Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
This paper proposes an improved You Only Look Once(YOLOv3)algorithm for automatically detecting damaged apples to promote the automation of the fruit processing *** the proposed method,a clustering method based on Rao...
详细信息
This paper proposes an improved You Only Look Once(YOLOv3)algorithm for automatically detecting damaged apples to promote the automation of the fruit processing *** the proposed method,a clustering method based on Rao-1 algorithm is introduced to optimize anchor box *** clustering method uses the intersection over the union to form the objective function and the most representative anchor boxes are generated for normal and damaged apple *** verify the feasibility and effectiveness of the proposed method,real apple images collected from the Internet are *** with the generic YOLOv3 and Fast Region-based Convolutional Neural Network(Fast R-CNN)algorithms,the proposed method yields the highest mean average precision value for the test ***,it is practical to apply the proposed method for intelligent apple detection and classification tasks.
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable inte...
详细信息
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable interlayer ***,the self-restacking and sluggish ions diffusion kinetics performance of MXenes during the alkali metal ions insertion/extraction process severely impedes their cycle stability and rate *** paper proposes an aniline molecule welding strategy for welding p-phenylenediamine(PPDA) into the interlayers of Ti2C through a dehydration condensation *** welded PPDA molecules can contribute pillar effect to the layered structure of *** pillar effect effectively maintains the structural stability during the sodium ions insertion/extraction process and effectively expands the interlayer spacing of Ti2C from 1.16 to 1.38 nm,thereby enhancing ions diffusion kinetics performance and improving the long-term cycle *** Ti2C-PPDA demonstrates outstanding Na+storage capability,exhibiting a specific capacity of 100.2 mAh·g-1at a current density of 0.1 A·g-1over 960 cycles and delivering a remarkable rate capability 81.2 mAh·g-1at a current density of 5 A·*** study demonstrates that expanding interlayer spacing is a promising strategy to enhance the Na+storage capacity and improve long-term cycling stability,which provides significant guidance for the design of two-dimensional Na+storage materials with high-rate capability and cycle stability.
This Letter proposes an improved Camshift algorithm based on the efficient channel attention (ECA)-ResNet model for laser spot tracking in underwater optical wireless communication (UOWC) systems. Experimental results...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
Cryptanalytic innovations are considered the most economical and useful method for guaranteeing information security across shared networks. Despite the tinier key magnitude of Elliptic Curve Cryptography (ECC) compar...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) fully discrete scheme with unconditional energy stability. Spatially the FEM is adopted, using a triangular mesh discretization strategy that can be adapted to complex regions. Temporally, the EIEQ approach is considered, which not only linearizes the nonlinear potential but also gives a new variable that we combine with the nonlocal splitting method to achieve the fully decoupled computation. The strategy can successfully transform the Allen-Cahn system into some completely independent algebraic equations and linear elliptic equations with constant coefficients, we only need to solve these simple equations at each time step. Moreover, we conducted some numerical experiments to demonstrate the effectiveness of the strategy.
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Although most of the existing image super-resolution(SR)methods have achieved superior performance,contrastive learning for high-level tasks has not been fully utilized in the existing image SR methods based on deep *...
详细信息
Although most of the existing image super-resolution(SR)methods have achieved superior performance,contrastive learning for high-level tasks has not been fully utilized in the existing image SR methods based on deep *** work focuses on two well-known strategies developed for lightweight and robust SR,i.e.,contrastive learning and feedback mechanism,and proposes an integrated solution called a split-based feedback network(SPFBN).The proposed SPFBN is based on a feedback mechanism to learn abstract representations and uses contrastive learning to explore high information in the representation ***,this work first uses hidden states and constraints in recurrent neural network(RNN)to implement a feedback ***,use contrastive learning to perform representation learning to obtain high-level information by pushing the final image to the intermediate images and pulling the final SR image to the high-resolution ***,a split-based feedback block(SPFB)is proposed to reduce model redundancy,which tolerates features with similar patterns but requires fewer *** experimental results demonstrate the superiority of the proposed method in comparison with the state-of-the-art ***,this work extends the experiment to prove the effectiveness of this method and shows better overall reconstruction quality.
暂无评论