-
381
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01“…Hyperledger Fabric is an extensible alliance blockchain platform and provides support for enterprise-level commercial blockchain projects.The cryptographic algorithm is the core technologies of the platform, ensuring the security and non-tampering of the data on the chain.But the original Fabric platform lacks the national cryptographic algorithm support.The embedding and support of the national cryptographic algorithm of the Fabric platform was designed and implemented.Firstly, the interaction logic of between components and the invocation scenario of each type of cryptographic algorithm in the Fabric platform were analyzed, an idea of embedding national cryptographic algorithm support for the platform was proposed.Secondly, the modules and interfaces for SM2, SM3 and SM4 were added to BCCSP of the Fabric platform based on the open source code of national cryptographic algorithm implementation.Thirdly, the interface of cryptographic algorithm invoked by the upper layer of each component is associated to the interface of corresponding national cryptographic algorithms, which realized the invocation support of national cryptographic algorithm for the upper layer applications.Finally, the correctness and effectiveness of the embedded national cryptographic algorithm were verified by creating a fabric-gm test instance.And compared with the performances of the test instance built by the mirror of the native Fabric platform.The experimental results show that the embedded national cryptographic algorithm interfaces are corrected and the generated national cryptographic certificates are effective.Moreover, compared with the native Fabric platform, the network start up time increases by about 3%.In the millisecond unit, the transaction time cost increases by about one time, the dynamic certificate generation time increases by about 9%, and all the performance are within the acceptable range.…”
Get full text
Article -
382
Large-Eddy Simulation of the Flow Past a Circular Cylinder at Re = 130,000: Effects of Numerical Platforms and Single- and Double-Precision Arithmetic
Published 2024-12-01“…Numerical simulations of sub-critical flow past a circular cylinder at Reynolds number <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mrow><mi mathvariant="normal">R</mi><mi mathvariant="normal">e</mi></mrow></mrow></semantics></math></inline-formula> = 130,000 are performed using two numerical platforms: the commercial, Ansys Fluent, and the open-source, OpenFOAM (finite volume method and large-eddy simulation based on a differential equation for the sub-grid kinetic energy). …”
Get full text
Article -
383
برامج التعرف الضوئى على الحروف العربیة : دراسة تقییمیة مقارنة لأغراض استرجاع المعلومات
Published 2019-10-01“…The study depended on the evaluationmethodology using a data collection tool: a checklistThe study found that there is a rar of Arabic OCR software which isdivided into commercial, open source and free on the Internet. and the studyshow that only one program reached the accuracy rate (100%) in the recognitionof Arabic texts, ((Google Drive OCR), and the number of (4) programs reached arate of accuracy (90%) in the recognition of Arabic textsThe study recommended that Arab information institutions should developsoftware to recognize Arabic characters with high accuracy, and that scientificresearch bodies and research centers provide budgets for the development ofOCR techniques and Scientific research provide budgets for the development ofarabic OCR techniques…”
Get full text
Article -
384
Feature selection and data‐driven model for predicting the remaining useful life of lithium‐ion batteries
Published 2024-12-01“…The validity of this method is verified using the open‐source MIT battery dataset. Comparisons with models reported in the literature demonstrate that this method is generalisable and ensures accuracy across a wider range of predictions.…”
Get full text
Article -
385
Multivehicle Cooperative Lane Change Control Strategy for Intelligent Connected Vehicle
Published 2020-01-01“…Finally, based on the US NGSIM open-source traffic flow database, the accuracy and feasibility of the proposed strategy are verified.…”
Get full text
Article -
386
A multi-feature dataset of coated end milling cutter tool wear whole life cycle
Published 2025-01-01“…However, there are fewer open source datasets due to the high cost of data collection and equipment time investment. …”
Get full text
Article -
387
Research on the Energy-Saving Design Path of Rural Farmhouses under the Background of Ecological Livability
Published 2021-01-01“…It has practical problems that need to be solved urgently, such as the “insufficient savings” in the construction of farmhouses and the “insufficient open source” of clean energy applications. The discussion will be conducted from three aspects: the planning and layout design of rural houses in Chongqing, the performance of the enclosure structure of rural houses in key seasons, and the application of renewable clean energy in rural houses. …”
Get full text
Article -
388
A Time-Aware CNN-Based Personalized Recommender System
Published 2019-01-01“…Moreover, we use Tensorflow distributed open source framework to implement the proposed time-aware CNN-based recommendation algorithm which can effectively solve the problems of large data volume, large model, and slow speed of recommender system. …”
Get full text
Article -
389
Arbitrary 3D multi-body road vehicle modeling for vehicle-infrastructure interaction
Published 2025-03-01“…By avoiding imposing traditional force and moment equilibrium, this approach can be easily applied to a Computer Algebra System (CAS): an open-source Python script based on CAS is provided for constructing symbolic matrices across various road vehicle configurations. …”
Get full text
Article -
390
Software-Defined Radio FPGA Cores: Building towards a Domain-Specific Language
Published 2017-01-01“…This paper reports on the design and implementation of an open-source library of parameterizable and reusable Hardware Description Language (HDL) Intellectual Property (IP) cores designed for the development of Software-Defined Radio (SDR) applications that are deployed on FPGA-based reconfigurable computing platforms. …”
Get full text
Article -
391
Analysis of Bone Density and Bone Morphometry by Periapical Radiographs in Dental Implant Osseointegration Process
Published 2023-01-01“…Additionally, each ROI was analyzed for bone density and morphometry using the open-source ImageJ software with the BoneJ plugin. The significant difference was evaluated by analysis of variance (F-test) with p<0.05 and nonparametric Kruskal–Wallis test with p<0.05. …”
Get full text
Article -
392
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01“…Smart contract represents an essential application scenario of blockchain technology.Smart contract technology improves programmability and scalability of blockchain, and has broad development prospects.However, a series of security incidents caused a great number of economic losses and weakened users’ confidence in the Ethereum platform.The security of smart contract has become a critical problem that restricts the further development of smart contract.Defects in smart contract code may cause serious consequences and cannot be modified once deployed, it is especially important to verify the correctness of smart contract in advance.In recent years, researchers have obtained many achievements in verification of smart contract, but there is a lack of systematic summary of these research results.Therefore, some basic principles of Ethereum were introduced, including the transaction, gas mechanism, storage and programming language.Eight common types of vulnerabilities in smart contract were summarized and their causes were explained.Some real security events were reviewed and some examples of vulnerability codes were presented.Then, the research work on automatic verification of smart contract based on symbolic execution, model checking and theorem proving was classified and summarized.Three open-source automated tools were selected, including Mythril, Slither and Oyente.And experiments were implemented to evaluate and compare the three tools from the aspects of efficiency, accuracy and the types of vulnerability can be detected.Furthermore, related review articles were surveyed, and the advantages of this paper compared with these works were summarized.The critical problems in the vulnerability detection technology of smart contract were also summarized and the direction of future research was proposed at last.…”
Get full text
Article -
393
Global and regional perspectives on optimizing thermo-responsive dynamic windows for energy-efficient buildings
Published 2025-01-01“…Additionally, this study provides a practical guideline and an open-source mapping tool to optimize the intrinsic properties of thermo-responsive materials and evaluate their energy performance for sustainable buildings at various geographical scales.…”
Get full text
Article -
394
EVOLUȚIA TRAFICULUI DE DROGURI DE MARE RISC DIN ROMÂNIA, ÎN PERIOADA 2016 – 2022
Published 2023-01-01“…Motivated by these remarks, in this paper, my aim is to analyze the open source data on evolution of drug trafficking in Romania, in period 2016-2022. …”
Get full text
Article -
395
Numerical Analysis of Turbulent Combustion in a Model Swirl Gas Turbine Combustor
Published 2016-01-01“…This model is implemented in the open source CFD code OpenFOAM, which has been used as the basis for the present investigation. …”
Get full text
Article -
396
Design and Implementation of a VoIP Broadcasting Service over Embedded Systems in a Heterogeneous Network Environment
Published 2014-01-01“…In this paper, we present the implementation of a VoIP broadcasting service on the open source—Linphone—in a heterogeneous network environment, including WiFi, 3G, and LAN networks. …”
Get full text
Article -
397
Three-Dimensional Location and Mapping Analysis in Mobile Robotics Based on Visual SLAM Methods
Published 2023-01-01“…This article presents a study of some of the most representative open source visual SLAM (vSLAM) methods, beginning from an analysis of their characteristics and presenting criteria selection for an experimental design that allows contrasting their advantages and disadvantages. …”
Get full text
Article -
398
Adversarial detection based on feature invariant in license plate recognition systems
Published 2024-12-01“…The detection system was deployed into widely used open-source license plate recognition systems, HyperLPR and EasyPR, and extensive experiments were conducted using the real dataset CCPD. …”
Get full text
Article -
399
OVERVIEW STUDY OF MOBILE NETWORK TRAFFIC FOR BTS STATIONS
Published 2024-12-01“…The rapid development of machine learning is closely linked to technological advancements and has also driven the growth of the AI community and open- source tools (e.g., TensorFlow, Keras, PyTorch, fast.ai). …”
Get full text
Article -
400
A Digital Twin Framework to Improve Urban Sustainability and Resiliency: The Case Study of Venice
Published 2025-01-01“…Three different axes are proposed, aggregating the key features in a list of fields of intervention for each axis. The Venice open-source database is then analysed to consider the data already available for the city. …”
Get full text
Article