Search scope:
排序: Display mode:
ECGID: a human identification method based on adaptive particle swarm optimization and the bidirectional LSTM model Research Article
Yefei Zhang, Zhidong Zhao, Yanjun Deng, Xiaohong Zhang, Yu Zhang,zhangyf@hdu.edu.cn,zhaozd@hdu.edu.cn,yanjund@hdu.edu.cn,xhzhang@hdu.edu.cn,zy2009@hdu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 12, Pages 1551-1684 doi: 10.1631/FITEE.2000511
Keywords: 心电图生物特征;个体身份识别;长短期记忆网络;自适应粒子群优化算法
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.
Keywords: network electronic identity identity management digital signature
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005
This paper analyzes and sorts out the policies, laws, and regulations of network electronic identity management in major countries, regions in foreign countries, and China. It discusses the development of China's network identity management, and outlines the 13th Five-Year Plan's policies and regulations for network electronic identity management in China, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.
Keywords: network electronic identity identity management policies and regulations
Perspectives of Individual-Worn Sensors Assessing Personal Environmental Exposure
Uwe Schlink, Maximilian Ueberham
Engineering 2021, Volume 7, Issue 3, Pages 285-289 doi: 10.1016/j.eng.2020.07.023
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with errors problem Gaussian
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
J. Patel, F. McGain, T. Bhatelia, S. Wang, B. Sun, J. Monty, V. Pareek
Engineering 2022, Volume 15, Issue 8, Pages 126-132 doi: 10.1016/j.eng.2020.12.024
By providing a means of separating the airborne emissions of patients from the air breathed by healthcare workers (HCWs), vented individual patient (VIP) hoods, a form of local exhaust ventilation (LEV), offer a new approach to reduce hospital-acquired infection (HAI). Results from recent studies have demonstrated that, for typical patient-emitted aerosols, VIP hoods provide protection at least equivalent to that of an N95 mask. Unlike a mask, hood performance can be easily monitored and HCWs can be alerted to failure by alarms. The appropriate use of these relatively simple devices could both reduce the reliance on personal protective equipment (PPE) for infection control and provide a low-cost and energy-efficient form of protection for hospitals and clinics. Although the development and deployment of VIP hoods has been accelerated by the coronavirus disease 2019 (COVID-19) pandemic, these devices are currently an immature technology. In this review, we describe the state of the art of VIP hoods and identify aspects in need of further development, both in terms of device design and the protocols associated with their use. The broader concept of individual patient hoods has the potential to be expanded beyond ventilation to the provision of clean conditions for individual patients and personalized control over other environmental factors such as temperature and humidity.
Keywords: COVID-19 Vented individual patient hood Airborne transmission Healthcare worker Infectious disease
一种易用的实体识别消歧系统评测框架 Article
辉 陈,宝刚 魏,一鸣 李,Yong-huai LIU,文浩 朱
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 2, Pages 195-205 doi: 10.1631/FITEE.1500473
Keywords: 实体识别消歧;评测框架;信息抽取
A partition approach for robust gait recognition based on gait template fusion Research Articles
Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu,heukejun@126.com,liuliangliang@hrbeu.edu.cn,dingxinnan@hrbeu.edu.cn,yukaiqiang@hrbeu.edu.cn,hugang@hrbeu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.2000377
Surface Ship Target Recognition Research Based on SGA
Jiang Dingding,Xu Zhaolin,Li Kairui
Strategic Study of CAE 2004, Volume 6, Issue 8, Pages 79-81
Surface ship recognition is an important contents of navy's aviation probe. This text discussed the principle, characteristics and calculating step of SGA, and applied this calculating way to surface ship recognition. The experiment results proved the scientificalness and the practical applicability of that methoded.
Keywords: SGA target recognition surface ship
Application of RFID in the Visual Logistics System
Wang Aiming,Mu Xiaoxi,Li Aihua
Strategic Study of CAE 2006, Volume 8, Issue 8, Pages 65-68
The radio frequency identification (RFID) is a kind of new automatic identification technology. It has many characteristics such as high reliability, privacy , non-contact, convenient and swift. Applying RFID to visual logistics system, can gain actual requirement of guaranteed object and information about the type, amount and way of materials to supply and ensure the supply in the whole time, orientation and course. The paper introduces the RFID system and its principle, and brings about an application of RFID in visual logistics system, which is realized by the radio frequency labels stuck to the containers and equipments.
Keywords: visual logistics radio frequency identification visual system for the carrying materials
Pattern Recognition With Fuzzy Central Clustering Algorithms
Zen Huanglin,Yuan Hui,Liu Xiaofang
Strategic Study of CAE 2004, Volume 6, Issue 11, Pages 33-37
Based on optimization of constrained nonlinear programming, an approach of clustering center and a fuzzy membership function of pattern classification are derived from an objective function of the constrained nonlinear programming. An unsupervised algorithm with recursive expression and a fuzzy central cluster neural network are suggested in this paper. The fuzzy central cluster neural network proposed here can realize crisp decision or fuzzy decision in pattern classification.
Keywords: fuzzy sets central cluster pattern recognition neural network
Fault Pattern Recognition of Rolling Bearing Based on Radial Basis Function Neural Networks
Lu Shuang,Zhang Zida,Li Meng
Strategic Study of CAE 2004, Volume 6, Issue 2, Pages 56-60
Radial basis function neural network is a type of three — layer feedforward network. It has many good properties, such as powerful ability for function approximation, classification and learning rapidly. In this paper, in the light of the merit of radial basis function neural network and on the basis of the feature analysis of vibration signal of rolling bearing, AR model is presented by using time series method. Radial basis function neural networks is established based on AR model parameters. In the light of the theory of radial basis function neural networks, fault pattern of rolling bearing is recognized correspondingly. Theory and experiment show that the recognition of fault pattern of rolling bearing based on radial basis function neural networks theory is available and its precision is high.
Keywords: rolling bearing vibration signal AR model RBF neural networks pattern recognition
Binary neural networks for speech recognition Regular Papers
Yan-min QIAN, Xu XIANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 5, Pages 701-715 doi: 10.1631/FITEE.1800469
Recently, deep neural networks (DNNs) significantly outperform Gaussian mixture models in acoustic modeling for speech recognition. However, the substantial increase in computational load during the inference stage makes deep models difficult to directly deploy on low-power embedded devices. To alleviate this issue, structure sparseness and low precision fixed-point quantization have been applied widely. In this work, binary neural networks for speech recognition are developed to reduce the computational cost during the inference stage. A fast implementation of binary matrix multiplication is introduced. On modern central processing unit (CPU) and graphics processing unit (GPU) architectures, a 5–7 times speedup compared with full precision floatingpoint matrix multiplication can be achieved in real applications. Several kinds of binary neural networks and related model optimization algorithms are developed for large vocabulary continuous speech recognition acoustic modeling. In addition, to improve the accuracy of binary models, knowledge distillation from the normal full precision floating-point model to the compressed binary model is explored. Experiments on the standard Switchboard speech recognition task show that the proposed binary neural networks can deliver 3–4 times speedup over the normal full precision deep models. With the knowledge distillation from the normal floating-point models, the binary DNNs or binary convolutional neural networks (CNNs) can restrict the word error rate (WER) degradation to within 15.0%, compared to the normal full precision floating-point DNNs or CNNs, respectively. Particularly for the binary CNN with binarization only on the convolutional layers, the WER degradation is very small and is almost negligible with the proposed approach.
Keywords: Speech recognition Binary neural networks Binary matrix multiplication Knowledge distillation Population count
Analysis of Disruptive Technology Identification Methods in Foreign Countries
Wang An,Sun Zongtan,Shen Yanbo and Xu Yuan
Strategic Study of CAE 2017, Volume 19, Issue 5, Pages 79-84 doi: 10.15302/J-SSCAE-2017.05.014
Disruptive technologies, which have groundbreaking effects on existing traditional or mainstream technologies, have great potential applications, and are actively recognized and nurtured by all countries. This article summarizes the standard reports on technology identification research released by foreign government agencies, think tanks, intelligence agencies, consulting firms, universities, and patent analysis institutions. It then analyzes and evaluates the disruptive technology identification methods in order to provide reference for the corresponding disruptive technology identification methods in China.
Keywords: disruptive technologies identification methods
Title Author Date Type Operation
ECGID: a human identification method based on adaptive particle swarm optimization and the bidirectional LSTM model
Yefei Zhang, Zhidong Zhao, Yanjun Deng, Xiaohong Zhang, Yu Zhang,zhangyf@hdu.edu.cn,zhaozd@hdu.edu.cn,yanjund@hdu.edu.cn,xhzhang@hdu.edu.cn,zy2009@hdu.edu.cn
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Journal Article
Perspectives of Individual-Worn Sensors Assessing Personal Environmental Exposure
Uwe Schlink, Maximilian Ueberham
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Vented Individual Patient (VIP) Hoods for the Control of Infectious Airborne Diseases in Healthcare Facilities
J. Patel, F. McGain, T. Bhatelia, S. Wang, B. Sun, J. Monty, V. Pareek
Journal Article
A partition approach for robust gait recognition based on gait template fusion
Kejun Wang, Liangliang Liu, Xinnan Ding, Kaiqiang Yu, Gang Hu,heukejun@126.com,liuliangliang@hrbeu.edu.cn,dingxinnan@hrbeu.edu.cn,yukaiqiang@hrbeu.edu.cn,hugang@hrbeu.edu.cn
Journal Article
Surface Ship Target Recognition Research Based on SGA
Jiang Dingding,Xu Zhaolin,Li Kairui
Journal Article
Pattern Recognition With Fuzzy Central Clustering Algorithms
Zen Huanglin,Yuan Hui,Liu Xiaofang
Journal Article
Fault Pattern Recognition of Rolling Bearing Based on Radial Basis Function Neural Networks
Lu Shuang,Zhang Zida,Li Meng
Journal Article