首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   2篇
电工技术   1篇
机械仪表   1篇
无线电   2篇
自动化技术   1篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2012年   1篇
排序方式: 共有5条查询结果,搜索用时 31 毫秒
1
1.
Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.  相似文献   
2.
为解决移动物联网数据传输过程中存在的数据传输质量不高、网络传输带宽较低等不足,提出了基于节点-链路评估 模型的移动物联网数据传输稳定算法。 考虑节点移动特性,设计了一种新的基于节点-链路评估模型,实现数据传输过程的多 维度评估。 随后,根据节点-链路评估模型,提出了数据传输依序度、中继链路控制度、传输能量可控度 3 个指标;并通过匹配节 点的传输功率,设计了基于数据传输依序度的移动物联网链路稳定方法,采用泊松分布模型来构建基于中继链路控制度的节点 稳定方法,并通过预估节点受限性能,提出了基于传输能量可控度的节点失效态传输节能方案,分别从节点、链路、能量 3 个层 次优化了移动物联网数据传输性能,有效提高较网络传输的稳定性。 仿真实验表明,与基于似然估计补偿机制的移动无线传感 网数据控制同步传输算法和基于预发射-精度提升机制的 LTE-5G 数据传输算法相比,所提算法具有更低的网络拥塞水平和节 点受限概率,以及更高的网络传输带宽。  相似文献   
3.
膝骨关节炎(OA)是老年人活动受限和身体残疾的主要原因之一,对膝骨关节炎的早期发现和干预可以帮助病人减缓OA的恶化。目前膝骨关节炎的早期发现通过X光片进行诊断,参照Kellgren-Lawrence(KL)标准进行评分,但医师的评分相对主观,不同医生存在差异。膝骨关节炎的等级分类是个有序分类问题,序列罚权损失函数将距离真实类别越远的等级赋予了更高的罚权,因此它更适合于膝骨关节炎的等级分类。然而,已有工作中的罚权一旦给定,就不再变化,导致其训练模型常常达不到期望的结果。本文针对序列罚权损失的不足,提出一种自适应序列罚权调整策略,通过对每一个阶段(epoch)得到的混淆矩阵,反向指导惩罚权重进行微调,使得罚权矩阵能够自适应调整。进一步地,本文利用来自骨关节炎倡议组织(OAI)的X射线图像数据,在ResNet, VGG,DenseNet以及Inception等几种经典的CNN模型上验证该方法的性能。实验结果表明在膝骨关节炎KL分级任务上,本文提出的自适应序列罚权调整策略在初始罚权分差较小时,能够有效地提升模型分类精度(AC)与平均绝对误差(MAE)。  相似文献   
4.
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has created a novel paradigm for improving the speed of common connected objects in IoT. However, although it makes it easier for ubiquitous resource-constrained equipment that outsources computing tasks to achieve high-speed transmission services, security concerns, such as a lack of reliability and collusion attacks, still exist in the outsourcing computation. In this paper, we propose a reliable, anti-collusion outsourcing computation and verification protocol, which uses distributed storage solutions in response to the issue of centralized storage, leverages homomorphic encryption to deal with outsourcing computation and ensures data privacy. Moreover, we embed outsourcing computation results and a novel polynomial factorization algorithm into the smart contract of Ethereum, which not only enables the verification of the outsourcing result without a trusted third party but also resists collusion attacks. The results of the theoretical analysis and experimental performance evaluation demonstrate that the proposed protocol is secure, reliable, and more effective compared with state-of-the-art approaches.  相似文献   
5.
Authenticated group key exchange (AGKE) protocol provides secure group communications for participants in cooperative and distributed applications over open network environments such as the Internet and wireless networks. In the past, a number of AGKE protocols based on the identity (ID)-based public key system (IDPKS) have been proposed, called ID-AGKE protocols. In the IDPKS system, users’ identities are viewed as the public keys to eliminate certificate management of the traditional certificate-based public key system. Nevertheless, any certificate-based public key systems or IDPKS systems must provide a revocation mechanism to revoke misbehaving/compromised users from the public key systems. However, there was little work on studying the revocation problem of the IDPKS system. Quite recently, Tseng and Tsai presented a new ID-based encryption scheme and its associated revocation mechanism to solve the revocation problem efficiently, called revocable ID-based public key system (R-IDPKS). In this paper, we follow Tseng and Tsai’s R-IDPKS system to propose the first revocable ID-AGKE (RID-AGKE) protocol. Security analysis is made to demonstrate that the proposed RID-AGKE protocol is a provably secure AGKE protocol and can resist malicious participants. As compared to the recently proposed ID-AGKE protocols, the proposed RID-AGKE protocol is provably secure and has better performance while providing an efficient revocation mechanism.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号