期刊文献+
共找到1,272篇文章
< 1 2 64 >
每页显示 20 50 100
A game-theoretic approach for federated learning:A trade-off among privacy,accuracy and energy 被引量:2
1
作者 Lihua Yin Sixin Lin +3 位作者 Zhe Sun Ran Li Yuanyuan He Zhiqiang Hao 《Digital Communications and Networks》 SCIE CSCD 2024年第2期389-403,共15页
Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also ... Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also cause privacy leakage and energy consumption.How to optimize the energy consumption in distributed communication systems,while ensuring the privacy of users and model accuracy,has become an urgent challenge.In this paper,we define the FL as a 3-layer architecture including users,agents and server.In order to find a balance among model training accuracy,privacy-preserving effect,and energy consumption,we design the training process of FL as game models.We use an extensive game tree to analyze the key elements that influence the players’decisions in the single game,and then find the incentive mechanism that meet the social norms through the repeated game.The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality,and the proposed incentive mechanism can also promote users to submit high-quality data in FL.Following the multiple rounds of play,the incentive mechanism can help all players find the optimal strategies for energy,privacy,and accuracy of FL in distributed communication systems. 展开更多
关键词 Federated learning Privacy preservation Energy optimization Game theory Distributed communication systems
下载PDF
New pharmacological tools:the use of diterpenes to promote adult hippocampal neurogenesis 被引量:1
2
作者 Ricardo Gomez-Oliva Pedro Nunez-Abades Carmen Castro 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第8期1629-1630,共2页
Tissue regeneration maintains homeostasis and preserves the functional features of each tissue.However,not all tissues show a strong repairing capacity.This is the case of the central nervous system.It is now well est... Tissue regeneration maintains homeostasis and preserves the functional features of each tissue.However,not all tissues show a strong repairing capacity.This is the case of the central nervous system.It is now well established that the generation of new functional neurons from stem cells in the adult brain occurs in specific regions of the brain of different species such as rodents,birds,primates,and humans(Eriksson et al.,1998). 展开更多
关键词 capacity MAINTAIN preserve
下载PDF
Abnormal uterine bleeding successfully treated via ultrasoundguided microwave ablation of uterine myoma lesions: Three case reports 被引量:1
3
作者 Toshiyuki Kakinuma Kaoru Kakinuma +3 位作者 Rora Okamoto Kaoru Yanagida Michitaka Ohwada NobuhiroTakeshima 《World Journal of Clinical Cases》 SCIE 2024年第5期980-987,共8页
BACKGROUND Microwave endometrial ablation(MEA)is a minimally invasive treatment method for heavy menstrual bleeding.However,additional treatment is often required after recurrence of uterine myomas treated with MEA.Ad... BACKGROUND Microwave endometrial ablation(MEA)is a minimally invasive treatment method for heavy menstrual bleeding.However,additional treatment is often required after recurrence of uterine myomas treated with MEA.Additionally,because this treatment ablates the endometrium,it is not indicated for patients planning to become pregnant.To overcome these issues,we devised a method for ultrasound-guided microwave ablation of uterine myoma feeder vessels.We report three patients successfully treated for heavy menstrual bleeding,secondary to uterine myoma,using our novel method.CASE SUMMARY All patients had a favorable postoperative course,were discharged within 4 h,and experienced no complications.Further,no postoperative recurrence of heavy menstrual bleeding was noted.Our method also reduced the myoma’s maximum diameter.CONCLUSION This method does not ablate the endometrium,suggesting its potential appli-cation in patients planning to become pregnant. 展开更多
关键词 Uterine myoma MICROWAVE Heavy menstrual bleeding DYSMENORRHEA Fertility preservation Case report
下载PDF
Glucagon-like peptide-1 receptor agonists as a possible intervention to delay the onset of type 1 diabetes:A new horizon 被引量:1
4
作者 Mahmoud Nassar Ajay Chaudhuri +1 位作者 Husam Ghanim Paresh Dandona 《World Journal of Diabetes》 SCIE 2024年第2期133-136,共4页
Type 1 diabetes(T1D)is a chronic autoimmune condition that destroys insulinproducing beta cells in the pancreas,leading to insulin deficiency and hyperglycemia.The management of T1D primarily focuses on exogenous insu... Type 1 diabetes(T1D)is a chronic autoimmune condition that destroys insulinproducing beta cells in the pancreas,leading to insulin deficiency and hyperglycemia.The management of T1D primarily focuses on exogenous insulin replacement to control blood glucose levels.However,this approach does not address the underlying autoimmune process or prevent the progressive loss of beta cells.Recent research has explored the potential of glucagon-like peptide-1 receptor agonists(GLP-1RAs)as a novel intervention to modify the disease course and delay the onset of T1D.GLP-1RAs are medications initially developed for treating type 2 diabetes.They exert their effects by enhancing glucose-dependent insulin secretion,suppressing glucagon secretion,and slowing gastric emptying.Emerging evidence suggests that GLP-1RAs may also benefit the treatment of newly diagnosed patients with T1D.This article aims to highlight the potential of GLP-1RAs as an intervention to delay the onset of T1D,possibly through their potential immunomodulatory and anti-inflammatory effects and preservation of beta-cells.This article aims to explore the potential of shifting the paradigm of T1D management from reactive insulin replacement to proactive disease modification,which should open new avenues for preventing and treating T1D,improving the quality of life and long-term outcomes for individuals at risk of T1D. 展开更多
关键词 Type 1 diabetes Semaglutide Glucagon-like peptide-1 receptor agonists Insulin therapy Autoimmune response Blood glucose monitoring Β-cell preservation Early screening Teplizumab Randomized controlled trials
下载PDF
Additive Preservers of Idempotence and Jordan Homorphisms between Rings of Square Matrices 被引量:3
5
作者 Hong Mei YAO Chong Guang CAO Xian ZHANG 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第4期639-648,共10页
Suppose R is an idempotence-diagonalizable ring. Let n and m be two arbitrary positive integers with n ≥ 3. We denote by Mn(R) the ring of all n x n matrices over R. Let (Jn(R)) be the additive subgroup of Mn(... Suppose R is an idempotence-diagonalizable ring. Let n and m be two arbitrary positive integers with n ≥ 3. We denote by Mn(R) the ring of all n x n matrices over R. Let (Jn(R)) be the additive subgroup of Mn(R) generated additively by all idempotent matrices. Let JJ = (Jn(R)) or Mn(R). We describe the additive preservers of idempotence from JJ to Mm(R) when 2 is a unit of R. Thereby, we also characterize the Jordan (respectively, ring and ring anti-) homomorphisms from Mn (R) to Mm (R) when 2 is a unit of R. 展开更多
关键词 idempotence-diagonalizable ring additive preserver IDEMPOTENCE Jordan homomorphism ring homomorphism ring anti-homomorphism
原文传递
Additive Preservers of Drazin Invertible Operators with Bounded Index 被引量:1
6
作者 Mourad OUDGHIRI Khalid SOUILAH 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2017年第9期1225-1241,共17页
Let B(X) be the algebra of all bounded linear operators on an infinite-dimensional complex or real Banach space X. Given an integer n 〉 1, we show that an additive surjective map Ф on B(X) preserves Drazin inver... Let B(X) be the algebra of all bounded linear operators on an infinite-dimensional complex or real Banach space X. Given an integer n 〉 1, we show that an additive surjective map Ф on B(X) preserves Drazin invertible operators of index non-greater than n in both directions if and only if Ф is either of the form Ф(T) = aATA-1 or of the form Ф(T) = aBT*B-1 where a is a non-zero scalar, A : X → X and B : X* → X are two bounded invertible linear or conjugate linear operators. 展开更多
关键词 Linear preserver problems Drazin inverse ASCENT DESCENT
原文传递
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
7
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC SECURITY privacy preservation DECRYPTION INTEGRITY
下载PDF
Neural membrane repair at the core of regeneration
8
作者 Catarina Dias Jesper Nylandsted 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1399-1400,共2页
Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the em... Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the emergence of vital membrane processes(Cooper and McNeil,2015).This relationship between basic cellular functioning and membrane repair highlights the fundamental significance of preserving membrane integrity for cellular life. 展开更多
关键词 REPAIR PRESERVING INTEGRITY
下载PDF
Establishment of microneurovascular units in alginate hydrogel microspheres to reveal the anti-hypoxic effect of salidroside
9
作者 Shiyu Chen Yuxuan Li +5 位作者 Yingrui Zhang Hongren Yao Tong Xu Yi Zhang Jin-Ming Lin Xian-Li Meng 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第6期926-929,共4页
Microneurovascular units(mNVUs),comprising neurons,micro-glia,and blood-brain barrier(BBB)endothelial cells,are pivotal to the central nervous system and are associated with cerebral hypoxia and brain injuries.Cerebra... Microneurovascular units(mNVUs),comprising neurons,micro-glia,and blood-brain barrier(BBB)endothelial cells,are pivotal to the central nervous system and are associated with cerebral hypoxia and brain injuries.Cerebral hypoxia triggers microglial overactivity,causing inflammation,neuronal injury,and disruption of the BBB[1].Salidroside(Sal),a key compound in Tibetan medicine Rhodiola crenulata,mitigates hypoxia-induced metabolic disorders and neuronal damage by preserving mitochondrial function[2]. 展开更多
关键词 injuries preserving TIBETAN
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
10
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
SDGNN: Symmetry-Preserving Dual-Stream Graph Neural Networks
11
作者 Jiufang Chen Ye Yuan Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1717-1719,共3页
Dear Editor,This letter proposes a symmetry-preserving dual-stream graph neural network(SDGNN) for precise representation learning to an undirected weighted graph(UWG). Although existing graph neural networks(GNNs) ar... Dear Editor,This letter proposes a symmetry-preserving dual-stream graph neural network(SDGNN) for precise representation learning to an undirected weighted graph(UWG). Although existing graph neural networks(GNNs) are influential instruments for representation learning to a UWG, they invariably adopt a unique node feature matrix for illustrating the sole node set of a UWG. 展开更多
关键词 REPRESENTATION PRESERVING undirected
下载PDF
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
12
作者 Sandeep Dasari Rajesh Kaluri 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期2035-2051,共17页
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizations for various banking services may result in various intrusions and privacy leakages.As a result,this study employs federated learning(FL)using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global model.However,diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of privacy.To address this issue,the present paper proposes the imple-mentation of Federated Averaging(FedAvg)and Federated Proximal(FedProx)methods in the flower framework,which take advantage of the data locality while training and guaranteeing global convergence.Resultantly improves the privacy of the local models.This analysis used the credit card and Canadian Institute for Cybersecurity Intrusion Detection Evaluation(CICIDS)datasets.Precision,recall,and accuracy as performance indicators to show the efficacy of the proposed strategy using FedAvg and FedProx.The experimental findings suggest that the proposed approach helps to safely use banking data from diverse sources to enhance customer banking services by obtaining accuracy of 99.55%and 83.72%for FedAvg and 99.57%,and 84.63%for FedProx. 展开更多
关键词 Federated learning FedAvg FedProx flower framework privacy preservation financial sectors
下载PDF
Privacy-Preserving Consensus-Based Distributed Economic Dispatch of Smart Grids via State Decomposition
13
作者 Wei Chen Guo-Ping Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第5期1250-1261,共12页
This paper studies the privacy-preserving distributed economic dispatch(DED)problem of smart grids.An autonomous consensus-based algorithm is developed via local data exchange with neighboring nodes,which covers both ... This paper studies the privacy-preserving distributed economic dispatch(DED)problem of smart grids.An autonomous consensus-based algorithm is developed via local data exchange with neighboring nodes,which covers both the islanded mode and the grid-connected mode of smart grids.To prevent power-sensitive information from being disclosed,a privacy-preserving mechanism is integrated into the proposed DED algorithm by randomly decomposing the state into two parts,where only partial data is transmitted.Our objective is to develop a privacy-preserving DED algorithm to achieve optimal power dispatch with the lowest generation cost under physical constraints while preventing sensitive information from being eavesdropped.To this end,a comprehensive analysis framework is established to ensure that the proposed algorithm can converge to the optimal solution of the concerned optimization problem by means of the consensus theory and the eigenvalue perturbation approach.In particular,the proposed autonomous algorithm can achieve a smooth transition between the islanded mode and the grid-connected mode.Furthermore,rigorous analysis is given to show privacy-preserving performance against internal and external eavesdroppers.Finally,case studies illustrate the feasibility and validity of the developed algorithm. 展开更多
关键词 PRESERVING AUTONOMOUS mode
下载PDF
Statistical Process Monitoring Based on Ensemble Structure Analysis
14
作者 Likang Shi Chudong Tong +1 位作者 Ting Lan Xuhua Shi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1889-1891,共3页
Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and m... Dear Editor,This letter presents a novel process monitoring model based on ensemble structure analysis(ESA).The ESA model takes advantage of principal component analysis(PCA),locality preserving projections(LPP),and multi-manifold projections(MMP)models,and then combines the multiple solutions within an ensemble result through Bayesian inference.In the developed ESA model,different structure features of the given dataset are taken into account simultaneously,the suitability and reliability of the ESA-based monitoring model are then illustrated through comparison.Introduction:The requirement for ensuring safe operation and improving process efficiency has led to increased research activity in the field of process monitoring. 展开更多
关键词 ENSEMBLE PRESERVING LETTER
下载PDF
Phosphodiesterase 9 localization in cytoplasm and nucleus:the gateway to selective targeting in neuroprotection?
15
作者 Giovanni Ribaudo Matteo Giannangeli +1 位作者 Margrate Anyanwu Alessandra Gianoncelli 《Neural Regeneration Research》 SCIE CAS 2025年第6期1701-1702,共2页
The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect... The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect more than 50million people worldwide.Neurodegenerative disorders are characterized by sundry factors and pathophysiological mechanisms that a re challenging to be fully profiled.Many of these rely on cell signaling pathways to preserve homeostasis,involving second messengers such as cyclic adenosine monophosphate (cAMP)and cyclic guanosine 3',5'-monophosphate(cGMP).Their ability to control the duration and amplitude of the signaling cascade is given by the presence of several common and uncommon effectors.Protein kinases A and G (PKA and PKG),phosphodiesterases (PDEs),and scaffold proteins are among them. 展开更多
关键词 GATEWAY HOMEOSTASIS preserve
下载PDF
Feature Matching via Topology-Aware Graph Interaction Model
16
作者 Yifan Lu Jiayi Ma +2 位作者 Xiaoguang Mei Jun Huang Xiao-Ping Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期113-130,共18页
Feature matching plays a key role in computer vision. However, due to the limitations of the descriptors, the putative matches are inevitably contaminated by massive outliers.This paper attempts to tackle the outlier ... Feature matching plays a key role in computer vision. However, due to the limitations of the descriptors, the putative matches are inevitably contaminated by massive outliers.This paper attempts to tackle the outlier filtering problem from two aspects. First, a robust and efficient graph interaction model,is proposed, with the assumption that matches are correlated with each other rather than independently distributed. To this end, we construct a graph based on the local relationships of matches and formulate the outlier filtering task as a binary labeling energy minimization problem, where the pairwise term encodes the interaction between matches. We further show that this formulation can be solved globally by graph cut algorithm. Our new formulation always improves the performance of previous localitybased method without noticeable deterioration in processing time,adding a few milliseconds. Second, to construct a better graph structure, a robust and geometrically meaningful topology-aware relationship is developed to capture the topology relationship between matches. The two components in sum lead to topology interaction matching(TIM), an effective and efficient method for outlier filtering. Extensive experiments on several large and diverse datasets for multiple vision tasks including general feature matching, as well as relative pose estimation, homography and fundamental matrix estimation, loop-closure detection, and multi-modal image matching, demonstrate that our TIM is more competitive than current state-of-the-art methods, in terms of generality, efficiency, and effectiveness. The source code is publicly available at http://github.com/YifanLu2000/TIM. 展开更多
关键词 Feature matching graph cut outlier filtering topology preserving
下载PDF
Apatite Fission Track Thermochronology of Granite from the Xiazhuang Uranium Ore Field,South China:Implications for Exhumation History and Ore Preservation
17
作者 SUN Yue CHEN Zhengle +4 位作者 PAN Jiayong HUO Hailong LI Haidong SUN Junjie XU Guangchun 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2024年第2期430-440,共11页
Xiazhuang uranium ore field,located in the southern part of the Nanling Metallogenic Belt,is considered one of the largest granite-related U regions in South China.In this paper,we contribute new apatite fission track... Xiazhuang uranium ore field,located in the southern part of the Nanling Metallogenic Belt,is considered one of the largest granite-related U regions in South China.In this paper,we contribute new apatite fission track data and thermal history modeling to constrain the exhumation history and evaluate preservation potential of the Xiazhuang Uranium ore field.Nine Triassic outcrop granite samples collected from different locations of Xiazhuang Uranium ore field yield AFT ages ranging from 43 to 24 Ma with similar mean confined fission track lengths ranging from 11.8±2.0 to 12.9±1.9μm and Dpar values between 1.01 and 1.51μm.The robustness time-temperature reconstructions of samples from the hanging wall of Huangpi fault show that the Xiazhuang Uranium ore field experienced a time of monotonous and slow cooling starting from middle Paleocene to middle Miocene(~60-10 Ma),followed by relatively rapid exhumation in the late Miocene(~10-5 Ma)and nearly thermal stability in the Pliocene-Quaternary(~5-0 Ma).The amount of exhumation after U mineralization since the Middle Paleogene was estimated as~4.3±1.8 km according to the integrated thermal history model.Previous studies indicate that the ore-forming ages of U deposits in the Xiazhuang ore field are mainly before Middle Paleocene and the mineralization depths are more than 4.4±1.2 km.Therefore,the exhumation history since middle Paleocene plays important roles in the preservation of the Xiazhuang Uranium ore field. 展开更多
关键词 apatite fission track exhumation history ore preservation Xiazhuang Uranium ore field South China
下载PDF
Influence of tectonic preservation conditions on the nanopore structure of shale reservoir:A case study of Wufeng-Longmaxi Formation shale in western Hubei area,south China
18
作者 Meng Xiang Shang Xu +2 位作者 Ya-Ru Wen Qi-Yang Gou Bing-Chang Liu 《Petroleum Science》 SCIE EI CAS CSCD 2024年第4期2203-2217,共15页
Tectonism is one of the dominant factors affecting the shale pore structure.However,the control of shale pore structure by tectonic movements is still controversial,which limits the research progress of shale gas accu... Tectonism is one of the dominant factors affecting the shale pore structure.However,the control of shale pore structure by tectonic movements is still controversial,which limits the research progress of shale gas accumulation mechanism in the complex tectonic region of southern China.In this study,34 samples were collected from two exploratory wells located in different tectonic locations.Diverse experiments,e.g.,organic geochemistry,XRD analysis,FE-SEM,low-pressure gas adsorption,and high-pressure mercury intrusion,were conducted to fully characterize the shale reservoir.The TOC,Ro,and mineral composition of the shale samples between the two wells are similar,which reflects that the shale samples of the two wells have proximate pores-generating capacity and pores-supporting capacity.However,the pore characteristics of shale samples from two wells are significantly different.Compared with the stabilized zone shale,the porosity,pore volume,and specific surface area of the deformed zone shale were reduced by 60.61%,64.85%,and 27.81%,respectively.Moreover,the macroscopic and fine pores were reduced by 54.01%and 84.95%,respectively.Fault activity and uplift denudation are not conducive to pore preservation,and the rigid basement of Huangling uplift can promote pore preservation.These three factors are important reasons for controlling the difference in pore structure between two wells shales.We established a conceptual model of shale pores evolution under different tectonic preservation conditions.This study is significant to clarify the scale of shale gas formation and enrichment in complex tectonic regions,and helps in the selection of shale sweet spots. 展开更多
关键词 Shale gas Pore structure Tectonic preservation conditions Shale gas enrichment mechanism
下载PDF
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT:A federated learning approach
19
作者 Mohamed Abdel-Basset Hossam Hawash +2 位作者 Nour Moustafa Imran Razzak Mohamed Abd Elfattah 《Digital Communications and Networks》 SCIE CSCD 2024年第2期404-415,共12页
With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become v... With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber services.The complexity and heterogeneity of smart cities have become vulnerable to sophisticated cyber-attacks,especially privacy-related attacks such as inference and data poisoning ones.Federated Learning(FL)has been regarded as a hopeful method to enable distributed learning with privacypreserved intelligence in IoT applications.Even though the significance of developing privacy-preserving FL has drawn as a great research interest,the current research only concentrates on FL with independent identically distributed(i.i.d)data and few studies have addressed the non-i.i.d setting.FL is known to be vulnerable to Generative Adversarial Network(GAN)attacks,where an adversary can presume to act as a contributor participating in the training process to acquire the private data of other contributors.This paper proposes an innovative Privacy Protection-based Federated Deep Learning(PP-FDL)framework,which accomplishes data protection against privacy-related GAN attacks,along with high classification rates from non-i.i.d data.PP-FDL is designed to enable fog nodes to cooperate to train the FDL model in a way that ensures contributors have no access to the data of each other,where class probabilities are protected utilizing a private identifier generated for each class.The PP-FDL framework is evaluated for image classification using simple convolutional networks which are trained using MNIST and CIFAR-10 datasets.The empirical results have revealed that PF-DFL can achieve data protection and the framework outperforms the other three state-of-the-art models with 3%–8%as accuracy improvements. 展开更多
关键词 Privacy preservation Federated learning Deep learning Fog computing Smart cities
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
20
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部