卒中组患侧峰值屈膝角度较健康组减少,差异有统计学意义(P <0.05);卒中组患者STREAM量表下肢运动部分评分为(12.81±3.14)分。Person相关性分析显示STREAM量表下肢运动部分评分与步速、步幅、触地时长百分比、峰值屈膝角度、峰值屈髋角度呈正相关(P <0.05),与COP-X、COP-Y呈负相关(P <0.05);STREAM量表下肢运动部分评分与步相角、步宽无相关性(P> 0.05)。结论 与健康人比较,脑卒中偏瘫患者步态特征具有显著改变。主要表现为足跟处负重减少、外侧缘负重增多,平衡差,患侧下肢屈髋屈膝不足,步行能力降低。步态分析的一些指标与STREAM量表下肢运动部分评分间具有显著相关性。故可作为评价脑卒中偏瘫患者步行能力的重要定量分析指标。 展开更多
关键词 脑卒中 偏瘫 步态分析 stream评分 相关性分析
原文传递
CeTrivium:A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission
9
作者 Osama S.Younes Abdulmohsen Alharbi +3 位作者 Ali Yasseen Faisal Alshareef Faisal Albalawi Umar A.Albalawi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2895-2920,共26页
Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution... Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution.The CA have recently gained recognition as a robust cryptographic primitive,being used as pseudorandom number generators in hash functions,block ciphers and stream ciphers.CA have the ability to perform parallel transformations,resulting in high throughput performance.Additionally,they exhibit a natural tendency to resist fault attacks.Few stream cipher schemes based on CA have been proposed in the literature.Though,their encryption/decryption throughput is relatively low,which makes them unsuitable formultimedia communication.Trivium and Grain are efficient stream ciphers that were selected as finalists in the eSTREAM project,but they have proven to be vulnerable to differential fault attacks.This work introduces a novel and scalable stream cipher named CeTrivium,whose design is based on CA.CeTrivium is a 5-neighborhood CA-based streamcipher inspired by the designs of Trivium and Grain.It is constructed using three building blocks:the Trivium(Tr)block,the Nonlinear-CA(NCA)block,and the Nonlinear Mixing(NM)block.The NCA block is a 64-bit nonlinear hybrid 5-neighborhood CA,while the Tr block has the same structure as the Trivium stream cipher.The NM block is a nonlinear,balanced,and reversible Boolean function that mixes the outputs of the Tr and NCA blocks to produce a keystream.Cryptanalysis of CeTrivium has indicated that it can resist various attacks,including correlation,algebraic,fault,cube,Meier and Staffelbach,and side channel attacks.Moreover,the scheme is evaluated using histogramand spectrogramanalysis,aswell as several differentmeasurements,including the correlation coefficient,number of samples change rate,signal-to-noise ratio,entropy,and peak signal-to-noise ratio.The performance of CeTrivium is evaluated and compared with other state-of-the-art techniques.CeTrivium outperforms them in terms of encryption throughput while maintaining high security.CeTrivium has high encryption and decryption speeds,is scalable,and resists various attacks,making it suitable for multimedia communication. 展开更多
关键词 stream ciphers cellular automata securing real-time streaming CRYPTOGRAPHY CeTrivium
下载PDF
Single-element Anomaly Mapping from Stream Sediment Geochemical Landscapes Aided by Digital Terrain Analysis
10
作者 XIANG Jie XIA Peng +2 位作者 XIAO Keyan Emmanuel John M.CARRANZA CHEN Jianping 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2023年第1期149-162,共14页
The identification of anomalies within stream sediment geochemical data is one of the fastest developing areas in mineral exploration.The various means used to achieve this objective make use of either continuous or d... The identification of anomalies within stream sediment geochemical data is one of the fastest developing areas in mineral exploration.The various means used to achieve this objective make use of either continuous or discrete field models of stream sediment geochemical data.To map anomalies in a discrete field model of such data,two corrections are required:background correction and downstream dilution correction.Topography and geomorphology are important factors in variations of element content in stream sediments.However,few studies have considered,through the use of digital terrain analysis,the influence of geomorphic features in downstream dilution correction of stream sediment geochemical data.This study proposes and demonstrates an improvement to the traditional downstream dilution correction equation,based on the use of digital terrain analysis to map single-element anomalies in stream sediment geochemical landscapes.Moreover,this study compares the results of analyses using discrete and continuous field models of stream sediment geochemical data from the Xincang area,Tibet.The efficiency of the proposed methodology was validated against known mineral occurrences.The results indicate that catchment-based analysis outperforms interpolation-based analysis of stream sediment geochemical data for anomaly mapping.Meanwhile,the proposed modified downstream dilution correction equation proved more effective than the original equation.However,further testing of this modified downstream dilution correction is needed in other areas,in order to investigate its efficiency further. 展开更多
关键词 stream sediment sample catchment basin digital terrain analysis downstream dilution correction background correction
下载PDF
基于Spark Streaming的气象自动站实时流处理与存储系统 被引量:1
11
作者 马彬 李玉涛 许琪 《计算机技术与发展》 2023年第3期207-214,共8页
在当前大数据技术蓬勃发展的时代,人们对气象数据的实时处理、数据质量、数据存储及大规模查询等要求也越来越高。针对现有气象自动站数据业务落地环节多,任务处理耦合紧但系统部署分散等问题,文中基于Spark Streaming的流式计算框架,... 在当前大数据技术蓬勃发展的时代,人们对气象数据的实时处理、数据质量、数据存储及大规模查询等要求也越来越高。针对现有气象自动站数据业务落地环节多,任务处理耦合紧但系统部署分散等问题,文中基于Spark Streaming的流式计算框架,研究使用Flume解析收集自动站原始数据,在Spark Streaming中设计融入自动站数据质控算法,最终通过对分布式数据库存储的表设计,使气象自动站数据具备高效率、高质量、高可靠的应用服务能力。性能测试结果表明,基于Spark Streaming的气象自动站数据实时流处理与存储系统,数据从文件采集、解码、流处理至入库的全流程能够在秒级完成,TB级数据查询响应为毫秒级,加权查询为秒级,完全满足自动站数据业务应用需求,从而为进一步提高气象自动站数据质量与服务水平提供基础支撑。 展开更多
关键词 气象自动站数据 Spark streaming 实时处理 FLUME 分布式数据库
下载PDF
国外STREAM教育实践案例分析及教学启示
12
作者 方洁钰 邹峥嵘 《生物学教学》 2023年第12期92-94,共3页
STREAM教育是以STEM教育为基础,包括科学、技术、阅读、工程、艺术和数学要素的跨学科教育理念。本文分析了美国、韩国、日本和泰国关于STREAM教育的案例与研究进展,为推进中国在STREAM教育的研究与实践提供参考。
关键词 stream 国外研究 案例分析
下载PDF
A dynamic control structure of liquid-only transfer stream distillation column
13
作者 Borui Liu Tao Zhang +3 位作者 Yi Zheng Kailong Li Hui Pan Hao Ling 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2023年第7期135-145,共11页
The intention of this fundamental work is to explore the manipulation of a mixture of benzene,toluene and o-xylene separated from liquid-only transfer divided-wall column(LTS-DWC).First,two control structures are clea... The intention of this fundamental work is to explore the manipulation of a mixture of benzene,toluene and o-xylene separated from liquid-only transfer divided-wall column(LTS-DWC).First,two control structures are clearly proposed,including seven component control loops(CS1)and seven temperature control loops(CS2).However,two control structures can handle ±10% feed disturbances rather than larger feed disturbances.Subsequently,an equivalent four-column model by introducing withdraw ratio is developed to discuss the effect of two liquid-only side-stream on the overall reboiler duty.It is indicated that the second liquid-only side-stream withdraw ratio strongly affects the overall energy consumption.Hence,six-component control loops within the fixed second liquid-only side-stream withdraw ratio(CS3)is proposed and the purity of products returns to set value even as facing ±20% feed disturbances.Finally,based on the above results,it is established a temperature control structure(CS4)for controlling fixed second liquid-only side-stream withdraw ratio,which can cope with ±15% disturbances.Inspired by these findings,an insight into the dynamic control of LTS-DWC promotes the industrial implementation of DWC through new liquid-only side-stream configurations. 展开更多
关键词 Separation Divided-wall column Liquid-only transfer stream Optimal design Dynamic modeling
下载PDF
Negligible Warming Caused by Nord Stream Methane Leaks
14
作者 Xiaolong CHEN Tianjun ZHOU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2023年第4期549-552,共4页
Unanticipated sabotage of two underwater pipelines in the Baltic Sea(Nord Stream 1 and 2)happened on 26September 2022.Massive quantities of natural gas,primarily methane,were released into the atmosphere,which lasted ... Unanticipated sabotage of two underwater pipelines in the Baltic Sea(Nord Stream 1 and 2)happened on 26September 2022.Massive quantities of natural gas,primarily methane,were released into the atmosphere,which lasted for about one week.As a more powerful greenhouse gas than CO_(2),the potential climatic impact of methane is a global concern.Using multiple methods and datasets,a recent study reported a relatively accurate magnitude of the leaked methane at 0.22±0.03 million tons(Mt),which was lower than the initial estimate in the immediate aftermath of the event.Under an energy conservation framework used in IPCC AR6,we derived a negligible increase in global surface air temperature of 1.8×10^(-5)℃ in a 20-year time horizon caused by the methane leaks with an upper limit of 0.25 Mt.Although the resultant warming from this methane leak incident was minor,future carbon release from additional Earth system feedbacks,such as thawing permafrost,and its impact on the methane mitigation pathways of the Paris Agreement,warrants investigation. 展开更多
关键词 Nord stream methane leak global warming potential climatic impact
下载PDF
Distribution pattern of acoustic and streaming field during multi-source ultrasonic melt treatment process
15
作者 Xiao-gang Fang Qi Wei +5 位作者 Tian-yang Zhang Ji-guang Liu You-wen Yang Shu-lin Lü Shu-sen Wu Yi-qing Chen 《China Foundry》 SCIE CAS CSCD 2023年第5期452-460,共9页
The ultrasonic melt treatment(UMT)is widely used in the fields of casting and metallurgy.However,there are certain drawbacks associated with the conventional process of single-source ultrasonic(SSU)treatment,such as t... The ultrasonic melt treatment(UMT)is widely used in the fields of casting and metallurgy.However,there are certain drawbacks associated with the conventional process of single-source ultrasonic(SSU)treatment,such as the fast attenuation of energy and limited range of effectiveness.In this study,the propagation models of SSU and four-source ultrasonic(FSU)in Al melt were respectively established,and the distribution patterns of acoustic and streaming field during the ultrasonic treatment process were investigated by numerical simulation and physical experiments.The simulated results show that the effective cavitation zone is mainly located in a small spherical region surrounding the end of ultrasonic horn during the SSU treatment process.When the FSU is applied,the effective cavitation zone is obviously expanded in the melt.It increases at first and then decreases with increasing the vibration-source spacing(Lv)from 30 mm to 100 mm.Especially,when the Lv is 80 mm,the area of effective cavitation zone reaches the largest,indicating the best effect of cavitation.Moreover,the acoustic streaming level and flow pattern in the melt also change with the increase of Lv.When the Lv is 80 mm,both the average flow rate and maximum flow rate of the melt reach the highest,and the flow structure is more stable and uniform,with the typical morphological characteristics of angular vortex,thus significantly expanding the range of acoustic streaming.The accuracy of the simulation results was verified by physical experiments of glycerol aqueous solution and tracer particles. 展开更多
关键词 four-source ultrasound acoustic cavitation streaming field vibration-source spacing
下载PDF
Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’Dilemma
16
作者 Khaled M.Suwais 《Computers, Materials & Continua》 SCIE EI 2023年第5期2685-2704,共20页
Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of... Data encryption is essential in securing exchanged data between connected parties.Encryption is the process of transforming readable text into scrambled,unreadable text using secure keys.Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption.Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological,social or physical behaviours.One technique is to utilise the behavioural aspects of game theory in a stream cipher.In this paper,we introduce an enhanced Deoxyribonucleic acid(DNA)-coded stream cipher based on an iterated n-player prisoner’s dilemma paradigm.Our main goal is to contribute to adding more layers of randomness to the behaviour of the keystream generation process;these layers are inspired by the behaviour of multiple players playing a prisoner’s dilemma game.We implement parallelism to compensate for the additional processing time that may result fromadding these extra layers of randomness.The results show that our enhanced design passes the statistical tests and achieves an encryption throughput of about 1,877 Mbit/s,which makes it a feasible secure stream cipher. 展开更多
关键词 ENCRYPTION game theory DNA cryptography stream cipher parallel computing
下载PDF
Machine Learning Based Classifiers for QoE Prediction Framework in Video Streaming over 5G Wireless Networks
17
作者 K.B.Ajeyprasaath P.Vetrivelan 《Computers, Materials & Continua》 SCIE EI 2023年第4期1919-1939,共21页
Recently,the combination of video services and 5G networks have been gaining attention in the wireless communication realm.With the brisk advancement in 5G network usage and the massive popularity of threedimensional ... Recently,the combination of video services and 5G networks have been gaining attention in the wireless communication realm.With the brisk advancement in 5G network usage and the massive popularity of threedimensional video streaming,the quality of experience(QoE)of video in 5G systems has been receiving overwhelming significance from both customers and service provider ends.Therefore,effectively categorizing QoE-aware video streaming is imperative for achieving greater client satisfaction.This work makes the following contribution:First,a simulation platform based on NS-3 is introduced to analyze and improve the performance of video services.The simulation is formulated to offer real-time measurements,saving the expensive expenses associated with real-world equipment.Second,A valuable framework for QoE-aware video streaming categorization is introduced in 5G networks based on machine learning(ML)by incorporating the hyperparameter tuning(HPT)principle.It implements an enhanced hyperparameter tuning(EHPT)ensemble and decision tree(DT)classifier for video streaming categorization.The performance of the ML approach is assessed by considering precision,accuracy,recall,and computation time metrics for manifesting the superiority of these classifiers regarding video streaming categorization.This paper demonstrates that our ML classifiers achieve QoE prediction accuracy of 92.59%for(EHPT)ensemble and 87.037%for decision tree(DT)classifiers. 展开更多
关键词 QoE-aware video streaming 5G networks wireless networks ensemble method
下载PDF
Combined Effect of Concept Drift and Class Imbalance on Model Performance During Stream Classification
18
作者 Abdul Sattar Palli Jafreezal Jaafar +3 位作者 Manzoor Ahmed Hashmani Heitor Murilo Gomes Aeshah Alsughayyir Abdul Rehman Gilal 《Computers, Materials & Continua》 SCIE EI 2023年第4期1827-1845,共19页
Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes over... Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes overtime, leading to class imbalance and concept drift issues. Both these issuescause model performance degradation. Most of the current work has beenfocused on developing an ensemble strategy by training a new classifier on thelatest data to resolve the issue. These techniques suffer while training the newclassifier if the data is imbalanced. Also, the class imbalance ratio may changegreatly from one input stream to another, making the problem more complex.The existing solutions proposed for addressing the combined issue of classimbalance and concept drift are lacking in understating of correlation of oneproblem with the other. This work studies the association between conceptdrift and class imbalance ratio and then demonstrates how changes in classimbalance ratio along with concept drift affect the classifier’s performance.We analyzed the effect of both the issues on minority and majority classesindividually. To do this, we conducted experiments on benchmark datasetsusing state-of-the-art classifiers especially designed for data stream classification.Precision, recall, F1 score, and geometric mean were used to measure theperformance. Our findings show that when both class imbalance and conceptdrift problems occur together the performance can decrease up to 15%. Ourresults also show that the increase in the imbalance ratio can cause a 10% to15% decrease in the precision scores of both minority and majority classes.The study findings may help in designing intelligent and adaptive solutionsthat can cope with the challenges of non-stationary data streams like conceptdrift and class imbalance. 展开更多
关键词 CLASSIFICATION data streams class imbalance concept drift class imbalance ratio
下载PDF
Sentiment Drift Detection and Analysis in Real Time Twitter Data Streams
19
作者 E.Susi A.P.Shanthi 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期3231-3246,共16页
Handling sentiment drifts in real time twitter data streams are a challen-ging task while performing sentiment classifications,because of the changes that occur in the sentiments of twitter users,with respect to time.... Handling sentiment drifts in real time twitter data streams are a challen-ging task while performing sentiment classifications,because of the changes that occur in the sentiments of twitter users,with respect to time.The growing volume of tweets with sentiment drifts has led to the need for devising an adaptive approach to detect and handle this drift in real time.This work proposes an adap-tive learning algorithm-based framework,Twitter Sentiment Drift Analysis-Bidir-ectional Encoder Representations from Transformers(TSDA-BERT),which introduces a sentiment drift measure to detect drifts and a domain impact score to adaptively retrain the classification model with domain relevant data in real time.The framework also works on static data by converting them to data streams using the Kafka tool.The experiments conducted on real time and simulated tweets of sports,health care andfinancial topics show that the proposed system is able to detect sentiment drifts and maintain the performance of the classification model,with accuracies of 91%,87%and 90%,respectively.Though the results have been provided only for a few topics,as a proof of concept,this framework can be applied to detect sentiment drifts and perform sentiment classification on real time data streams of any topic. 展开更多
关键词 Sentiment drift sentiment classification big data BERT real time data streams TWITTER
下载PDF
A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption
20
作者 Nashat Salih Abdulkarim Alsandi Dilovan Asaad Zebari +4 位作者 Adel Al-Zebari Falah Y.H.Ahmed Mazin Abed Mohammed Marwan Albahar Abdulaziz Ali Albahr 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1321-1347,共27页
Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue an... Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem.Small space of the key,encryption-based low confidentiality,low key sensitivity,and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study.In our proposed scheme,a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme.In the confusion stage,different scrambling operations related to the original plain image pixels are designed using Chen’s map.A stream pixel scrambling operation related to the plain image is constructed.Then,a block scrambling-based image encryption-related stream pixel scrambled image is designed.In the diffusion stage,two rounds of pixel diffusion are generated related to the confusing image for intra-image diffusion.Chen’s map,logistic map,and DNA computing are employed to construct diffusion operations.A reverse complementary rule is applied to obtain a new form of DNA.A Chen’s map is used to produce a pseudorandom DNA sequence,and then another DNA form is constructed from a reverse pseudorandom DNA sequence.Finally,the XOR operation is performed multiple times to obtain the encrypted image.According to the simulation of experiments and security analysis,this approach extends the key space,has great sensitivity,and is able to withstand various typical attacks.An adequate encryption effect is achieved by the proposed algorithm,which can simultaneously decrease the correlation between adjacent pixels by making it near zero,also the information entropy is increased.The number of pixels changing rate(NPCR)and the unified average change intensity(UACI)both are very near to optimal values. 展开更多
关键词 Grayscale image encryption stream scrambling-confusion DNA encoding XOR operation chaotic systems
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部