Resource Type

Journal Article 442

Year

2024 1

2023 48

2022 45

2021 59

2020 49

2019 35

2018 34

2017 30

2016 35

2015 7

2014 1

2013 3

2012 3

2011 5

2010 1

2009 5

2008 9

2007 11

2006 10

2005 15

open ︾

Keywords

neural network 16

Deep learning 10

Artificial intelligence 8

Neural network 8

Software-defined networking (SDN) 7

Machine learning 5

cyberspace 5

cyberspace security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Boolean control networks 3

Network security 3

fuzzy sets 3

5G 2

Accelerator 2

Artificial intelligence (AI) 2

BP algorithm 2

open ︾

Search scope:

排序: Display mode:

Texture branch network for chronic kidney disease screening based on ultrasound images Research Articles

Peng-yi Hao, Zhen-yu Xu, Shu-yuan Tian, Fu-li Wu, Wei Chen, Jian Wu, Xiao-nan Luo,fuliwu@zjut.edu.cn

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 8,   Pages 1119-1266 doi: 10.1631/FITEE.1900210

Abstract: (CKD) is a widespread renal disease throughout the world. Once it develops to the advanced stage, serious complications and high risk of death will follow. Hence, early screening is crucial for the treatment of CKD. Since ultrasonography has no side effects and enables radiologists to dynamically observe the morphology and pathological features of the kidney, it is commonly used for kidney examination. In this study, we propose a novel convolutional neural network (CNN) framework named the to screen CKD based on images. This introduces a texture branch into a typical CNN to extract and optimize texture features. The model can automatically generate texture features and deep features from input images, and use the fused information as the basis of classification. Furthermore, we train the base part of the network by means of , and conduct experiments on a dataset with 226 images. Experimental results demonstrate the effectiveness of the proposed approach, achieving an accuracy of 96.01% and a sensitivity of 99.44%.

Keywords: 慢性肾脏病;超声;纹理分支网络;迁移学习    

Picosecond Laser Surface Texturing of a Stavax Steel Substrate for Wettability Control Article

Xincai Wang, Hongyu Zheng, Yinchi Wan, Wenhe Feng, Yee Cheong Lam

Engineering 2018, Volume 4, Issue 6,   Pages 816-821 doi: 10.1016/j.eng.2018.10.006

Abstract:

In this investigation, a picosecond laser was employed to fabricate surface textures on a Stavax steel substrate, which is a key material for mold fabrication in the manufacturing of various polymer products. Three main types of surface textures were fabricated on a Stavax steel substrate: periodic ripples, a two-scale hierarchical two-dimensional array of micro-bumps, and a micro-pits array with nanoripples. The wettability of the laser-textured Stavax steel surface was converted from its original hydrophilicity into hydrophobicity and even super-hydrophobicity after exposure to air. The results clearly show that this super-hydrophobicity is mainly due to the surface textures. The ultrafast laserinduced catalytic effect may play a secondary role in modifying the surface chemistry so as to lower the surface energy. The laser-induced surface textures on the metal mold substrates were then replicated onto polypropylene substrates via the polymer injection molding process. The surface wettability of the molded polypropylene was found to be changed from the original hydrophilicity to superhydrophobicity. This developed process holds the potential to improve the performance of fabricated plastic products in terms of wettability control and easy cleaning.

Keywords: Picosecond laser     Surface texturing     Stavax steel     Polymer     Hydrophobicity    

A Method for License Plate Localization based on Texture and Wavelet Analysis

Huang Wei,Lu Xiaobo,Yu Yanxiang,Ling Xiaojing

Strategic Study of CAE 2004, Volume 6, Issue 3,   Pages 19-24

Abstract:

This paper presents a method for vehicle license plate localization using texture and wavelet analysis. In view of the complex background and the small ratio of the license plate area to the whole picture, a method for finding a threshold for primitive classification is proposed. According to the distribution regularities of the characters in the license plate, a binary texture primitive analysis method is presented to extract the candidate license plate areas. A feature of the vertical strokes in the license plate is extracted using wavelet analysis. The feature of the vertical strokes, position feature and shape feature are quantificationally evaluated using membership degree, and a method for selecting the license plate area from the candidates by integrating all the features is described. A test shows that the proposed method offers a localization correctness rate of higher than 96% .

Keywords: texture     wavelet analysis     primitive     license plate localization    

Optimal communication frequency for switching cabled ocean networks with commands carried over the power line Research Article

Yan-hu Chen, Yu-jia Zang, Jia-jie Yao, Gul Muhammad,yanhuchen@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 10,   Pages 1331-1343 doi: 10.1631/FITEE.1900125

Abstract: s with tree or ring topologies play an important role in real-time ocean exploration. Due to the time-consuming need for field maintenance, technology that can actively switch the power on/off on certain branches of the network becomes essential for enhancing the reliability and availability of the network. In this paper, a novel switching-control method is proposed, in which we invert the power transmission polarity and use the current on the power line as the digital signal at low frequency to broadcast information with the address and commands to the network, and the corresponding (BU) can decode and execute the switching commands. The cable’s parasitic parameters, the network scale, and the number of BUs, as the influencing factors of the on the power line, are theoretically studied and simulated. An optimized frequency that balances the executing accuracy and rate is calculated and proved on a simulated prototype. The results showed that the technology with optimized frequency can enhance the switching accuracy and configuring rate.

Keywords: 海缆开断;海洋观测网;分支单元;传输线理论;通信频率    

A New Subdiscipline of Contemporary Optics—Aero-optics

Yin Xingliang

Strategic Study of CAE 2005, Volume 7, Issue 12,   Pages 1-6

Abstract:

Based on developing process of aero-optics, the background of the subject is introduced. The definition, intension, research object, research methods of the subject are proposed. The research contents are described, which include mechanism, calibration methods, calibration tests for aero-optic effects and optic window of the hypersonic aircraft. The theoretical research, engineering modeling, testing principle and testing methods in China are described in detail. Some representative results are given. At last, the application prospects and research tendency of the subject are suggested.

Keywords: aerodynamics     turbulent flows     optics     aero-optics    

A mechanical reliability study of 3-dB waveguide hybrid couplers in submillimeter and terahertz bands Research Articles

Zhongqian Niu, Bo Zhang, Daotong Li, Dongfeng Ji, Yang Liu, Yinian Feng, Tianchi Zhou, Yaohui Zhang, Yong Fan,zhangbouestc@yeah.net

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 8,   Pages 1104-1113 doi: 10.1631/FITEE.2000229

Abstract: This paper presents a study of s in submillimeter and terahertz bands. To show the necessity of improving the mechanical properties of the coupler’s branch in submillimeter and terahertz bands, a comprehensive study regarding the displacement of hybrid branch variation with varying width-length ratio and height-length ratio has been completed. In addition, a modified is designed and presented. Compared with the traditional branch structure, the proposed hybrid consists of a modified middle branch with circular cutouts at the top and bottom on both sides instead of the traditional rectangle branch, which increases the branch size and improves its while achieving the same performance. Simulation results show that the deformation of the modified hybrid branch is 22% less than those of other traditional structure designs under the same stress. In practice, a vibration experiment is set up to verify the of hybrid couplers. Measurement results show that the experiment deteriorates the coupling performance. Experimental results verify that the performance of the novel structure coupler is better than that of a traditional structure branch hybrid coupler under the same electrical properties.

Keywords: 定向耦合器;3-dB分支波导定向耦合器;亚毫米波器件;太赫兹电路;机械可靠性    

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cyber sovereignty guarantee has attracted great attention around the world. From the perspective of China's cyber sovereignty situation, this paper analyzes the main problems related to China's cyber sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense, and jurisdiction. Corresponding countermeasures and suggestions are also provided. The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse right on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace security interests.

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

Calculation of the Behavior Utility of a Network System: Conception and Principle Article

Changzhen Hu

Engineering 2018, Volume 4, Issue 1,   Pages 78-84 doi: 10.1016/j.eng.2018.02.010

Abstract:

The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison. This paper describes scenes of network behavior as differential manifolds. Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathematical description of the network behavior path and behavior utility. Based on the principle of differential geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility. We also provide a calculation framework for assessment of the network’s attack-defense confrontation on the strength of behavior utility. Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior.

Keywords: Network metric evaluation     Differential manifold     Network behavior utility     Network attack-defense confrontation    

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001

Abstract:

Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.

Keywords: cyberspace     cyberspace sovereignty     stakeholder    

Future Internet: trends and challenges Special Feature on Future Network-Review Article

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9,   Pages 1185-1194 doi: 10.1631/FITEE.1800445

Abstract: Traditional networks face many challenges due to the diversity of applications, such as cloud computing, Internet of Things, and the industrial Internet. Future Internet needs to address these challenges to improve network scalability, security, mobility, and quality of service. In this work, we survey the recently proposed architectures and the emerging technologies that meet these new demands. Some cases for these architectures and technologies are also presented. We propose an integrated framework called the service customized network which combines the strength of current architectures, and discuss some of the open challenges and opportunities for future Internet. We hope that this work can help readers quickly understand the problems and challenges in the current research and serves as a guide and motivation for future network research.

Keywords: Future Internet     Network architecture     Service customized network    

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010

Abstract:

The rapid development of quantum information has brought new opportunities and challenges to modern information technologies. As one of the popular research directions in the field of quantum information, quantum networks aim to utilize the fundamental properties of quantum mechanics to achieve long-distance (secure) communications or provide computational capabilities superior to classical computing networks through distributed computing. The study of quantum networks holds great significance in advancing the practicality of quantum information. To gain a comprehensive understanding of the development trajectory of quantum networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloud computing, and quantum teleportation networks, based on different application scenarios and technical approaches. It provides comprehensive reviews of both domestic and international research progress and the challenges faced in each aspect. Furthermore, in conjunction with the practical implementation of quantum networks, the key technologies that need to be overcome in the development of quantum network systems, involving link establishment, information transmission, networking protocols, and physical hardware, are summarized. Overall, the development of quantum networks is still in the primary stage. At this stage, actively addressing challenges and seizing opportunities are of great significance to enhance the technological prowess of China. Therefore, to promote the development of quantum network systems in China, suggestions are proposed from three aspects: strengthening investment in the research and development of fundamental hardware infrastructure, attaching importance to the theoretical research of quantum networks, and enhancing interdisciplinary research and talent cultivation.

Keywords: quantum information     quantum network     quantum cryptography network     quantum cloud computing network     quantum teleportation network    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Spontaneous versus posed smile recognition via region-specific texture descriptor and geometric facial dynamics Article

Ping-ping WU, Hong LIU, Xue-wu ZHANG, Yuan GAO

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 955-967 doi: 10.1631/FITEE.1600041

Abstract: As a typical biometric cue with great diversities, smile is a fairly influential signal in social interaction, which reveals the emotional feeling and inner state of a person. Spontaneous and posed smiles initiated by different brain systems have differences in both morphology and dynamics. Distinguishing the two types of smiles remains challenging as discriminative subtle changes need to be captured, which are also uneasily observed by human eyes. Most previous related works about spontaneous versus posed smile recognition concentrate on extracting geometric features while appearance features are not fully used, leading to the loss of texture information. In this paper, we propose a region-specific texture descriptor to represent local pattern changes of different facial regions and compensate for limitations of geometric features. The temporal phase of each facial region is divided by calculating the intensity of the corresponding facial region rather than the intensity of only the mouth region. A mid-level fusion strategy of support vector machine is employed to combine the two feature types. Experimental results show that both our proposed appearance representation and its combination with geometry-based facial dynamics achieve favorable performances on four baseline databases: BBC, SPOS, MMI, and UvA-NEMO.

Keywords: Facial landmark localization     Geometric feature     Appearance feature     Smile recognition    

Information Network—— Frontier of Information Engineering Science

Zhong Yixin

Strategic Study of CAE 1999, Volume 1, Issue 1,   Pages 24-29

Abstract:

Information Network has been grown up and spread out to the entire globe extremely swiftly in recent years. It has also very quickly turned out to be a world-wide new infrastructure of the society and made great influence to the ways people work, live, learn and think.The astonished phenomenon has been regarded as a real frontier and focus in science and engineering, extracting great attentions from science and engineering circle as well as the whole world.

An attempt is made in the paper to establish a new discipline, the information network engineering, based on the above phenomenon.First, the concept of information network is re-defined clearly here and then the working mechanism of information network is analyzed in depth. A comparative discussion on the functions embodied in human activities and that performed in information network is carried out and the working relationship between man and information network is found to be the socalled symbiosis. As a result of the analyses above, a list of the important issues and directions in information network engineering study is briefly summarized.

Keywords: information network     intelligent productive tools     network age     information network engineering    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation strategy    

Title Author Date Type Operation

Texture branch network for chronic kidney disease screening based on ultrasound images

Peng-yi Hao, Zhen-yu Xu, Shu-yuan Tian, Fu-li Wu, Wei Chen, Jian Wu, Xiao-nan Luo,fuliwu@zjut.edu.cn

Journal Article

Picosecond Laser Surface Texturing of a Stavax Steel Substrate for Wettability Control

Xincai Wang, Hongyu Zheng, Yinchi Wan, Wenhe Feng, Yee Cheong Lam

Journal Article

A Method for License Plate Localization based on Texture and Wavelet Analysis

Huang Wei,Lu Xiaobo,Yu Yanxiang,Ling Xiaojing

Journal Article

Optimal communication frequency for switching cabled ocean networks with commands carried over the power line

Yan-hu Chen, Yu-jia Zang, Jia-jie Yao, Gul Muhammad,yanhuchen@zju.edu.cn

Journal Article

A New Subdiscipline of Contemporary Optics—Aero-optics

Yin Xingliang

Journal Article

A mechanical reliability study of 3-dB waveguide hybrid couplers in submillimeter and terahertz bands

Zhongqian Niu, Bo Zhang, Daotong Li, Dongfeng Ji, Yang Liu, Yinian Feng, Tianchi Zhou, Yaohui Zhang, Yong Fan,zhangbouestc@yeah.net

Journal Article

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Calculation of the Behavior Utility of a Network System: Conception and Principle

Changzhen Hu

Journal Article

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Journal Article

Future Internet: trends and challenges

Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU

Journal Article

Research Progress and Key Technologies of Quantum Network Systems

Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Spontaneous versus posed smile recognition via region-specific texture descriptor and geometric facial dynamics

Ping-ping WU, Hong LIU, Xue-wu ZHANG, Yuan GAO

Journal Article

Information Network—— Frontier of Information Engineering Science

Zhong Yixin

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article