Resource Type

Journal Article 331

Conference Videos 31

Year

2024 1

2023 38

2022 55

2021 41

2020 32

2019 29

2018 18

2017 26

2016 15

2015 16

2014 11

2013 7

2012 7

2011 6

2010 9

2009 1

2008 7

2007 8

2006 6

2005 2

open ︾

Keywords

big data 20

data mining 12

Big data 9

Machine learning 7

Blockchain 5

Artificial intelligence 4

Deep learning 4

Data mining 3

Data-driven 3

Industry 4.0 3

Additive manufacturing 2

Anomaly detection 2

Big Data 2

Big data analytics 2

China 2

Cloud storage 2

Concept drift 2

Data privacy 2

Data-driven method 2

open ︾

Search scope:

排序: Display mode:

High-payload completely reversible data hiding in encrypted images by an interpolation technique Article

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1732-1743 doi: 10.1631/FITEE.1601067

Abstract: We present a new high-payload joint reversible data-hiding scheme for encrypted images.Instead of embedding data in the encrypted image directly, the content owner first uses an interpolationNext, the data hider embeds the additional data through flipping the most significant bits (MSBs) ofAt the receiver side, before extracting the additional data and reconstructing the image, the receiverMoreover, our scheme can embed more payloads than most existing reversible data hiding schemes in encrypted

Keywords: Encrypted image     Data hiding     Image recovery     Real reversibility     Interpolation    

Reversible data hiding using a transformer predictor and an adaptive embedding strategy Research Article

Linna ZHOU, Zhigao LU, Weike YOU, Xiaofei FANG,zhoulinna@bupt.edu.cn,luchen@uir.edu.cn,ywk@bupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1143-1155 doi: 10.1631/FITEE.2300041

Abstract: effectively reduce the distortion and provide satisfactory results in improving the visual quality of data-hidden

Keywords: Reversible data hiding     Transformer     Adaptive embedding strategy    

High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and Research Article

Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1156-1168 doi: 10.1631/FITEE.2200501

Abstract: In the data embedding stage, the adaptive MSB prediction method proposed by Wang and He (2022) is improved

Keywords: Adaptive quadtree partitioning     Adaptive most significant bit (MSB) prediction     Reversible data hiding    

The System Standpoint on Information Safety

Li Daimao

Strategic Study of CAE 2007, Volume 9, Issue 8,   Pages 21-25

Abstract:

The meanings in three layers on information safety are given.  It is proposed that all management,  strategy and technology are necessary to implement information safety,  because the science of information safety is the merger of natural and social sciences.  The concept of information system which includes elements,  boundary,  working condition and relevant people is proposed.  The relation between the system and information safety is analyzed,  and an example about information safety in communication is given.  The procedure of safety designing is suggested.

Keywords: information safety     security factor     information hiding     boundary     threat    

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 946-963 doi: 10.1631/FITEE.1700667

Abstract:

This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.

Keywords: Copyright protection     Data hiding     Multi-resolution decomposition     De-correlation     Security    

A review of systematic evaluation and improvement in the big data environment

Feng YANG, Manman WANG

Frontiers of Engineering Management 2020, Volume 7, Issue 1,   Pages 27-46 doi: 10.1007/s42524-020-0092-6

Abstract: The era of big data brings unprecedented opportunities and challenges to management research.Exploring the applicable evaluation methods in the big data environment has become an important subjectpaper is to provide an overview and discussion of systematic evaluation and improvement in the big dataWe first review the evaluation methods based on the main analytic techniques of big data such as dataFocused on the characteristics of big data (association feature, data loss, data noise, and visualization

Keywords: big data     evaluation methods     systematic improvement     big data analytic techniques     data mining    

Data quality assessment for studies investigating microplastics and nanoplastics in food products: Arecurrent data reliable?

Frontiers of Environmental Science & Engineering 2023, Volume 17, Issue 8, doi: 10.1007/s11783-023-1694-0

Abstract:

Data quality assessment criteria for MP/NPs in food products were

Keywords: Microplastic     Nanoplastic     Food products     Data quality     Human health risk    

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Frontiers of Engineering Management 2020, Volume 7, Issue 4,   Pages 605-614 doi: 10.1007/s42524-020-0138-9

Abstract: To guarantee data privacy and data security as well as to harness the value of health data, the conceptof Health Data Bank (HDB) is proposed.In this study, HDB is defined as an integrated health data service institution, which bears no “ownership” of health data and operates health data under the principal–agent model.; (2) data rights; (3) health data supervision; (4) and willingness to share health data.

Keywords: Health Data Bank     blockchain     data assets     smart contract     incentive mechanism    

Challenges to Engineering Management in the Big Data Era

Yong Shi

Frontiers of Engineering Management 2015, Volume 2, Issue 3,   Pages 293-303 doi: 10.15302/J-FEM-2015042

Abstract: as the Big Data applications.First, it outlines the definitions of big data, data science and intelligent knowledge and the historyof big data.Second, the paper reviews the academic activities about big data in China.and non-structured data into “structured format” and explores the relationship of data heterogeneity

Keywords: big data     data science     intelligent knowledge     engineering management     real-life applications    

Intelligent data analytics is here to change engineering management

Jonathan Jingsheng SHI, Saixing ZENG, Xiaohua MENG

Frontiers of Engineering Management 2017, Volume 4, Issue 1,   Pages 41-48 doi: 10.15302/J-FEM-2017003

Abstract: Data enabling technology plays an important role in modern scientific discovery and technologic advancementFactual data enables managers to measure, to understand their businesses, and to directly translate thatareas: 1) by making relevant historical data available to the manager at the time when it’s needed;2) by filtering out actionable intelligence from the ocean of data; and 3) by integrating useful dataacquisition and data analytics.

Keywords: engineering management     project management     big data     data analytics     planning     execution    

Special issue: Innovative applications of big data and artificial intelligence

Frontiers of Engineering Management 2022, Volume 9, Issue 4,   Pages 517-519 doi: 10.1007/s42524-022-0234-0

Anensemble method for data stream classification in the presence of concept drift

Omid ABBASZADEH,Ali AMIRI,Ali Reza KHANTEYMOORI

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 12,   Pages 1059-1068 doi: 10.1631/FITEE.1400398

Abstract: One recent area of interest in computer science is data stream management and processing.By ‘data stream’, we refer to continuous and rapidly generated packages of data.Specific features of data streams are immense volume, high production rate, limited data processing time, and data concept drift; these features differentiate the data stream from standard types of data.An issue for the data stream is classification of input data.

Keywords: Data stream     Classificaion     Ensemble classifiers     Concept drift    

Methodological considerations for redesigning sustainable cropping systems: the value of data-mininglarge and detailed farm data sets at the cropping system level

Nicolas MUNIER-JOLAIN, Martin LECHENET

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 1,   Pages 21-27 doi: 10.15302/J-FASE-2019292

Abstract: Large data sets collected from real farms allow for the development of innovative methods to produceData mining methods allow for the diversity of systems to be considered holistically and can take intouse and their effect on farm performance, we advocate further investment in the development of large data

Keywords: data mining     holistic     Integrated Pest Management     economics     DEPHY network.    

Multi-timescale optimization scheduling of interconnected data centers based on model predictive control

Frontiers in Energy doi: 10.1007/s11708-023-0912-6

Abstract: With the promotion of “dual carbon” strategy, data center (DC) access to high-penetration renewable energyIn this paper, a multi-timescale optimal scheduling model is established for interconnected data centers

Keywords: model predictive control     interconnected data center     multi-timescale     optimized scheduling     distributed    

Big data and machine learning: A roadmap towards smart plants

Frontiers of Engineering Management   Pages 623-639 doi: 10.1007/s42524-022-0218-0

Abstract: components are smart sensing, mobile communication, Internet of Things, modelling and simulation, advanced dataessential element to this transformation is the exploitation of large amounts of historical process dataand large volumes of data generated in real-time by smart sensors widely used in industry.Exploitation of the information contained in these data requires the use of advanced machine learning

Keywords: big data     machine learning     artificial intelligence     smart sensor     cyber–physical system     Industry 4.0    

Title Author Date Type Operation

High-payload completely reversible data hiding in encrypted images by an interpolation technique

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Journal Article

Reversible data hiding using a transformer predictor and an adaptive embedding strategy

Linna ZHOU, Zhigao LU, Weike YOU, Xiaofei FANG,zhoulinna@bupt.edu.cn,luchen@uir.edu.cn,ywk@bupt.edu.cn

Journal Article

High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and

Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com

Journal Article

The System Standpoint on Information Safety

Li Daimao

Journal Article

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Journal Article

A review of systematic evaluation and improvement in the big data environment

Feng YANG, Manman WANG

Journal Article

Data quality assessment for studies investigating microplastics and nanoplastics in food products: Arecurrent data reliable?

Journal Article

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Journal Article

Challenges to Engineering Management in the Big Data Era

Yong Shi

Journal Article

Intelligent data analytics is here to change engineering management

Jonathan Jingsheng SHI, Saixing ZENG, Xiaohua MENG

Journal Article

Special issue: Innovative applications of big data and artificial intelligence

Journal Article

Anensemble method for data stream classification in the presence of concept drift

Omid ABBASZADEH,Ali AMIRI,Ali Reza KHANTEYMOORI

Journal Article

Methodological considerations for redesigning sustainable cropping systems: the value of data-mininglarge and detailed farm data sets at the cropping system level

Nicolas MUNIER-JOLAIN, Martin LECHENET

Journal Article

Multi-timescale optimization scheduling of interconnected data centers based on model predictive control

Journal Article

Big data and machine learning: A roadmap towards smart plants

Journal Article