期刊文献+
共找到4,370篇文章
< 1 2 219 >
每页显示 20 50 100
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
1
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
在线阅读 下载PDF
Fog Computing Architecture-Based Data Acquisition for WSN Applications 被引量:2
2
作者 Guangwei Zhang Ruifan Li 《China Communications》 SCIE CSCD 2017年第11期69-81,共13页
Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and erro... Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and error, missing values or inconsistent data. Motivated by fog computing, which focuses on how to effectively offload computation-intensive tasks from resource-constrained devices, this paper proposes a simple but yet effective data acquisition approach with the ability of filtering abnormal data and meeting the real-time requirement. Our method uses a cooperation mechanism by leveraging on both an architectural and algorithmic approach. Firstly, the sensor node with the limited computing resource only accomplishes detecting and marking the suspicious data using a light weight algorithm. Secondly, the cluster head evaluates suspicious data by referring to the data from the other sensor nodes in the same cluster and discard the abnormal data directly. Thirdly, the sink node fills up the discarded data with an approximate value using nearest neighbor data supplement method. Through the architecture, each node only consumes a few computational resources and distributes the heavily computing load to several nodes. Simulation results show that our data acquisition method is effective considering the real-time outlier filtering and the computing overhead. 展开更多
关键词 WSN fog computing abnormal data data filtering intrusion tolerance
在线阅读 下载PDF
M^(2)CS:A microwave measurement and control system for large-scale superconducting quantum processors
3
作者 Jiawei Zhang Xuandong Sun +17 位作者 Zechen Guo Yuefeng Yuan Yubin Zhang Ji Chu Wenhui Huang Yongqi Liang Jiawei Qiu Daxiong Sun Ziyu Tao Jiajian Zhang Weijie Guo Ji Jiang Xiayu Linpeng Yang Liu Wenhui Ren Jingjing Niu Youpeng Zhong Dapeng Yu 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第12期67-78,共12页
As superconducting quantum computing continues to advance at an unprecedented pace,there is a compelling demand for the innovation of specialized electronic instruments that act as crucial conduits between quantum pro... As superconducting quantum computing continues to advance at an unprecedented pace,there is a compelling demand for the innovation of specialized electronic instruments that act as crucial conduits between quantum processors and host computers.Here,we introduce a microwave measurement and control system(M^(2)CS)dedicated to large-scale superconducting quantum processors.M^(2)CS features a compact modular design that balances overall performance,scalability and flexibility.Electronic tests of M^(2)CS show key metrics comparable to commercial instruments.Benchmark tests on transmon superconducting qubits further show qubit coherence and gate fidelities comparable to state-of-the-art results,confirming M^(2)CS's capability to meet the stringent requirements of quantum experiments running on intermediate-scale quantum processors.The compact and scalable nature of our design holds the potential to support over 1000 qubits after upgrade in stability and integration.The M^(2)CS architecture may also be adopted to a wider range of scenarios,including other quantum computing platforms such as trapped ions and silicon quantum dots,as well as more traditional applications like microwave kinetic inductance detectors and phased array radar systems. 展开更多
关键词 superconducting quantum computation superconducting qubit arbitrary waveform generator(AWG) data acquisition board(DAQ)
在线阅读 下载PDF
Improving Performance of Cloud Computing and Big Data Technologies and Applications 被引量:1
4
作者 Zhenjiang Dong 《ZTE Communications》 2014年第4期1-2,共2页
Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved c... Cloud computing technology is changing the development and usage patterns of IT infrastructure and applications. Virtualized and distributed systems as well as unified management and scheduling has greatly im proved computing and storage. Management has become easier, andOAM costs have been significantly reduced. Cloud desktop technology is develop ing rapidly. With this technology, users can flexibly and dynamically use virtual ma chine resources, companies' efficiency of using and allocating resources is greatly improved, and information security is ensured. In most existing virtual cloud desk top solutions, computing and storage are bound together, and data is stored as im age files. This limits the flexibility and expandability of systems and is insufficient for meetinz customers' requirements in different scenarios. 展开更多
关键词 Improving Performance of Cloud computing and Big data Technologies and Applications HBASE
在线阅读 下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
5
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
在线阅读 下载PDF
Modeling and application of marketing and distribution data based on graph computing
6
作者 Kai Xiao Daoxing Li +1 位作者 Xiaohui Wang Pengtian Guo 《Global Energy Interconnection》 EI CAS CSCD 2022年第4期448-460,共13页
Integrating marketing and distribution businesses is crucial for improving the coordination of equipment and the efficient management of multi-energy systems.New energy sources are continuously being connected to dist... Integrating marketing and distribution businesses is crucial for improving the coordination of equipment and the efficient management of multi-energy systems.New energy sources are continuously being connected to distribution grids;this,however,increases the complexity of the information structure of marketing and distribution businesses.The existing unified data model and the coordinated application of marketing and distribution suffer from various drawbacks.As a solution,this paper presents a data model of"one graph of marketing and distribution"and a framework for graph computing,by analyzing the current trends of business and data in the marketing and distribution fields and using graph data theory.Specifically,this work aims to determine the correlation between distribution transformers and marketing users,which is crucial for elucidating the connection between marketing and distribution.In this manner,a novel identification algorithm is proposed based on the collected data for marketing and distribution.Lastly,a forecasting application is developed based on the proposed algorithm to realize the coordinated prediction and consumption of distributed photovoltaic power generation and distribution loads.Furthermore,an operation and maintenance(O&M)knowledge graph reasoning application is developed to improve the intelligent O&M ability of marketing and distribution equipment. 展开更多
关键词 Marketing and distribution connection Graph data Graph computing Knowledge graph data model
在线阅读 下载PDF
Distributed Computation Models for Data Fusion System Simulation
7
作者 张岩 曾涛 +1 位作者 龙腾 崔智社 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期291-297,共7页
An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advan... An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advanced C3I systems. Two architectures are provided and verified: one is based on pure TCP/IP protocol and C/S model, and implemented with Winsock, the other is based on CORBA (common object request broker architecture). The performance of data fusion simulation system, i.e. reliability, flexibility and scalability, is improved and enhanced by two models. The study of them makes valuable explore on incorporating the distributed computation concepts into radar system simulation techniques. 展开更多
关键词 radar system computer network data fusion SIMULATION distributed computation
在线阅读 下载PDF
Enhancing Reliability via Checkpointing in Cloud Computing Systems 被引量:4
8
作者 Ao Zhou Qibo Sun Jinglin Li 《China Communications》 SCIE CSCD 2017年第7期108-117,共10页
Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial.... Cloud computing is becoming an important solution for providing scalable computing resources via Internet. Because there are tens of thousands of nodes in data center, the probability of server failures is nontrivial. Therefore, it is a critical challenge to guarantee the service reliability. Fault-tolerance strategies, such as checkpoint, are commonly employed. Because of the failure of the edge switches, the checkpoint image may become inaccessible. Therefore, current checkpoint-based fault tolerance method cannot achieve the best effect. In this paper, we propose an optimal checkpoint method with edge switch failure-aware. The edge switch failure-aware checkpoint method includes two algorithms. The first algorithm employs the data center topology and communication characteristic for checkpoint image storage server selection. The second algorithm employs the checkpoint image storage characteristic as well as the data center topology to select the recovery server. Simulation experiments are performed to demonstrate the effectiveness of the proposed method. 展开更多
关键词 cloud computing cloud service RELIABILITY fault tolerance data center network
在线阅读 下载PDF
Finding Main Causes of Elevator Accidents via Multi-Dimensional Association Rule in Edge Computing Environment 被引量:2
9
作者 Hongman Wang Mengqi Zeng +1 位作者 Zijie Xiong Fangchun Yang 《China Communications》 SCIE CSCD 2017年第11期39-47,共9页
In order to discover the main causes of elevator group accidents in edge computing environment, a multi-dimensional data model of elevator accident data is established by using data cube technology, proposing and impl... In order to discover the main causes of elevator group accidents in edge computing environment, a multi-dimensional data model of elevator accident data is established by using data cube technology, proposing and implementing a method by combining classical Apriori algorithm with the model, digging out frequent items of elevator accident data to explore the main reasons for the occurrence of elevator accidents. In addition, a collaborative edge model of elevator accidents is set to achieve data sharing, making it possible to check the detail of each cause to confirm the causes of elevator accidents. Lastly the association rules are applied to find the law of elevator Accidents. 展开更多
关键词 elevator group accidents APRIORI multi-dimensional association rules data cube edge computing
在线阅读 下载PDF
An Efficient and Secure Aggregation Encryption Scheme in Edge Computing 被引量:2
10
作者 Junhua Wu Xiaofei Sheng +2 位作者 Guangshun Li Kan Yu Junke Liu 《China Communications》 SCIE CSCD 2022年第3期245-257,共13页
Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing r... Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing requirements of cloud computing,but also collect and analyze distributed data.However,it inherits many security and privacy challenges of cloud computing,such as:authentication and access control.To address these problem,we proposed a new efficient privacy-preserving aggregation scheme for edge computing.Our scheme consists of two steps.First,we divided the data of the end users with the Simulated Annealing Module Partition(SAMP)algorithm.And then,the end sensors and edge nodes performed respectively differential aggregation mechanism with the Differential Aggregation Encryption(DAE)algorithm which can make noise interference and encryption algorithm with trusted authority(TA).Experiment results show that the DAE can preserve user privacy,and has significantly less computation and communication overhead than existing approaches. 展开更多
关键词 Edge computing data aggregation ENCRYPTION Simulated annealing
在线阅读 下载PDF
Transport Layer Optimization for Cloud Computing Applications via Satellite: TCP Noordwijk+ 被引量:1
11
作者 M. Luglio C. Roseti F. Zampognaro 《China Communications》 SCIE CSCD 2014年第12期105-119,共15页
Cloud computing can significantly improve efficiency in Internet utilization and data management.Several cloud applications(file sharing,backup,data up/download etc.) imply transfers of large amount of data without re... Cloud computing can significantly improve efficiency in Internet utilization and data management.Several cloud applications(file sharing,backup,data up/download etc.) imply transfers of large amount of data without real-time requirements.In several use-cases cloud-computing solutions reduce operational costs and guarantee target QoS.These solutions become critical when satellite systems are utilized,since resources are limited,network latency is huge and bandwidth costs are high.Using satellite capacity for cloud-computing bulk traffic,keeping acceptable performance of interactive applications,is very important and can limit the connectivity costs.This goal can be achieved installing in the Set Top Box(STB) a proxy agent,to differentiate traffic and assign bandwidth according to priority,leaving spare capacity to bulk cloud computing traffic.This aim is typically reached using a specific QoS architecture,adding functional blocks at network or lower layers.We propose to manage such a process at transport layer only.The endpoint proxy implements a new transport protocol called TCP Noordwijk+,introducing a flow control differentiation capability.The proxy includes TPCN+ which efficiently transfers low-priority bulk data and handles interactive data,keeping a high degree of friendliness.The outcomes of Ns-2simulations confirm applicability and good performance of the proposed solution. 展开更多
关键词 TCP-Noordwijk+ cloud computing DVB-RCS satellite QoS Ns-2 bulk data
在线阅读 下载PDF
Reducing Computational and Communication Complexity for Dynamic Provable Data Possession
12
作者 刘妃妃 谷大武 +2 位作者 陆海宁 龙斌 李晓晖 《China Communications》 SCIE CSCD 2011年第6期67-75,共9页
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files... Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation. 展开更多
关键词 cloud computing proofs of storage dynamic provable data possession file sharing
在线阅读 下载PDF
Review of the Low-Latency Optical Interconnect Technologies for Peta-Scale Computing
13
作者 S. J. B. Yoo Yin Yawei 《China Communications》 SCIE CSCD 2012年第8期16-28,共13页
This paper reviews the recently developed optical interconnect technologies designed for scalable, low latency and high-throughput comunications within datacenters or high perforrmnce computers. The three typical arch... This paper reviews the recently developed optical interconnect technologies designed for scalable, low latency and high-throughput comunications within datacenters or high perforrmnce computers. The three typical architectures including the broadcast-and-select based Optical Shared Memory Supercomputer Interconnect System (OSMOSIS) switch, the defection routing based Data Vortex switch and the arrayed waveguide grating based Low-latency Interconnect Optical Network Switch (LIONS) switch are discussed in detail. In particular, we investigate the various Ioopback buffering technologies in LIONS and present a proof of principle testbed demonstration showing feasibility of LIONS architecture. Moreover, the performance of LIONS, Data Vortex and OSMOSIS with traditional state-of-the-art electrical switching network based on the Flattened-ButterFly (FBF) architecture in terms of throughput and latency are compared. The sinmlation based perfortmnce study shows that the latency of LIONS is almost independent of the number of input ports and does not saturate even at very high input load. 展开更多
关键词 optical interconnects switches WDM data centers high perforrmnce computing
在线阅读 下载PDF
Impact of Coronavirus Pandemic Crisis on Technologies and Cloud Computing Applications
14
作者 Ziyad R.Alashhab Mohammed Anbar +3 位作者 Manmeet Mahinderjit Singh Yu-Beng Leau Zaher Ali Al-Sai Sami Abu Alhayja’a 《Journal of Electronic Science and Technology》 CAS CSCD 2021年第1期25-40,共16页
In light of the coronavirus disease 2019(COVID-19)outbreak caused by the novel coronavirus,companies and institutions have instructed their employees to work from home as a precautionary measure to reduce the risk of ... In light of the coronavirus disease 2019(COVID-19)outbreak caused by the novel coronavirus,companies and institutions have instructed their employees to work from home as a precautionary measure to reduce the risk of contagion.Employees,however,have been exposed to different security risks because of working from home.Moreover,the rapid global spread of COVID-19 has increased the volume of data generated from various sources.Working from home depends mainly on cloud computing(CC)applications that help employees to efficiently accomplish their tasks.The cloud computing environment(CCE)is an unsung hero in the COVID-19 pandemic crisis.It consists of the fast-paced practices for services that reflect the trend of rapidly deployable applications for maintaining data.Despite the increase in the use of CC applications,there is an ongoing research challenge in the domains of CCE concerning data,guaranteeing security,and the availability of CC applications.This paper,to the best of our knowledge,is the first paper that thoroughly explains the impact of the COVID-19 pandemic on CCE.Additionally,this paper also highlights the security risks of working from home during the COVID-19 pandemic. 展开更多
关键词 Big data privacy cloud computing(CC)applications COVID-19 digital transformation security challenge work from home
在线阅读 下载PDF
Computer Aided Design Technology for Convex Faceted Gem Cuts Based on the Half-Edge Data Structure 被引量:1
15
作者 Linhong Xu Xiangnan Li +3 位作者 Jianhua Rao Yuan Han Zhipeng Li Jichun Li 《Journal of Beijing Institute of Technology》 EI CAS 2019年第3期585-597,共13页
Aiming to increase the efficiency of gem design and manufacturing, a new method in computer-aided-design (CAD) of convex faceted gem cuts (CFGC) based on Half-edge data structure (HDS), including the algorithms for th... Aiming to increase the efficiency of gem design and manufacturing, a new method in computer-aided-design (CAD) of convex faceted gem cuts (CFGC) based on Half-edge data structure (HDS), including the algorithms for the implementation is presented in this work. By using object-oriented methods, geometrical elements of CFGC are classified and responding geometrical feature classes are established. Each class is implemented and embedded based on the gem process. Matrix arithmetic and analytical geometry are used to derive the affine transformation and the cutting algorithm. Based on the demand for a diversity of gem cuts, CAD functions both for free-style faceted cuts and parametric designs of typical cuts and visualization and human-computer interactions of the CAD system including two-dimensional and three-dimensional interactions have been realized which enhances the flexibility and universality of the CAD system. Furthermore, data in this CAD system can also be used directly by the gem CAM module, which will promote the gem CAD/CAM integration. 展开更多
关键词 Half-edge data structure CONVEX faceted GEM CUTS (CFGC) computER aided design (CAD)
在线阅读 下载PDF
基于机器人–机床制造单元的开放式边缘平台数控系统开发 被引量:1
16
作者 韩振宇 郭震宇 +2 位作者 严一钊 宋剑鑫 金鸿宇 《航空制造技术》 北大核心 2025年第4期22-35,共14页
制造业逐步向智能化和柔性化的方向发展。机器人与机床协同工作可以使整个生产过程更加高效灵活,但传统的控制系统及云计算服务无法满足其数据交互的需求。本文面向机器人–机床制造单元,提出了一种开放式边缘平台的服务架构。提出了以... 制造业逐步向智能化和柔性化的方向发展。机器人与机床协同工作可以使整个生产过程更加高效灵活,但传统的控制系统及云计算服务无法满足其数据交互的需求。本文面向机器人–机床制造单元,提出了一种开放式边缘平台的服务架构。提出了以实时Linux为基础,以ROS和LinuxCNC开源平台为核心,采用EtherCAT主站通信的机器人–机床协同控制系统方案。在控制器与服务器中部署Fast DDS,实现了不同数据的网络接入,并利用容器技术构建边缘微服务环境,实现了数据的高效交互和传输。最后,搭建了试验平台,完成了系统性能测试。试验验证了所提出方案的可行性。 展开更多
关键词 边缘计算 开放式数控系统 边缘数据传输 FastDDS 工业机器人
在线阅读 下载PDF
全球视角下教育者人工智能素养框架:内容架构、实践示例和应用策略
17
作者 兰国帅 肖琪 +3 位作者 宋帆 杜水莲 丁琳琳 蔡帆帆 《开放教育研究》 北大核心 2025年第2期55-66,共12页
提升教育者的人工智能素养已成为主动适应国家数字教育强国建设的重要议题。然而,我国对人工智能素养的研究仍处于探索阶段,且主要关注学生或区域框架。教育者人工智能素养的研究在理论层面存在框架缺失、评价指标缺乏等问题,实践层面... 提升教育者的人工智能素养已成为主动适应国家数字教育强国建设的重要议题。然而,我国对人工智能素养的研究仍处于探索阶段,且主要关注学生或区域框架。教育者人工智能素养的研究在理论层面存在框架缺失、评价指标缺乏等问题,实践层面面临监管政策缺位、应用指南短缺、评估工具匮乏等挑战。美国数字承诺组织制定的《人工智能素养:理解、评估和使用新兴技术框架》可为我国构建本土化教育者人工智能素养框架、提升教育者人工智能素养提供参考。该框架定义了人工智能素养的内涵,涵盖人工智能素养六类教育实践、两条核心原则、三种参与模式和三种使用类型,并提供了高中人工智能素养框架应用的实践示例和中小学提升人工智能素养学习体验的五种应用策略。我国应深化人工智能素养教育实践,构建系统普适的教育者人工智能素养框架;完善人工智能应用评估体系,围绕人工智能核心原则推动新兴技术发展;建立动态的人工智能监管机制,促进数智化时代新质人才教育转型;提升教育主体的人工智能素养,共筑实践导向的人工智能教学新生态;树立育人导向智能教学理念,融合教育大模型助推教育强国建设。 展开更多
关键词 人工智能素养 人工智能素养框架 计算思维 数据素养 数字素养 数字公民
在线阅读 下载PDF
智能计算技术的历史性突破与巨大挑战
18
作者 李国杰 《集成技术》 2025年第1期1-8,共8页
主流的人工智能技术从一个侧面可以看成是“智能计算技术”。该文针对智能计算技术取得的历史性突破、发展趋势和面临的挑战发表一些看法;对规模定律(scaling law)是否遇到天花板、解决算力短缺问题的出路在哪里、大模型的本质是什么等... 主流的人工智能技术从一个侧面可以看成是“智能计算技术”。该文针对智能计算技术取得的历史性突破、发展趋势和面临的挑战发表一些看法;对规模定律(scaling law)是否遇到天花板、解决算力短缺问题的出路在哪里、大模型的本质是什么等普遍关心的问题作简要的综述。 展开更多
关键词 智能计算 人工智能 大模型 规模定律 算力 好数据 可解释性
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法
19
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
基于多源信息构建药品不良反应基准数据库
20
作者 聂晓璐 孙凤 +2 位作者 阎爱侠 彭晓霞 詹思延 《中国药物警戒》 2025年第1期10-15,36,共7页
目的总结现有主要药品不良反应(ADR)基准数据库构建信息来源,并以药源性血小板减少(DITP)为例综合多源数据构建ADR基准数据库,以期为今后开展计算模拟研究和指导临床安全用药提供参考。方法比较介绍现有各主要ADR基准数据库的信息来源... 目的总结现有主要药品不良反应(ADR)基准数据库构建信息来源,并以药源性血小板减少(DITP)为例综合多源数据构建ADR基准数据库,以期为今后开展计算模拟研究和指导临床安全用药提供参考。方法比较介绍现有各主要ADR基准数据库的信息来源优势与局限性;利用多源信息汇总构建DITP基准数据库,使用Kappa值评价各来源数据信息的一致性;利用药品解剖学、治疗学及化学分类法(ATC)编码分析DITP风险药物在解剖学分类中的分布情况与差异。结果利用美国食品药品监督管理局(FDA)推荐的多源信息来源方法构建了包含1765种药物的DITP基准数据库(DITPst)。在DITPst数据库中,按照ATC编码解剖学分类划分,最常发生DITP的药物为抗肿瘤及免疫调节类药物,77.17%(196/254)可引起DITP。结论利用多源信息构建ADR基准数据库可为药物研发开展计算模拟研究及药品上市后安全与合理用药提供数据参考。 展开更多
关键词 药品不良反应 药源性血小板减少 基准数据库 多源信息 计算模拟研究 抗肿瘤药物 免疫调节类药物 安全合理用药
在线阅读 下载PDF
上一页 1 2 219 下一页 到第
使用帮助 返回顶部