scholarly journals Digital Currency Illegal Behavior Detection Based on Mutual Information Prior Loss

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Feng Yang ◽  
Guixin Dong ◽  
Chaoran Cui ◽  
Xiaojie Li ◽  
Yaxi Su ◽  
...  

In recent years, with the rapid development of digital currency, digital currency brings us convenience and wealth, but also breeds some illegal and criminal behaviors. Different from traditional currencies, digital currency provides concealment to criminals while also exposing their behavior. The analysis of their behavior can be used to detect whether the current digital currency transaction is legal. There is a problem that most digital currency transactions are in compliance with laws and regulations, and only a small part of them uses digital currency to conduct illegal activities. It belongs to the problem of sample imbalance. It is quite challenging to accurately distinguish which transactions are legal and which are illegal in the massive digital currency transactions. For this reason, this study combines the mutual information and the traditional cross-entropy loss function and obtains the loss function based on the mutual information prior. The loss function based on the mutual information prior is that the bias of the category prior distribution is added after the output of the model (before the softmax), which makes the model consider category prior information to a certain extent when predicting. The experimental results show that the use of the loss function based on mutual information prior to the detection of digital currency illegal behavior has a good effect in SVM, DNN, GCN, and GAT methods.

Water ◽  
2019 ◽  
Vol 11 (4) ◽  
pp. 821 ◽  
Author(s):  
Meimei Wu ◽  
Wei Ge ◽  
Zongkun Li ◽  
Zening Wu ◽  
Hexiang Zhang ◽  
...  

Despite the rapid development of risk analysis in dam engineering, there is a relative absence of research on the environmental impact of dam break. As a systematic theory, set pair analysis has a good effect in dealing with uncertainties, although the result is relatively rough and easy to distort. A connection degree of five grades and a generalized set of potential are introduced to improve traditional set pair analysis. Combined with the index system, the evaluation model of the environmental impact of dam break is established, which is based on generalized set pair analysis. Taking Sheheji Reservoir dam as an example, a comparison of evaluation results of fuzzy mathematics theory and generalized set pair analysis is made, which verifies the scientificity and practicability of the method proposed in this paper. The results show that the evaluation grade of the environmental impact of dam break at Sheheji Reservoir is serious, and appropriate management measures should be taken to reduce the risk.


2013 ◽  
Vol 2013 ◽  
pp. 1-11
Author(s):  
Lurong Shen ◽  
Xinsheng Huang ◽  
Yuzhuang Yan ◽  
Yongbin Zheng ◽  
Wanying Xu

Mutual information (MI) has been widely used in multisensor image matching, but it may lead to mismatch among images with messy background. However, additional prior information can be of great help in improving the matching performance. In this paper, a robust Bayesian estimated mutual information, named as BMI, for multisensor image matching is proposed. This method has been implemented by utilizing the gradient prior information, in which the prior is estimated by the kernel density estimate (KDE) method, and the likelihood is modeled according to the distance of orientations. To further improve the robustness, we restrict the matching within the regions where the corresponding pixels of template image are salient enough. Experiments on several groups of multisensor images show that the proposed method outperforms the standard MI in robustness and accuracy and is similar with Pluim’s method. However, our computation is far more cost saving.


2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


10.18060/2125 ◽  
2013 ◽  
Vol 14 (2) ◽  
pp. 458-476 ◽  
Author(s):  
Badiah Haffejee ◽  
Jamie Rae Yoder ◽  
Kimberly Bender

Emerging adulthood marks a critical developmental juncture during which some individuals disengage from the illegal behavior of their adolescence while others continue to use substances and commit crimes. While risk factors for delinquency during adolescence are well studied, factors that influence persisting or desisting from illegal activities during emerging adulthood have not been fully explored. This mixed methods study utilizes a sample of college students aged 18-25 (N=74) and examines factors differentiating those who abstained from illegal behaviors, desisted from illegal behaviors, and persisted in illegal behaviors. Multinomial logistic regression models indicated peers offending and hours spent studying predicted desisting and peers offending predicted persisting (compared to the abstaining group). Three qualitative themes: family and peer bonds, morals and values, and fear of consequences further explained factors influencing emerging adults’ persisting and desisting choices. Implications for social work practice are explored.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Xudong He ◽  
Jian Wang ◽  
Jiqiang Liu ◽  
Enze Yuan ◽  
Kailun Wang ◽  
...  

The rapid development of the smart grid brings convenience to human beings. It enables users to know the real-time power supply capacity, the power quality, and the electricity price fluctuation of the grid. However, there are still some threats in the smart grid, which increase all kinds of expenses in the grid and cause great trouble to energy distribution. Among them, the man-made nontechnical loss (NTL) problem is particularly prominent. Recently, there are also some NTL detection programs. However, most of the schemes need huge amounts of supporting data and high labor costs. As a result, the NTL problem has not been well solved. In order to better avoid these risks, problems such as tampering of smart meter energy data, bypassing the smart meter directly connected to the grid, and imbalance between revenue and expenditure of the smart grid are tackled, and the threat scene of NTL is constructed. A hierarchical grid gateway blockchain is proposed and designed, and a new decentralized management MDMS system is constructed. The intelligent contract combined with the elliptic curve encryption technology is used to detect the storage and the acquisition of power data, and the detection of NTL problems is realized. At the same time, it has a certain ability to resist attacks such as replay, monitoring, and tampering. We tested the time consumption and throughput of this method on Hyperledger Fabric. At the same time, eight indexes of other methods proposed in the literature are compared. This method has a good effect.


2020 ◽  
Vol 206 ◽  
pp. 01026
Author(s):  
Shuheng Wang ◽  
Xuefeng Niu ◽  
Chunyu Zhu ◽  
Xiang Wu ◽  
Shi Liu

As one of the important geographic information products, orthophotos play an extremely important role in the field of geographic information. With the rapid development of China’s economic construction and the continuous improvement of photogrammetry technology, traditional orthophoto has been replaced by real orthophoto to meet the requirements of large-scale accurate mapping. This article discusses the method of generating real shot images, uses drone images, and uses Zhanwei New Village in Wuhan as the survey area to lay out the ground control points. Based on Pix4D modeling, the air and three encryptions are completed and based on high-precision DSM Quickly generate real radiography products. The research in this paper shows that the corrected real image can eliminate the phenomenon of blocking the wall and the problem of occlusion. It has a good effect and can be used in the field of line drawing maps. It provides a simple and quick solution for the rapid acquisition of orthophotos in the field of photogrammetry.


2013 ◽  
Vol 347-350 ◽  
pp. 3872-3876
Author(s):  
Hong Li ◽  
Gao Feng Tang ◽  
Fen Xia Wu ◽  
Cong E Tan

A novel algorithm which is image fusion based on GPU is proposed. The fused rule is regional energy. In recent years, the power of the computing of GPU has been greatly improved, which results that using it for the general-purpose computing has a rapid development. The essay researches on implementing the oriental field algorithm on GPU, including selecting GPU memories and dividing blocks and threads of GPU kernel functions. The results of experiment on the GPU of NVIDIA GTX560 are given, which shows that our proposed algorithm can be applied to the field of image fusion. Experiment shows the proposed algorithm has faster calcu-lation velocity and higher evaluation accuracy. The speed of the parallel algorithm is 200 times faster than that of the CPU-based implementation. Meanwhile the mutual information and QAB/F parameters are higher than that of the CPU-based algorithm.


1970 ◽  
Vol 13 (3) ◽  
pp. 391-393 ◽  
Author(s):  
B. K. Kale

Lehmann [1] in his lecture notes on estimation shows that for estimating the unknown mean of a normal distribution, N(θ, 1), the usual estimator is neither minimax nor admissible if it is known that θ belongs to a finite closed interval [a, b] and the loss function is squared error. It is shown that , the maximum likelihood estimator (MLE) of θ, has uniformly smaller mean squared error (MSE) than that of . It is natural to ask the question whether the MLE of θ in N(θ, 1) is admissible or not if it is known that θ ∊ [a, b]. The answer turns out to be negative and the purpose of this note is to present this result in a slightly generalized form.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Chenyuan Wang

This paper mainly analyzes the current situation of e-commerce in domestic SMEs and points out that there are limited initial investment and difficulty in financing in China’s SMEs; e-commerce control is not scientific; e-commerce personnel of SMEs are not of high quality, in the case of improper setting of the e-commerce sector and shortage of talents, rigid management model, and outdated management concepts. By using the loss function and the value chain management theory of the deep learning in the stationary wavelet domain residual learning model, the e-commerce model of SMEs is newly constructed, and the e-commerce department as the core department of the enterprise is proposed. By training the optimal parameters of the deep residual network and comparing the results with other models, the method of this paper has a good effect against the sample. The original loss function based on the residual learning model deep learning is modified to solve the original model fuzzy problem, which improves the effect and has good robustness. Finally, based on the wavelet residual depth residual evaluation method, this paper evaluates the application effect of this model and proposes relevant suggestions for improving this model, including rationalizing and perfecting the external value chain coordination mechanism, establishing the e-commerce value chain sharing center, and promoting integration of e-commerce business, strengthening measures and recommendations in various aspects of e-commerce information construction. At last, taking the business activities of a company as an example, applying the theory described in this paper to specific practice proves the feasibility and practical value of the theory.


2014 ◽  
Vol 1061-1062 ◽  
pp. 1186-1189
Author(s):  
Ming Zhe Wei ◽  
Wan Wei Tang

With the rapid development of aerial UAV (Unmanned Aerial Vehicle), the design of real-time data acquisition and transmission system for the video signal has a new applied field. It is different from traditional video acquisition and processing system, aerial video signal has the problems of screen jitter and spatial interference. The processing algorithm of aerial UAV airborne video signal is put forward in the paper, and the platform of high speed procession is constructed based on chip TMS320DM642, and get a good effect.


Sign in / Sign up

Export Citation Format

Share Document