首页 > 最新文献

Journal of Quantum Computing最新文献

英文 中文
A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network 一种基于长短期记忆网络的入侵检测算法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2020.010819
Xinda Hao, Jianming Zhou, Xueqi Shen, Yu Yang
: In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network data messages are used to improve the accuracy of intrusion detection. In the experiment, we use the public data set KDD-Cup 99 for verification. The experimental results show that the model can effectively detect unpredictable malicious behaviors under the current network environment, improve detection accuracy and reduce false positive rate compared with traditional intrusion detection methods.
近年来,机器学习技术被广泛应用于网络攻击的及时检测和分类。然而,由于网络流量的巨大以及恶意攻击的复杂性和可变性,网络入侵检测领域面临着许多挑战。针对云计算网络中海量高维数据对异常检测产生负面影响的问题,本文提出了一种基于注意机制的Bi-LSTM方法,该方法通过将IDS数据传输到多个隐藏层进行学习。利用网络数据消息中的抽象信息和高维特征表示来提高入侵检测的准确性。在实验中,我们使用公共数据集KDD-Cup 99进行验证。实验结果表明,与传统的入侵检测方法相比,该模型能够有效检测出当前网络环境下不可预测的恶意行为,提高了检测精度,降低了误报率。
{"title":"A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network","authors":"Xinda Hao, Jianming Zhou, Xueqi Shen, Yu Yang","doi":"10.32604/jqc.2020.010819","DOIUrl":"https://doi.org/10.32604/jqc.2020.010819","url":null,"abstract":": In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network data messages are used to improve the accuracy of intrusion detection. In the experiment, we use the public data set KDD-Cup 99 for verification. The experimental results show that the model can effectively detect unpredictable malicious behaviors under the current network environment, improve detection accuracy and reduce false positive rate compared with traditional intrusion detection methods.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Method to against Quantum Noises in Quantum Teleportation 量子隐形传态中一种抗量子噪声的新方法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2019.08898
Shengyao Wu, Wenjie Liu, Zhiguo Qu
In order to improve the anti-noise performance of quantum teleportation, this paper proposes a novel dynamic quantum anti-noise scheme based on the quantum teleportation which transmits single qubit state using Bell state. Considering that quantum noise only acts on the transmitted qubit, i.e., the entangled state that Alice and Bob share in advance is affected by the noise, thus affecting the final transmission result. In this paper, a method for dynamically adjusting the shared entangled state according to the noise environment is proposed. By calculating the maximum fidelity of the output state to determine the shared entangled state, which makes the quantum teleportation be affected by the noise as little as possible. This paper calculates the fidelity of teleportation under four kinds of channel noise (amplitude damping, phase damping, bit flip and depolarizing noise). The results show that the scheme has a suppression effect on phase damping, bit flip and depolarizing noise under certain conditions. When the noise intensity is larger, the optimized efficiency is better.
为了提高量子隐形传态的抗噪声性能,提出了一种基于量子隐形传态的动态量子抗噪声方案,该方案利用贝尔态传输单量子比特态。考虑到量子噪声只作用于传输的量子比特,即Alice和Bob事先共享的纠缠态受到噪声的影响,从而影响最终的传输结果。本文提出了一种根据噪声环境动态调整共享纠缠态的方法。通过计算输出态的最大保真度来确定共享纠缠态,使量子隐形传态受噪声的影响尽可能小。本文计算了四种信道噪声(振幅阻尼、相位阻尼、位翻转和去极化噪声)下隐形传态的保真度。结果表明,在一定条件下,该方案对相位阻尼、位翻转和去极化噪声均有抑制作用。噪声强度越大,优化后的效率越好。
{"title":"A Novel Method to against Quantum Noises in Quantum Teleportation","authors":"Shengyao Wu, Wenjie Liu, Zhiguo Qu","doi":"10.32604/jqc.2019.08898","DOIUrl":"https://doi.org/10.32604/jqc.2019.08898","url":null,"abstract":"In order to improve the anti-noise performance of quantum teleportation, this paper proposes a novel dynamic quantum anti-noise scheme based on the quantum teleportation which transmits single qubit state using Bell state. Considering that quantum noise only acts on the transmitted qubit, i.e., the entangled state that Alice and Bob share in advance is affected by the noise, thus affecting the final transmission result. In this paper, a method for dynamically adjusting the shared entangled state according to the noise environment is proposed. By calculating the maximum fidelity of the output state to determine the shared entangled state, which makes the quantum teleportation be affected by the noise as little as possible. This paper calculates the fidelity of teleportation under four kinds of channel noise (amplitude damping, phase damping, bit flip and depolarizing noise). The results show that the scheme has a suppression effect on phase damping, bit flip and depolarizing noise under certain conditions. When the noise intensity is larger, the optimized efficiency is better.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model Average Algorithm for Housing Price Forecast with Evaluation Interpretation 基于评价解释的房价预测模型平均算法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2022.038358
Jintao Fu, Yong Zhou, Qian Qiu, Guangwei Xu, Neng Wan
{"title":"A Model Average Algorithm for Housing Price Forecast with Evaluation Interpretation","authors":"Jintao Fu, Yong Zhou, Qian Qiu, Guangwei Xu, Neng Wan","doi":"10.32604/jqc.2022.038358","DOIUrl":"https://doi.org/10.32604/jqc.2022.038358","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130355169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Position Self-Adaptive Method to Detect Fake Access Points 一种位置自适应检测假接入点的方法
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2020.09433
Ping Lu
: In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method allows the detection device to change position, the move will be perceived and the fingerprint will be updated automatically. Third, we use a variety of features as fingerprints to describe an access point better and improve efficiency. At last, the method we propose is more in line with the actual scene and has been proved effective by experiments.
近年来,随着Wi-Fi技术的成熟和普及,无线热点在公共场所被大规模部署。但与此同时,它也带来了许多不容忽视的安全问题。其中,假接入点攻击是无线局域网中一个非常严重的威胁。本文提出了一种检测无线局域网中假接入点的方法。首先,我们的检测方法是被动的,这意味着在程序运行过程中几乎不会产生额外的流量。其次,与现有的许多方法不同,我们的方法允许检测设备改变位置,移动会被感知,指纹会自动更新。第三,我们利用各种特征作为指纹来更好地描述接入点并提高效率。最后,我们提出的方法更符合实际场景,并通过实验证明了该方法的有效性。
{"title":"A Position Self-Adaptive Method to Detect Fake Access Points","authors":"Ping Lu","doi":"10.32604/jqc.2020.09433","DOIUrl":"https://doi.org/10.32604/jqc.2020.09433","url":null,"abstract":": In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method allows the detection device to change position, the move will be perceived and the fingerprint will be updated automatically. Third, we use a variety of features as fingerprints to describe an access point better and improve efficiency. At last, the method we propose is more in line with the actual scene and has been proved effective by experiments.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bi-Histogram Shifting Contrast Enhancement for Color Images 彩色图像的双直方图移位对比度增强
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.020734
Lord Amoah, Ampofo Twumasi Kwabena
{"title":"A Bi-Histogram Shifting Contrast Enhancement for Color Images","authors":"Lord Amoah, Ampofo Twumasi Kwabena","doi":"10.32604/jqc.2021.020734","DOIUrl":"https://doi.org/10.32604/jqc.2021.020734","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T Application of MES System in the Safety Management of Offshore Oil and Gas Fields T MES系统在海上油气田安全管理中的应用
Pub Date : 1900-01-01 DOI: 10.32604/JQC.2019.06283
Yongle Chen, Lei Cui, Chong Wang
In order to solve the problem of data island in the safety management of offshore oil and gas fields, take full advantage of data for subsequent analysis and development, and support production safety management of oil and gas fields, the MES, which is maturely applied in manufacturing and downstream production of CNOOC (China National Offshore Oil Corporation), is introduced by the petroleum administration at the eastern South China sea. The system adopts the real-time database and relational database to collect the scattered structured data, such as evidence information of offshore oil and gas production facilities personnel, on-site hidden danger information and incident investigation report. Then a unified secure data center platform is established for every operating area and production site, and the critical safety data of production sites can be centrally managed. This system has the functions of lawful real-time supervision of personnel qualification, online supervision and trend analysis of hidden dangers, and centralized management and sharing of incident investigation report. By applying the MES system in security management, the process of safety service becomes standardized and modularized, the management process becomes normalized, and the efficiency and effect of overall management is improved.
为了解决海上油气田安全管理中的数据孤岛问题,充分利用数据进行后续分析和开发,支持油气田安全生产管理,南海东部石油管理局引进了在中海油制造和下游生产中应用成熟的MES系统。系统采用实时数据库和关系型数据库对海上油气生产设施人员证据信息、现场隐患信息、事故调查报告等分散的结构化数据进行采集。从而为各作业区和生产现场建立统一的安全数据中心平台,对生产现场的关键安全数据进行集中管理。该系统具有人员资质合法实时监管、隐患在线监管与趋势分析、事件调查报告集中管理与共享等功能。将MES系统应用于安全管理,使安全服务流程标准化、模块化,管理流程规范化,提高了整体管理的效率和效果。
{"title":"T Application of MES System in the Safety Management of Offshore Oil and Gas Fields","authors":"Yongle Chen, Lei Cui, Chong Wang","doi":"10.32604/JQC.2019.06283","DOIUrl":"https://doi.org/10.32604/JQC.2019.06283","url":null,"abstract":"In order to solve the problem of data island in the safety management of offshore oil and gas fields, take full advantage of data for subsequent analysis and development, and support production safety management of oil and gas fields, the MES, which is maturely applied in manufacturing and downstream production of CNOOC (China National Offshore Oil Corporation), is introduced by the petroleum administration at the eastern South China sea. The system adopts the real-time database and relational database to collect the scattered structured data, such as evidence information of offshore oil and gas production facilities personnel, on-site hidden danger information and incident investigation report. Then a unified secure data center platform is established for every operating area and production site, and the critical safety data of production sites can be centrally managed. This system has the functions of lawful real-time supervision of personnel qualification, online supervision and trend analysis of hidden dangers, and centralized management and sharing of incident investigation report. By applying the MES system in security management, the process of safety service becomes standardized and modularized, the management process becomes normalized, and the efficiency and effect of overall management is improved.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117110869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection Based on Multidimensional Time Distribution Features 基于多维时间分布特征的恶意软件检测
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2021.017365
Huizhong Sun, Guosheng Xu, Hewei Yu, Minyan Ma, Yanhui Guo, Ruijie Quan
: Language detection models based on system calls suffer from certain false negatives and detection blind spots. Hence, the normal behavior sequences of some malware applications for a short period can become malicious behavior within a certain time window. To detect such behaviors, we extract a multidimensional time distribution feature matrix on the basis of statistical analysis. This matrix mainly includes multidimensional time distribution features, multidimensional word pair correlation features, and multidimensional word frequency distribution features. A multidimensional time distribution model based on neural networks is built to detect the overall abnormal behavior within a given time window. Experimental evaluation is conducted using the ADFA-LD dataset. Accuracy, precision, and recall are used as the measurement indicators of the model. An accuracy rate of 95.26% and a recall rate of 96.11% are achieved.
基于系统调用的语言检测模型存在一定的假阴性和检测盲点。因此,一些恶意软件应用程序在短时间内的正常行为序列可能会在某个时间窗口内变成恶意行为。为了检测这些行为,我们在统计分析的基础上提取了一个多维时间分布特征矩阵。该矩阵主要包括多维时间分布特征、多维词对相关特征和多维词频分布特征。建立了基于神经网络的多维时间分布模型来检测给定时间窗口内的整体异常行为。使用ADFA-LD数据集进行实验评估。准确度、精密度和召回率作为模型的度量指标。准确率为95.26%,召回率为96.11%。
{"title":"Malware Detection Based on Multidimensional Time Distribution Features","authors":"Huizhong Sun, Guosheng Xu, Hewei Yu, Minyan Ma, Yanhui Guo, Ruijie Quan","doi":"10.32604/jqc.2021.017365","DOIUrl":"https://doi.org/10.32604/jqc.2021.017365","url":null,"abstract":": Language detection models based on system calls suffer from certain false negatives and detection blind spots. Hence, the normal behavior sequences of some malware applications for a short period can become malicious behavior within a certain time window. To detect such behaviors, we extract a multidimensional time distribution feature matrix on the basis of statistical analysis. This matrix mainly includes multidimensional time distribution features, multidimensional word pair correlation features, and multidimensional word frequency distribution features. A multidimensional time distribution model based on neural networks is built to detect the overall abnormal behavior within a given time window. Experimental evaluation is conducted using the ADFA-LD dataset. Accuracy, precision, and recall are used as the measurement indicators of the model. An accuracy rate of 95.26% and a recall rate of 96.11% are achieved.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protein Secondary Structure Prediction with Dynamic Self-Adaptation Combination Strategy Based on Entropy 基于熵的动态自适应组合策略的蛋白质二级结构预测
Pub Date : 1900-01-01 DOI: 10.32604/JQC.2019.06063
Yuehan Du, Ruoyu Zhang, Xu Zhang, Antai Ouyang, Xiaodong Zhang, Jinyong Cheng, Lu Wenpeng
The algorithm based on combination learning usually is superior to a single classification algorithm on the task of protein secondary structure prediction. However, the assignment of the weight of the base classifier usually lacks decision-making evidence. In this paper, we propose a protein secondary structure prediction method with dynamic self-adaptation combination strategy based on entropy, where the weights are assigned according to the entropy of posterior probabilities outputted by base classifiers. The higher entropy value means a lower weight for the base classifier. The final structure prediction is decided by the weighted combination of posterior probabilities. Extensive experiments on CB513 dataset demonstrates that the proposed method outperforms the existing methods, which can effectively improve the prediction performance.
在蛋白质二级结构预测任务上,基于组合学习的算法通常优于单一的分类算法。然而,基分类器权值的分配通常缺乏决策依据。本文提出了一种基于熵的动态自适应组合策略的蛋白质二级结构预测方法,该方法根据基分类器输出的后验概率熵来分配权重。熵值越高,基分类器的权重越低。最后的结构预测由后验概率的加权组合决定。在CB513数据集上的大量实验表明,该方法优于现有方法,可以有效地提高预测性能。
{"title":"Protein Secondary Structure Prediction with Dynamic Self-Adaptation Combination Strategy Based on Entropy","authors":"Yuehan Du, Ruoyu Zhang, Xu Zhang, Antai Ouyang, Xiaodong Zhang, Jinyong Cheng, Lu Wenpeng","doi":"10.32604/JQC.2019.06063","DOIUrl":"https://doi.org/10.32604/JQC.2019.06063","url":null,"abstract":"The algorithm based on combination learning usually is superior to a single classification algorithm on the task of protein secondary structure prediction. However, the assignment of the weight of the base classifier usually lacks decision-making evidence. In this paper, we propose a protein secondary structure prediction method with dynamic self-adaptation combination strategy based on entropy, where the weights are assigned according to the entropy of posterior probabilities outputted by base classifiers. The higher entropy value means a lower weight for the base classifier. The final structure prediction is decided by the weighted combination of posterior probabilities. Extensive experiments on CB513 dataset demonstrates that the proposed method outperforms the existing methods, which can effectively improve the prediction performance.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Geographically Weighted Regression Model 层次地理加权回归模型
Pub Date : 1900-01-01 DOI: 10.32604/JQC.2019.05954
Fengchang Xue
In spatial analysis, two problems of the scale effect and the spatial dependence have been plagued scholars, the first law of geography presented to solve the spatial dependence has played a good role in the guidelines, forming the Geographical Weighted Regression (GWR). Based on classic statistical techniques, GWR model has ascertain significance in solving spatial dependence and spatial non-uniform problems, but it has no impact on the integration of the scale effect. It does not consider the interaction between the various factors of the sampling scale observations and the numerous factors of possible scale effects, so there is a loss of information. Crossing a two-stage analysis of “return of regression” to establish the model of Hierarchical Geographically Weighted Regression (HGWR), the first layer of regression analysis reflects the spatial dependence of space samples and the second layer of the regression reflects the spatial relationships scaling. The combination of both solves the spatial scale effect analysis, spatial dependence and spatial heterogeneity of the combined effects.
在空间分析中,尺度效应和空间依赖性两个问题一直困扰着学者们,为解决空间依赖性而提出的地理第一定律起到了很好的指导作用,形成了地理加权回归(GWR)。基于经典统计技术的GWR模型在解决空间依赖性和空间非均匀性问题上具有一定的意义,但对尺度效应的整合没有影响。它没有考虑抽样尺度观测的各种因素和可能的尺度效应的众多因素之间的相互作用,因此存在信息损失。通过“回归”的两阶段分析,建立层次地理加权回归(HGWR)模型,第一层回归分析反映空间样本的空间依赖性,第二层回归分析反映空间关系尺度。两者的结合解决了组合效应的空间尺度效应分析、空间依赖性和空间异质性问题。
{"title":"Hierarchical Geographically Weighted Regression Model","authors":"Fengchang Xue","doi":"10.32604/JQC.2019.05954","DOIUrl":"https://doi.org/10.32604/JQC.2019.05954","url":null,"abstract":"In spatial analysis, two problems of the scale effect and the spatial dependence have been plagued scholars, the first law of geography presented to solve the spatial dependence has played a good role in the guidelines, forming the Geographical Weighted Regression (GWR). Based on classic statistical techniques, GWR model has ascertain significance in solving spatial dependence and spatial non-uniform problems, but it has no impact on the integration of the scale effect. It does not consider the interaction between the various factors of the sampling scale observations and the numerous factors of possible scale effects, so there is a loss of information. Crossing a two-stage analysis of “return of regression” to establish the model of Hierarchical Geographically Weighted Regression (HGWR), the first layer of regression analysis reflects the spatial dependence of space samples and the second layer of the regression reflects the spatial relationships scaling. The combination of both solves the spatial scale effect analysis, spatial dependence and spatial heterogeneity of the combined effects.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123108460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK 密文链:基于mPECK的安全高效密文区块链
Pub Date : 1900-01-01 DOI: 10.32604/jqc.2020.09291
Chen Hailin, Gang Xu, Yuling Chen, Chen Xiubo, Yixian Yang, Fan Ruibin, Zhang Kaixiang, Huizhong Li
: Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search (mPECK), and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger. By introducing execution-consensus-update paradigm of transaction flow, Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext, but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work. In addition, Cipherchain is a promising scheme to realize the technology combination of “blockchain+cloud computing” and “permissioned blockchain+public blockchain”.
:现有的区块链方案大多基于“公开透明”的设计理念来实现数据安全,通常要求交易数据以明文的形式呈现。然而,它不可避免地带来了数据隐私和运营性能方面的问题。本文提出了一种新的区块链方案“密码链”,该方案能够以密文的形式处理和维护交易数据,同时保证交易数据的不变性和可审计性。具体来说,在我们的方案中,交易可以基于一种可搜索的加密方案进行本地加密,这种加密方案称为多用户公钥加密与联合关键字搜索(mPECK),并且在附加到全局一致的分布式账本后,可以由多个特定参与者访问。通过引入交易流的执行-共识-更新范式,密码链不仅使交易数据以密文的形式存在成为可能,而且保证了系统的整体性能不会受到加密操作和其他本地执行工作的很大影响。此外,密码链是实现“区块链+云计算”和“许可区块链+公有区块链”技术组合的一种很有前途的方案。
{"title":"Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK","authors":"Chen Hailin, Gang Xu, Yuling Chen, Chen Xiubo, Yixian Yang, Fan Ruibin, Zhang Kaixiang, Huizhong Li","doi":"10.32604/jqc.2020.09291","DOIUrl":"https://doi.org/10.32604/jqc.2020.09291","url":null,"abstract":": Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search (mPECK), and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger. By introducing execution-consensus-update paradigm of transaction flow, Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext, but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work. In addition, Cipherchain is a promising scheme to realize the technology combination of “blockchain+cloud computing” and “permissioned blockchain+public blockchain”.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Quantum Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1