GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hindawi Limited  (4)
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2011
    In:  Laser and Particle Beams Vol. 29, No. 2 ( 2011-06), p. 265-268
    In: Laser and Particle Beams, Hindawi Limited, Vol. 29, No. 2 ( 2011-06), p. 265-268
    Abstract: X-ray emission from Xe 30+ ions at 350–600 keV impacting on an Au target was investigated at the Heavy Ion Research Facility at Lanzhou. Characteristic X-rays of Xe ions at energy of about 1.65 keV were observed. This X-ray emission is induced by the decay of very high Rydberg states of Xe ions. It was also found that the yield of such characteristic X-rays is decreasing with increasing the projectile kinetic energy. Simultaneously, the yield of the characteristic Au X-rays from the M shell increases also. These phenomena are qualitatively analyzed with the classical Coulomb over the Barrier Mode (COBM) for highly charged ions interacting with solid state surfaces.
    Type of Medium: Online Resource
    ISSN: 0263-0346 , 1469-803X
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2011
    detail.hit.zdb_id: 2021816-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-2-26), p. 1-10
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-2-26), p. 1-10
    Abstract: Data integrity verification mechanisms play an important role in cloud environments. Recently, a lightweight identity-based cloud storage audit scheme has been proposed; this paper points out security vulnerabilities of their OffTagGen algorithm. That is, the attackers such as malicious cloud servers can forge the tags, which can destroy data integrity. By improving the construction of OffTagGen algorithm, an improved security cloud auditing protocol is proposed in this work to better protect user’s privacy. The analysis shows that the new protocol is effective and resistant to attacks.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-4-28), p. 1-11
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-4-28), p. 1-11
    Abstract: Benefiting from the development of smart urban computing, the mobile crowd sensing (MCS) network has emerged as momentous communication technology to sense and collect data. The users upload data for specific sensing tasks, and the server completes the aggregation analysis and submits to the sensing platform. However, users’ privacy may be disclosed, and aggregate results may be unreliable. Those are challenges in the trust computation and privacy protection, especially for sensitive data aggregation with spatial information. To address these problems, a verifiable location-encrypted spatial aggregation computing (LeSAC) scheme is proposed for MCS privacy protection. In order to solve the spatial domain distributed user ciphertext computing, firstly, we propose an enhanced-distance-based interpolation calculation scheme, which participates in delegate evaluator based on Paillier homomorphic encryption. Then, we use aggregation signature of the sensing data to ensure the integrity and security of the data. In addition, security analysis indicates that the LeSAC can achieve the IND-CPA indistinguishability semantic security. The efficiency analysis and simulation results demonstrate the communication and computation overhead of the LeSAC. Meanwhile, we use the real environment sensing data sets to verify availability of proposed scheme, and the loss of accuracy (global RMSE) is only less than 5%, which can meet the application requirements.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Mathematical Problems in Engineering Vol. 2018 ( 2018-12-30), p. 1-13
    In: Mathematical Problems in Engineering, Hindawi Limited, Vol. 2018 ( 2018-12-30), p. 1-13
    Abstract: Human activity recognition (HAR) has become a popular topic in research because of its wide application. With the development of deep learning, new ideas have appeared to address HAR problems. Here, a deep network architecture using residual bidirectional long short-term memory (LSTM) is proposed. The advantages of the new network include that a bidirectional connection can concatenate the positive time direction (forward state) and the negative time direction (backward state). Second, residual connections between stacked cells act as shortcut for gradients, effectively avoiding the gradient vanishing problem. Generally, the proposed network shows improvements on both the temporal (using bidirectional cells) and the spatial (residual connections stacked) dimensions, aiming to enhance the recognition rate. When testing with the Opportunity dataset and the public domain UCI dataset, the accuracy is significantly improved compared with previous results.
    Type of Medium: Online Resource
    ISSN: 1024-123X , 1563-5147
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2014442-8
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...