期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
1
作者 Xiaozhong Yu Jinhua Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期197-225,共29页
In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s... In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests. 展开更多
关键词 Deep learning rice diseases and pests image recognition object detection
下载PDF
Superposed Transparency Effect and Entanglement Generation with Hybrid System of Photonic Molecule and Dipole Emitter
2
作者 袁季兵 彭朝晖 +1 位作者 唐世清 张登玉 《Chinese Physics Letters》 SCIE CAS CSCD 2019年第3期41-44,共4页
We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced tr... We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced transparency(CRIT) effect and the dipole-induced transparency(DIT) effect. It is found that the superposed transparency windows are consistently narrower than the CRIT and DIT transparency windows. Benefiting from the superposed transparency effect, the photonic Faraday rotation effect could be realized in the photonic molecule system, which is useful for entanglement generation and quantum information processing. 展开更多
关键词 DIT TRANSPARENCY PHOTONIC MOLECULE EMITTER
原文传递
ALCencryption:A Secure and Efficient Algorithm for Medical Image Encryption 被引量:1
3
作者 Jiao Ge 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第12期1083-1100,共18页
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an... With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be encrypted.In order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is designed.The algorithm first analyzes the medical image and distinguishes the color image from the gray image.For gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion algorithm.The color image is encrypted by cross-diffusion algorithm of double chaotic map.Security and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption time.It is suitable for medical image encryption of mobile devices with high real-time requirements. 展开更多
关键词 Patient privacy DICOM medical image encryption scrambling degree CROSS-DIFFUSION
下载PDF
SepFE:Separable Fusion Enhanced Network for Retinal Vessel Segmentation
4
作者 Yun Wu Ge Jiao Jiahao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2465-2485,共21页
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation... The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation approaches based on convolutional neural networks(CNNs)have achieved remarkable effectiveness.Here,we extend a retinal vessel segmentation model with low complexity and high performance based on U-Net,which is one of the most popular architectures.In view of the excellent work of depth-wise separable convolution,we introduce it to replace the standard convolutional layer.The complexity of the proposed model is reduced by decreasing the number of parameters and calculations required for themodel.To ensure performance while lowering redundant parameters,we integrate the pre-trained MobileNet V2 into the encoder.Then,a feature fusion residual module(FFRM)is designed to facilitate complementary strengths by enhancing the effective fusion between adjacent levels,which alleviates extraneous clutter introduced by direct fusion.Finally,we provide detailed comparisons between the proposed SepFE and U-Net in three retinal image mainstream datasets(DRIVE,STARE,and CHASEDB1).The results show that the number of SepFE parameters is only 3%of U-Net,the Flops are only 8%of U-Net,and better segmentation performance is obtained.The superiority of SepFE is further demonstrated through comparisons with other advanced methods. 展开更多
关键词 Retinal vessel segmentation U-Net depth-wise separable convolution feature fusion
下载PDF
FSA-Net:A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization
5
作者 Zhipeng Bin Huihuang Zhao +1 位作者 Xiaoman Liang Wenli Chen 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期971-983,共13页
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images.In this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face... The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two images.In this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face swapping.The existing face-swapping methods ignore the blending attributes or mismatch the facial keypoint(cheek,mouth,eye,nose,etc.),which causes artifacts and makes the generated face silhouette non-realistic.To address this problem,a novel reinforced multi-aware attention module,referred to as RMAA,is proposed for handling facial fusion and expression occlusion flaws.The framework includes two stages.In the first stage,a novel attribute encoder is proposed to extract multiple levels of target face attributes and integrate identities and attributes when synthesizing swapped faces.In the second stage,a novel Stochastic Error Refinement(SRE)module is designed to solve the problem of facial occlusion,which is used to repair occlusion regions in a semi-supervised way without any post-processing.The proposed method is then compared with the current state-of-the-art methods.The obtained results demonstrate the qualitative and quantitative outperformance of the proposed method.More details are provided at the footnote link and at https://sites.google.com/view/fsa-net-official. 展开更多
关键词 Attention face-swapping neural network face manipulation identity swap image translation
下载PDF
Koebe Type Theorems and Pre-Schwarzian of Harmonic K-quasiconformal Mappings,and Their Applications
6
作者 Shao Lin CHEN Saminathan PONNUSAMY 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2022年第11期1965-1980,共16页
In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal mappings.Then we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients est... In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal mappings.Then we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Lipschitz characteristic and a linear measure distortion theorem of harmonic K-quasiconformal mappings.At last,we give some characterizations of the radial John disks with the help of pre-Schwarzian of harmonic mappings. 展开更多
关键词 Harmonic K-quasiconformal mapping Koebe type covering theorem Koebe type distortion theorem Radial John disk
原文传递
Development prospects of metal-based two-dimensional nanomaterials in lithium-sulfur batteries 被引量:1
7
作者 Yuxue Mo Liling Liao +4 位作者 Dongyang Li Rongwu Pan Yanhong Deng Yanliang Tan Haiqing Zhou 《Chinese Chemical Letters》 SCIE CAS CSCD 2023年第1期102-113,共12页
A lithium-sulfur(Li-S)system is an important candidate for future lithium-ion system due to its low cost and high specific theoretical capacity(1675 m Ah/g,2600 Wh/kg),which is greatly hindered by the poor conductivit... A lithium-sulfur(Li-S)system is an important candidate for future lithium-ion system due to its low cost and high specific theoretical capacity(1675 m Ah/g,2600 Wh/kg),which is greatly hindered by the poor conductivity of sulfur,large volume change and dissolution of lithium polysulfides.Two-dimensional(2D)materials with monolayers or few-layers usually have peculiar structures and physical/chemical properties,which can resolve the critical issues in Li-S batteries.Especially,the metal-based 2D nanomaterials,including ferrum,cobalt or other metal-based composites with various anions,can provide high conductivity,large surface area and abundant reaction sites for restraining the diffusion for lithium polysulfides.In this mini-review,we will present an overview of recent developments on metal-based 2D nanomaterials with various anions as the electrode materials for Li-S batteries.Since the main bottleneck for the Li-S system is the shuttle of polysulfides,emphasis is placed on the structure and components,physical/chemical interaction and interaction mechanisms of the 2D materials.Finally,the challenges and prospects of metal-based 2D nanomaterials for Li-S batteries are discussed and proposed. 展开更多
关键词 Lithium-sulfur battery Two-dimensional materials Cathode materials Anode materials Anode protection
原文传递
Exploring how hydrogen at gold-sulfur interface affects spin transport in single-molecule junction
8
作者 曾晶 陈克求 周艳红 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第8期525-530,共6页
Very recently,experimental evidence showed that the hydrogen is retained in dithiol-terminated single-molecule junction under the widely adopted preparation conditions,which is in contrast to the accepted view[Nat.Che... Very recently,experimental evidence showed that the hydrogen is retained in dithiol-terminated single-molecule junction under the widely adopted preparation conditions,which is in contrast to the accepted view[Nat.Chem.11351(2019)].However,the hydrogen is generally assumed to be lost in the previous physical models of single-molecule junctions.Whether the retention of the hydrogen at the gold-sulfur interface exerts a significant effect on the theoretical prediction of spin transport properties is an open question.Therefore,here in this paper we carry out a comparative study of spin transport in M-tetraphenylporphyrin-based(M=V,Cr,Mn,Fe,and Co;M-TPP)single-molecule junction through Au-SR and Au-S(H)R bondings.The results show that the hydrogen at the gold-sulfur interface may dramatically affect the spin-filtering efficiency of M-TPP-based single-molecule junction,depending on the type of transition metal ions embedded into porphyrin ring.Moreover,we find that for the Co-TPP-based molecular junction,the hydrogen at the gold-sulfur interface has no obvious effect on transmission at the Fermi level,but it has a significant effect on the spin-dependent transmission dip induced by the quantum interference on the occupied side.Thus the fate of hydrogen should be concerned in the physical model according to the actual preparation condition,which is important for our fundamental understanding of spin transport in the single-molecule junctions.Our work also provides guidance in how to experimentally identify the nature of gold-sulfur interface in the single-molecule junction with spin-polarized transport. 展开更多
关键词 transport properties molecular electronic devices gold-sulfur interface density-functional theory nonequilibrium Green’s functions
原文传递
A Novel Binary Firefly Algorithm for the Minimum Labeling Spanning Tree Problem
9
作者 Mugang Lin Fangju Liu +1 位作者 Huihuang Zhao Jianzhen Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第10期197-214,共18页
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatoria... Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatorial optimization problem,which is widely applied in communication networks,multimodal transportation networks,and data compression.Some approximation algorithms and heuristics algorithms have been proposed for the problem.Firefly algorithm is a new meta-heuristic algorithm.Because of its simplicity and easy implementation,it has been successfully applied in various fields.However,the basic firefly algorithm is not suitable for discrete problems.To this end,a novel discrete firefly algorithm for the MLST problem is proposed in this paper.A binary operation method to update firefly positions and a local feasible handling method are introduced,which correct unfeasible solutions,eliminate redundant labels,and make the algorithm more suitable for discrete problems.Computational results show that the algorithm has good performance.The algorithm can be extended to solve other discrete optimization problems. 展开更多
关键词 Minimum labeling spanning tree problem binary firefly algorithm META-HEURISTICS discrete optimization
下载PDF
Implementation of PRINCE with resource-efficient structures based on FPGAs
10
作者 Lang LI Jingya FENG +2 位作者 Botao LIU Ying GUO Qiuping LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第11期1505-1516,共12页
In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In th... In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In this paper, we propose new circuit structures for PRINCE components by sharing and simplifying logic circuits, to achieve the goal of using a smaller number of logic gates to obtain the same result. Based on the new circuit structures of components and the best sharing among components,we propose three new hardware architectures for PRINCE. The architectures are simulated and synthesized on different programmable gate array devices. The results on Virtex-6 show that compared with existing architectures, the resource consumption of the unrolled, low-cost, and two-cycle architectures is reduced by 73, 119, and 380 slices, respectively. The low-cost architecture costs only 137 slices. The unrolled architecture costs 409 slices and has a throughput of 5.34 Gb/s. To our knowledge, for the hardware implementation of PRINCE, the new low-cost architecture sets new area records, and the new unrolled architecture sets new throughput records. Therefore, the newly proposed architectures are more resource-efficient and suitable for lightweight,latency-critical applications. 展开更多
关键词 Lightweight block cipher Field-programmable gate array(FPGA) LOW-COST PRINCE Embedded security
原文传递
DBST:a lightweight block cipher based on dynamic S-box
11
作者 Liuyan YAN Lang LI Ying GUO 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第3期177-185,共9页
IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ... IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight block cipher based on dynamic S-box named DBST.It is introduced for devices with limited hardware resources and high throughput requirements.DBST is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant structure.It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure.The SubColumns of round function is implemented by combining bit-slice technology with subkeys.The S-box is dynamically associated with the key.It has been demonstrated that DBST has a good avalanche effect,low hardware area,and high throughput.Our S-box has been proven to have fewer differential features than RECTANGLE S-box.The security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks. 展开更多
关键词 internet of things 5G dynamic S-box bit-slice technology lightweight block cipher
原文传递
SCENERY:a lightweight block cipher based on Feistel structure
12
作者 Jingya FENG Lang LI 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期193-202,共10页
In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data... In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data processing consists of 28 rounds.The round function of SCENERY consists of 84×4 S-boxes in parallel and a 32× 32 binary matrix,and we can implement SCENERY with some basic logic instructions.The hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology,and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles 0118-bit microcontrollers and 364 clock cycles on 64-bit processors.Compared with other encryption algorithms,the performance of SCENERY is well balanced for both hardware and software.By the security analyses,SCENERY can achieve enough security margin against known attacks,such as differential cryptanalysis,linear cryptanalysis,impossible differential cryptanalysis and related-key attacks. 展开更多
关键词 lightweight block cipher feistel structure CRYPTANALYSIS internet of things
原文传递
Side-channel analysis attacks based on deep learning network
13
作者 Yu OU Lang LI 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第2期35-45,共11页
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have inv... There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have investigated the impact of the different models on attack results and the exact relationship between power consumption traces and intermediate values.Based on the convolutional neural network and the autoencoder,this paper proposes a Template Analysis Pre-trained DL Classification model named TAPDC which contains three sub-networks.The TAPDC model detects the periodicity of power trace,relating power to the intermediate values and mining the deeper features by the multi-layer convolutional net.We implement the TAPDC model and compare it with two classical models in a fair experiment.The evaluative results show that the TAPDC model with autoencoder and deep convolution feature extraction structure in SCA can more effectively extract information from power consumption trace.Also,Using the classifier layer,this model links power information to the probability of intermediate value.It completes the conversion from power trace to intermediate values and greatly improves the efficiency of the power attack. 展开更多
关键词 side-channel analysis template attack machine learning deep learning
原文传递
An improved Isomap method for manifold learning
14
作者 Taiguo Qu Zixing Cai 《International Journal of Intelligent Computing and Cybernetics》 EI 2017年第1期30-40,共11页
Purpose-Isometric feature mapping(Isomap)is a very popular manifold learning method and is widely used in dimensionality reduction and data visualization.The most time-consuming step in Isomap is to compute the shorte... Purpose-Isometric feature mapping(Isomap)is a very popular manifold learning method and is widely used in dimensionality reduction and data visualization.The most time-consuming step in Isomap is to compute the shortest paths between all pairs of data points based on a neighbourhood graph.The classical Isomap(C-Isomap)is very slow,due to the use of Floyd’s algorithm to compute the shortest paths.The purpose of this paper is to speed up Isomap.Design/methodology/approach-Through theoretical analysis,it is found that the neighbourhood graph in Isomap is sparse.In this case,the Dijkstra’s algorithm with Fibonacci heap(Fib-Dij)is faster than Floyd’s algorithm.In this paper,an improved Isomap method based on Fib-Dij is proposed.By using Fib-Dij to replace Floyd’s algorithm,an improved Isomap method is presented in this paper.Findings-Using the S-curve,the Swiss-roll,the Frey face database,the mixed national institute of standards and technology database of handwritten digits and a face image database,the performance of the proposed method is compared with C-Isomap,showing the consistency with C-Isomap and marked improvements in terms of the high speed.Simulations also demonstrate that Fib-Dij reduces the computation time of the shortest paths from O(N3)to O(N2lgN).Research limitations/implications-Due to the limitations of the computer,the sizes of the data sets in this paper are all smaller than 3,000.Therefore,researchers are encouraged to test the proposed algorithm on larger data sets.Originality/value-The new method based on Fib-Dij can greatly improve the speed of Isomap. 展开更多
关键词 Dijkstra’s algorithm Fibonacci heap Floyd’s algorithm ISOMAP Manifold learning Shortest path Paper type Research paper
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部