首页 > 最新文献

计算机科学最新文献

英文 中文
IF:
Research on Lung Sound Signal Image Feature Recognition Based on Temporal and Spatial Dual-Channel Long- and Short-Term Memory Model 基于时空双通道长短期记忆模型的肺声信号图像特征识别研究
IF 3 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-23 DOI: 10.1002/ima.70141
Li Xueri, Hu Ruo, Xu Hong, Zhao Huimin

In this paper, through the study on the transformation of lung sound signal into image feature signal processing, we further mastered the processing process of lung sound signal, and used the new neural network model to identify and diagnose the image features of lung sound, effectively improving the effect of clinical AI-assisted diagnosis. To solve the problem that the traditional neural network model cannot obtain the temporal and spatial characteristics of lung sound signals at the same time, we propose a DCCLSTM (Dual-Channel Convolutional neural network for Long- and Short-Time Memory) to obtain spatial information and temporal information features of lung sound simultaneously. New features are generated by weighted fusion, which can effectively make up for the problem that the resolution of the feature map extracted by the traditional neural network model is reduced. This report presents the results of studies conducted on the lung sound dataset, and the accuracy rate of Dalal_CNN with the best effect was 89.56%. The DCCLSTM proposed in this study has a recognition accuracy of 97.40%. Experiments show that the DCCLSTM method is more accurate than the Dalal_CNN method.

本文通过对肺音信号转化为图像特征信号处理的研究,进一步掌握了肺音信号的处理过程,并利用新的神经网络模型对肺音的图像特征进行识别和诊断,有效提高了临床人工智能辅助诊断的效果。为解决传统神经网络模型无法同时获取肺声信号时空特征的问题,提出了一种双通道长短时记忆卷积神经网络(DCCLSTM)来同时获取肺声的空间信息和时间信息特征。通过加权融合生成新的特征,有效地弥补了传统神经网络模型提取的特征图分辨率降低的问题。本报告给出了对肺音数据集的研究结果,其中效果最好的Dalal_CNN准确率为89.56%。本研究提出的dclstm识别准确率为97.40%。实验表明,DCCLSTM方法比Dalal_CNN方法更准确。
{"title":"Research on Lung Sound Signal Image Feature Recognition Based on Temporal and Spatial Dual-Channel Long- and Short-Term Memory Model","authors":"Li Xueri,&nbsp;Hu Ruo,&nbsp;Xu Hong,&nbsp;Zhao Huimin","doi":"10.1002/ima.70141","DOIUrl":"https://doi.org/10.1002/ima.70141","url":null,"abstract":"<p>In this paper, through the study on the transformation of lung sound signal into image feature signal processing, we further mastered the processing process of lung sound signal, and used the new neural network model to identify and diagnose the image features of lung sound, effectively improving the effect of clinical AI-assisted diagnosis. To solve the problem that the traditional neural network model cannot obtain the temporal and spatial characteristics of lung sound signals at the same time, we propose a DCCLSTM (Dual-Channel Convolutional neural network for Long- and Short-Time Memory) to obtain spatial information and temporal information features of lung sound simultaneously. New features are generated by weighted fusion, which can effectively make up for the problem that the resolution of the feature map extracted by the traditional neural network model is reduced. This report presents the results of studies conducted on the lung sound dataset, and the accuracy rate of Dalal_CNN with the best effect was 89.56%. The DCCLSTM proposed in this study has a recognition accuracy of 97.40%. Experiments show that the DCCLSTM method is more accurate than the Dalal_CNN method.</p>","PeriodicalId":14027,"journal":{"name":"International Journal of Imaging Systems and Technology","volume":"35 4","pages":""},"PeriodicalIF":3.0,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ima.70141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Cross-Domain Recommendation Framework With Graph Neural Network 基于图神经网络的联邦跨域推荐框架
IF 3 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-06-23 DOI: 10.1111/exsy.70087
Deling Huang, Qilong Feng

Cross-domain recommendation (CDR) leverages more abundant source-domain information to improve target-domain recommendation accuracy. However, traditional centralized CDR approaches face two critical limitations: (1) centralized data storage causes privacy vulnerabilities against malicious servers, and (2) gradient leakage during uploading enables recovery of source data. To address these challenges, in this work, we propose FedGraphCDR, a federated learning-based cross-domain recommendation framework that integrates local differential privacy (LDP) with pseudo item injection during gradient aggregation to prevent gradient leakage attacks, while utilizing graph neural networks to identify comparable users and mitigate cold-start problems. Evaluation on a real-life Douban dataset spanning three domains demonstrates that our framework successfully combines LDP with pseudo items to enhance privacy protection while achieving superior recommendation accuracy over benchmark methods. The results confirm that FedGraphCDR effectively resolves privacy concerns and improves recommendation quality, particularly for cold-start users, and establishes a practical solution for privacy-preserving cross-domain recommendation.

跨域推荐(CDR)利用更丰富的源域信息来提高目标域推荐的准确性。然而,传统的集中式话单方法面临两个关键的局限性:(1)数据集中存储会导致针对恶意服务器的隐私漏洞;(2)上传过程中的梯度泄漏会导致源数据的恢复。为了解决这些挑战,在这项工作中,我们提出了FedGraphCDR,这是一个基于联邦学习的跨域推荐框架,它在梯度聚合期间集成了本地差分隐私(LDP)和伪项目注入,以防止梯度泄漏攻击,同时利用图神经网络识别可比用户并减轻冷启动问题。对一个跨越三个领域的真实豆瓣数据集的评估表明,我们的框架成功地将LDP与伪条目结合起来,增强了隐私保护,同时获得了比基准方法更高的推荐准确性。结果证实,FedGraphCDR有效解决了用户的隐私问题,提高了推荐质量,特别是对于冷启动用户,为保护隐私的跨域推荐建立了一个实用的解决方案。
{"title":"Federated Cross-Domain Recommendation Framework With Graph Neural Network","authors":"Deling Huang,&nbsp;Qilong Feng","doi":"10.1111/exsy.70087","DOIUrl":"https://doi.org/10.1111/exsy.70087","url":null,"abstract":"<div>\u0000 \u0000 <p>Cross-domain recommendation (CDR) leverages more abundant source-domain information to improve target-domain recommendation accuracy. However, traditional centralized CDR approaches face two critical limitations: (1) centralized data storage causes privacy vulnerabilities against malicious servers, and (2) gradient leakage during uploading enables recovery of source data. To address these challenges, in this work, we propose FedGraphCDR, a federated learning-based cross-domain recommendation framework that integrates local differential privacy (LDP) with pseudo item injection during gradient aggregation to prevent gradient leakage attacks, while utilizing graph neural networks to identify comparable users and mitigate cold-start problems. Evaluation on a real-life Douban dataset spanning three domains demonstrates that our framework successfully combines LDP with pseudo items to enhance privacy protection while achieving superior recommendation accuracy over benchmark methods. The results confirm that FedGraphCDR effectively resolves privacy concerns and improves recommendation quality, particularly for cold-start users, and establishes a practical solution for privacy-preserving cross-domain recommendation.</p>\u0000 </div>","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":"42 8","pages":""},"PeriodicalIF":3.0,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Binary Slime Mold Algorithm for Intrusion Detection Systems 一种改进的入侵检测系统二元黏菌算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-06-23 DOI: 10.1002/cpe.70127
Mahdieh Khorashadizade, Soodeh Hosseini, Morteza Jouyban

This paper proposes an enhanced intrusion detection system (IDS) that integrates an improved feature selection (FS) mechanism with optimized artificial neural network (ANN) training. The FS process is guided by a novel hybrid variant of the slime mold algorithm (SMA), called LBSMA, which incorporates both Lévy flight and Brownian motion to balance exploration and exploitation capabilities. Furthermore, an Equivalent SMA called ESMA is developed for training ANN by adopting the velocity update concept from the particle swarm optimization (PSO) algorithm. The proposed LBSMA-ESMA framework is evaluated on several benchmark IDS data sets and compared with well-known optimization techniques such as grasshopper optimization algorithm (GOA), PSO, genetic algorithm (GA), teaching-learning optimization algorithm (TLBO), and Salp Swarm optimization algorithm (SSA). Experimental results show that the proposed method outperforms existing algorithms in terms of classification accuracy, convergence speed, and robustness, making it a promising solution for FS in security-related applications.

本文提出了一种将改进的特征选择机制与优化的人工神经网络训练相结合的增强型入侵检测系统。FS过程由黏菌算法(SMA)的一种新型混合变体LBSMA指导,该算法结合了lsamvy飞行和布朗运动来平衡勘探和开采能力。此外,采用粒子群优化算法中的速度更新概念,开发了一种等效SMA (ESMA)来训练人工神经网络。提出的LBSMA-ESMA框架在多个基准IDS数据集上进行了评估,并与众所周知的优化技术如grasshopper优化算法(GOA)、PSO、遗传算法(GA)、教-学优化算法(TLBO)和Salp Swarm优化算法(SSA)进行了比较。实验结果表明,该方法在分类精度、收敛速度和鲁棒性方面优于现有算法,是一种很有前途的安全相关应用FS解决方案。
{"title":"An Improved Binary Slime Mold Algorithm for Intrusion Detection Systems","authors":"Mahdieh Khorashadizade,&nbsp;Soodeh Hosseini,&nbsp;Morteza Jouyban","doi":"10.1002/cpe.70127","DOIUrl":"https://doi.org/10.1002/cpe.70127","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper proposes an enhanced intrusion detection system (IDS) that integrates an improved feature selection (FS) mechanism with optimized artificial neural network (ANN) training. The FS process is guided by a novel hybrid variant of the slime mold algorithm (SMA), called LBSMA, which incorporates both Lévy flight and Brownian motion to balance exploration and exploitation capabilities. Furthermore, an Equivalent SMA called ESMA is developed for training ANN by adopting the velocity update concept from the particle swarm optimization (PSO) algorithm. The proposed LBSMA-ESMA framework is evaluated on several benchmark IDS data sets and compared with well-known optimization techniques such as grasshopper optimization algorithm (GOA), PSO, genetic algorithm (GA), teaching-learning optimization algorithm (TLBO), and Salp Swarm optimization algorithm (SSA). Experimental results show that the proposed method outperforms existing algorithms in terms of classification accuracy, convergence speed, and robustness, making it a promising solution for FS in security-related applications.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 15-17","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective fine-tuning for large language models via matrix nuclear norm 基于矩阵核范数的大型语言模型选择性微调
IF 7.4 1区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-23 DOI: 10.1016/j.ipm.2025.104259
Tingyu Xia , Yahan Li , Yuan Wu , Yi Chang
In recent years, the primary focus of supervised fine-tuning (SFT) for large language models (LLMs) has concentrated on the utilization of a small set of high-quality data to fine-tune models. To address the challenge of selecting the most suitable data subsets, we introduce GcMNN, an innovative framework that combines the GraphCut data bucketing module with the Matrix Nuclear-Norm quality evaluation module. This two-part strategy ensures a well-rounded selection by considering both diversity and quality. These factors are essential for enhancing the representativeness and informativeness of the chosen subsets. When compared to the latest methods, GcMNN delivers superior or comparable outcomes in downstream tasks, with performance enhancements between 0.3% and 2.35% for Qwen2-7B and Llama3-8B in objective evaluation tasks. Furthermore, against other data quality evaluation methods based on compression theory, GcMNN exhibits an average improvement of up to 2.16% in objective benchmarks, while notably reducing computational complexity, cutting down the time cost from O(n3) to O(n2).
近年来,大型语言模型(llm)的监督微调(SFT)的主要焦点集中在利用一小部分高质量数据对模型进行微调。为了解决选择最合适的数据子集的挑战,我们引入了GcMNN,这是一个将GraphCut数据桶模块与矩阵核规范质量评估模块相结合的创新框架。这种两部分策略通过考虑多样性和质量来确保全面的选择。这些因素对于提高所选子集的代表性和信息量是必不可少的。与最新方法相比,GcMNN在下游任务中提供了更好或相当的结果,Qwen2-7B和Llama3-8B在客观评价任务中的性能提高了0.3%至2.35%。此外,相对于其他基于压缩理论的数据质量评价方法,GcMNN在客观基准测试中平均提高了2.16%,同时显著降低了计算复杂度,将时间成本从O(n3)降低到O(n2)。
{"title":"Selective fine-tuning for large language models via matrix nuclear norm","authors":"Tingyu Xia ,&nbsp;Yahan Li ,&nbsp;Yuan Wu ,&nbsp;Yi Chang","doi":"10.1016/j.ipm.2025.104259","DOIUrl":"10.1016/j.ipm.2025.104259","url":null,"abstract":"<div><div>In recent years, the primary focus of supervised fine-tuning (SFT) for large language models (LLMs) has concentrated on the utilization of a small set of high-quality data to fine-tune models. To address the challenge of selecting the most suitable data subsets, we introduce <strong>GcMNN</strong>, an innovative framework that combines the GraphCut data bucketing module with the Matrix Nuclear-Norm quality evaluation module. This two-part strategy ensures a well-rounded selection by considering both diversity and quality. These factors are essential for enhancing the representativeness and informativeness of the chosen subsets. When compared to the latest methods, GcMNN delivers superior or comparable outcomes in downstream tasks, with performance enhancements between 0.3% and 2.35% for Qwen2-7B and Llama3-8B in objective evaluation tasks. Furthermore, against other data quality evaluation methods based on compression theory, GcMNN exhibits an average improvement of up to 2.16% in objective benchmarks, while notably reducing computational complexity, cutting down the time cost from <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></mrow></mrow></math></span> to <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></mrow></math></span>.</div></div>","PeriodicalId":50365,"journal":{"name":"Information Processing & Management","volume":"62 6","pages":"Article 104259"},"PeriodicalIF":7.4,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compression is no barrier: Dataset copyright protection with compression-resistant backdoor watermarks 压缩不是障碍:具有抗压缩后门水印的数据集版权保护
IF 7.4 1区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-23 DOI: 10.1016/j.ipm.2025.104260
Hewang Nie , Xuemei Yuan
As datasets become invaluable assets fueling advancements in machine learning and artificial intelligence, protecting their copyright has become imperative. Existing dataset protection methods often falter due to susceptibility to data compression, degradation of data utility, and vulnerability to adversarial attacks. In this paper, we propose a novel dataset copyright protection method that embeds compression-resistant backdoor watermarks to safeguard data assets while preserving utility. By selecting boundary samples — data points near class decision boundaries — and training with feature consistency, our method retains robust, imperceptible watermarks even under common compression transformations. Experiments on MNIST, CIFAR-10, and CIFAR-100 (totaling 190,000 images) with LeNet-5, ResNet-18, and VGG-16 confirm minimal impact on model accuracy (within 0.3% of unwatermarked baselines) and near-perfect watermark detection rates. Watermark activation via trained models enables reliable ownership verification, providing a practical and secure solution for dataset copyright protection.
随着数据集成为推动机器学习和人工智能进步的宝贵资产,保护它们的版权变得势在必行。现有的数据集保护方法往往由于数据压缩的敏感性、数据效用的退化以及对抗性攻击的脆弱性而动摇。在本文中,我们提出了一种新的数据集版权保护方法,该方法嵌入抗压缩后门水印来保护数据资产,同时保持实用性。通过选择边界样本(类决策边界附近的数据点)和特征一致性训练,我们的方法即使在常见的压缩变换下也能保持鲁棒性,不易察觉的水印。使用LeNet-5、ResNet-18和VGG-16在MNIST、CIFAR-10和CIFAR-100(共190,000张图像)上进行的实验证实,对模型精度的影响最小(在未加水印基线的0.3%以内),水印检测率接近完美。通过训练模型激活水印可以实现可靠的所有权验证,为数据集版权保护提供实用和安全的解决方案。
{"title":"Compression is no barrier: Dataset copyright protection with compression-resistant backdoor watermarks","authors":"Hewang Nie ,&nbsp;Xuemei Yuan","doi":"10.1016/j.ipm.2025.104260","DOIUrl":"10.1016/j.ipm.2025.104260","url":null,"abstract":"<div><div>As datasets become invaluable assets fueling advancements in machine learning and artificial intelligence, protecting their copyright has become imperative. Existing dataset protection methods often falter due to susceptibility to data compression, degradation of data utility, and vulnerability to adversarial attacks. In this paper, we propose a novel dataset copyright protection method that embeds compression-resistant backdoor watermarks to safeguard data assets while preserving utility. By selecting boundary samples — data points near class decision boundaries — and training with feature consistency, our method retains robust, imperceptible watermarks even under common compression transformations. Experiments on MNIST, CIFAR-10, and CIFAR-100 (totaling 190,000 images) with LeNet-5, ResNet-18, and VGG-16 confirm minimal impact on model accuracy (within 0.3% of unwatermarked baselines) and near-perfect watermark detection rates. Watermark activation via trained models enables reliable ownership verification, providing a practical and secure solution for dataset copyright protection.</div></div>","PeriodicalId":50365,"journal":{"name":"Information Processing & Management","volume":"62 6","pages":"Article 104260"},"PeriodicalIF":7.4,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mpisee: Communicator-Centric Profiling of MPI Applications MPI应用程序的以通信器为中心的分析
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-06-23 DOI: 10.1002/cpe.70158
Ioannis Vardas, Jesper Larsson Träff, Ruben Laso, Sascha Hunold

mpisee is a lightweight profiling tool designed to track MPI communication operations per communicator, providing fine-grained insights into MPI applications that use communicators to partition MPI communication. While existing profiling tools offer valuable information, they may limit detailed analysis and optimization for such MPI applications, as they do not associate MPI communication with their communicator. Additionally, mpisee categorizes MPI communication operations based on message size, offering more granular information. It uses an SQLite database to efficiently store the profiling data, enabling users to analyze the application's profile from various perspectives, focusing on specific MPI ranks, operations, and more. Our analysis shows that mpisee incurs less than 5% overhead, performing on par with other state-of-the-art profilers. We demonstrate mpisee 's effectiveness by profiling and analyzing an FFT application, revealing potential performance bottlenecks related to the MPI_Alltoallv collective operation on small communicators and insights not available by other profilers. Leveraging this detailed information, we improved the application's overall performance by selecting different algorithms for MPI_Alltoallv and measuring their performance on different communicators with mpisee. This study illustrates mpisee 's utility and highlights the significant advantages of a communicator-centric approach in MPI profiling.

mpisee是一个轻量级分析工具,用于跟踪每个通信器的MPI通信操作,为使用通信器划分MPI通信的MPI应用程序提供细粒度的洞察。虽然现有的分析工具提供了有价值的信息,但它们可能会限制对此类MPI应用程序的详细分析和优化,因为它们没有将MPI通信与其通信器关联起来。此外,mpisee根据消息大小对MPI通信操作进行分类,从而提供更细粒度的信息。它使用SQLite数据库有效地存储分析数据,使用户能够从不同的角度分析应用程序的配置文件,专注于特定的MPI排名、操作等。我们的分析表明,mpisee产生的开销不到5%,性能与其他最先进的分析器相当。我们通过分析和分析FFT应用程序来展示mpisee的有效性,揭示了与小型通信器上的MPI_Alltoallv集体操作相关的潜在性能瓶颈,以及其他分析器无法提供的见解。利用这些详细信息,我们为MPI_Alltoallv选择不同的算法,并使用mpisee在不同的通信器上测量它们的性能,从而提高了应用程序的整体性能。本研究说明了mpisee的实用性,并强调了在MPI分析中以通信者为中心的方法的显著优势。
{"title":"Mpisee: Communicator-Centric Profiling of MPI Applications","authors":"Ioannis Vardas,&nbsp;Jesper Larsson Träff,&nbsp;Ruben Laso,&nbsp;Sascha Hunold","doi":"10.1002/cpe.70158","DOIUrl":"https://doi.org/10.1002/cpe.70158","url":null,"abstract":"<p><span>mpisee</span> is a lightweight profiling tool designed to track <span>MPI</span> communication operations per communicator, providing fine-grained insights into <span>MPI</span> applications that use communicators to partition <span>MPI</span> communication. While existing profiling tools offer valuable information, they may limit detailed analysis and optimization for such <span>MPI</span> applications, as they do not associate <span>MPI</span> communication with their communicator. Additionally, <span>mpisee</span> categorizes <span>MPI</span> communication operations based on message size, offering more granular information. It uses an SQLite database to efficiently store the profiling data, enabling users to analyze the application's profile from various perspectives, focusing on specific <span>MPI</span> ranks, operations, and more. Our analysis shows that <span>mpisee</span> incurs less than 5% overhead, performing on par with other state-of-the-art profilers. We demonstrate <span>mpisee</span> 's effectiveness by profiling and analyzing an FFT application, revealing potential performance bottlenecks related to the <span>MPI_Alltoallv</span> collective operation on small communicators and insights not available by other profilers. Leveraging this detailed information, we improved the application's overall performance by selecting different algorithms for <span>MPI_Alltoallv</span> and measuring their performance on different communicators with <span>mpisee</span>. This study illustrates <span>mpisee</span> 's utility and highlights the significant advantages of a communicator-centric approach in <span>MPI</span> profiling.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 15-17","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.70158","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hiding information in encrypted images with (t, n) secret sharing for IoT and cloud services 将信息隐藏在具有(t, n)秘密共享的加密图像中,用于物联网和云服务
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-23 DOI: 10.1016/j.jisa.2025.104137
Yijie Lin , Chia-Chen Lin , Ching-Chun Chang , Chin‐Chen Chang
Privacy and security concerns have emerged with the rapid advancement of information technology and the exponential growth in data storage and cloud services. This paper addresses these issues in the context of the Internet of Things (IoT) and cloud services. Focusing on reversible data hiding in encrypted images (RDHEI), the study presents an innovative scheme based on (t, n) secret sharing using an expandable magic matrix-based data hiding, which offers flexible security levels. The scheme is designed to withstand hacker attacks by effectively dispersing risks through secret sharing, dividing the data into multiple shares. This ensures that leaking fewer than t shares does not compromise the entire data and provides a flexible parameter scheme. The use of the expandable magic matrix enhances both the embedding capacity and security, demonstrating the robustness of the proposed RDHEI scheme in protecting data in the digital age. Furthermore, our approach encrypts images at the IoT gateway rather than at the cloud server, enabling content owners to assert ownership claims—an ability not available in previous schemes. Experimental results confirm that our scheme maintains a constant concealment capacity of up to 4 bits per pixel (bpp), while safeguarding the confidentiality of the hidden data and preserving the randomness of the generated shares.
随着信息技术的快速发展以及数据存储和云服务的指数级增长,隐私和安全问题已经出现。本文在物联网(IoT)和云服务的背景下解决了这些问题。针对加密图像中的可逆数据隐藏(rdhi)问题,提出了一种基于(t, n)秘密共享的创新方案,该方案使用可扩展的基于魔法矩阵的数据隐藏,提供了灵活的安全级别。该方案旨在通过秘密共享,将数据分成多个共享,有效分散风险,从而抵御黑客攻击。这确保泄漏少于t个共享不会危及整个数据,并提供灵活的参数方案。可扩展魔法矩阵的使用提高了嵌入容量和安全性,证明了所提出的RDHEI方案在数字时代保护数据的鲁棒性。此外,我们的方法在物联网网关而不是云服务器上对图像进行加密,使内容所有者能够断言所有权声明——这是以前的方案所不具备的能力。实验结果证实,我们的方案保持了高达4比特/像素(bpp)的恒定隐藏能力,同时保证了隐藏数据的机密性和生成共享的随机性。
{"title":"Hiding information in encrypted images with (t, n) secret sharing for IoT and cloud services","authors":"Yijie Lin ,&nbsp;Chia-Chen Lin ,&nbsp;Ching-Chun Chang ,&nbsp;Chin‐Chen Chang","doi":"10.1016/j.jisa.2025.104137","DOIUrl":"10.1016/j.jisa.2025.104137","url":null,"abstract":"<div><div>Privacy and security concerns have emerged with the rapid advancement of information technology and the exponential growth in data storage and cloud services. This paper addresses these issues in the context of the Internet of Things (IoT) and cloud services. Focusing on reversible data hiding in encrypted images (RDHEI), the study presents an innovative scheme based on (<em>t, n</em>) secret sharing using an expandable magic matrix-based data hiding, which offers flexible security levels. The scheme is designed to withstand hacker attacks by effectively dispersing risks through secret sharing, dividing the data into multiple shares. This ensures that leaking fewer than <em>t</em> shares does not compromise the entire data and provides a flexible parameter scheme. The use of the expandable magic matrix enhances both the embedding capacity and security, demonstrating the robustness of the proposed RDHEI scheme in protecting data in the digital age. Furthermore, our approach encrypts images at the IoT gateway rather than at the cloud server, enabling content owners to assert ownership claims—an ability not available in previous schemes. Experimental results confirm that our scheme maintains a constant concealment capacity of up to 4 bits per pixel (bpp), while safeguarding the confidentiality of the hidden data and preserving the randomness of the generated shares.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104137"},"PeriodicalIF":3.8,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LiteVessel: In-Depth Exploration of Lightweight Deep Neural Network Models for Retinal Vessel Segmentation LiteVessel:用于视网膜血管分割的轻量级深度神经网络模型的深入探索
IF 3 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-23 DOI: 10.1002/ima.70145
Musaed Alhussein, Khursheed Aurangzeb, Kashif Fareed, Mazhar Islam, Rasha Sarhan Alharthi

Deep learning has been used over the past decade for diagnosis applications in healthcare including ophthalmology. The integration of deep learning models with embedded systems to attain real-time processing of diagnosis becomes ineffective due to the resource constraints of embedded systems and higher computation and memory requirements of DNNs. To overcome this issue, this work aims to optimize an encoder–decoder architecture to demonstrate the potential for porting a DL model to any general embedded platform for eye disease diagnosis in the early stage. In this paper, we tested different model architectures to reduce the computation complexity of the DL model without compromising performance metrics. To train and test our optimized models, we utilized available databases of retinal images such as DRIVE, CHASE_DB1, and STARE. Although the computational complexity was much lower, the developed models achieved competitive performance compared with the existing state-of-the-art. Furthermore, we implemented a cross-training approach, and the findings illustrate the generalizability and resilience of the methods presented. The reduced number of parameters, computational complexity, and enhanced segmentation performance of retinal vessel segmentation make the proposed methods suitable for use in automated diagnostic systems.

在过去的十年中,深度学习已被用于包括眼科在内的医疗保健诊断应用。由于嵌入式系统的资源限制以及深度学习网络对计算和内存的要求较高,将深度学习模型与嵌入式系统集成以实现诊断的实时处理变得无效。为了克服这个问题,这项工作旨在优化编码器-解码器架构,以证明在早期阶段将深度学习模型移植到任何通用嵌入式眼病诊断平台的潜力。在本文中,我们测试了不同的模型架构,以在不影响性能指标的情况下降低深度学习模型的计算复杂性。为了训练和测试我们的优化模型,我们利用了现有的视网膜图像数据库,如DRIVE, CHASE_DB1和STARE。虽然计算复杂度大大降低,但与现有的最先进的模型相比,所开发的模型取得了相当的性能。此外,我们实施了一种交叉训练方法,研究结果说明了所提出方法的普遍性和弹性。该方法减少了视网膜血管分割的参数数量,降低了计算复杂度,提高了分割性能,适用于自动诊断系统。
{"title":"LiteVessel: In-Depth Exploration of Lightweight Deep Neural Network Models for Retinal Vessel Segmentation","authors":"Musaed Alhussein,&nbsp;Khursheed Aurangzeb,&nbsp;Kashif Fareed,&nbsp;Mazhar Islam,&nbsp;Rasha Sarhan Alharthi","doi":"10.1002/ima.70145","DOIUrl":"https://doi.org/10.1002/ima.70145","url":null,"abstract":"<div>\u0000 \u0000 <p>Deep learning has been used over the past decade for diagnosis applications in healthcare including ophthalmology. The integration of deep learning models with embedded systems to attain real-time processing of diagnosis becomes ineffective due to the resource constraints of embedded systems and higher computation and memory requirements of DNNs. To overcome this issue, this work aims to optimize an encoder–decoder architecture to demonstrate the potential for porting a DL model to any general embedded platform for eye disease diagnosis in the early stage. In this paper, we tested different model architectures to reduce the computation complexity of the DL model without compromising performance metrics. To train and test our optimized models, we utilized available databases of retinal images such as DRIVE, CHASE_DB1, and STARE. Although the computational complexity was much lower, the developed models achieved competitive performance compared with the existing state-of-the-art. Furthermore, we implemented a cross-training approach, and the findings illustrate the generalizability and resilience of the methods presented. The reduced number of parameters, computational complexity, and enhanced segmentation performance of retinal vessel segmentation make the proposed methods suitable for use in automated diagnostic systems.</p>\u0000 </div>","PeriodicalId":14027,"journal":{"name":"International Journal of Imaging Systems and Technology","volume":"35 4","pages":""},"PeriodicalIF":3.0,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Identification of Nonlinear Dynamics-Based Model Predictive Control for Multirotor Collision Avoidance 基于非线性动力学模型的多旋翼避碰预测控制稀疏辨识
IF 2.2 4区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-06-22 DOI: 10.1049/cth2.70049
Jayden Dongwoo Lee, Youngjae Kim, Yoonseong Kim, Hyochoong Bang

This article proposes a data-driven model predictive control (MPC) method for multirotor collision avoidance, considering uncertainties and the unknown dynamics caused by a payload. To address this challenge, sparse identification of nonlinear dynamics (SINDy) is employed to derive the governing equations of the multirotor system. SINDy is capable of discovering the equations of target systems from limited data, under the assumption that a few dominant functions primarily characterize the system's behavior. In addition, a data collection framework that combines a baseline controller with MPC is proposed to generate diverse trajectories for model identification. A candidate function library, informed by prior knowledge of multirotor dynamics, along with a normalization technique, is utilized to enhance the accuracy of the SINDy-based model. Using data-driven model from SINDy, MPC is used to achieve accurate trajectory tracking while satisfying state and input constraints, including those for obstacle avoidance. Simulation results demonstrate that SINDy can successfully identify the governing equations of the multirotor system, accounting for mass parameter uncertainties and aerodynamic effects. Furthermore, the results confirm that the proposed method outperforms conventional MPC, which suffers from parameter uncertainty and an unknown aerodynamic model, in both obstacle avoidance and trajectory tracking performance.

本文提出了一种考虑载荷不确定性和未知动力学的多旋翼避碰数据驱动模型预测控制(MPC)方法。为了解决这一问题,采用非线性动力学稀疏辨识(SINDy)方法推导了多转子系统的控制方程。SINDy能够从有限的数据中发现目标系统的方程,假设几个主导函数主要表征系统的行为。此外,提出了一种将基线控制器与MPC相结合的数据收集框架,以生成用于模型识别的多种轨迹。利用多旋翼动力学的先验知识和归一化技术,利用候选函数库来提高基于sindy的模型的精度。MPC利用SINDy的数据驱动模型,在满足状态约束和输入约束(包括避障约束)的情况下,实现精确的轨迹跟踪。仿真结果表明,在考虑质量参数不确定性和气动影响的情况下,SINDy能够成功辨识多旋翼系统的控制方程。结果表明,该方法在避障性能和轨迹跟踪性能上均优于参数不确定性和未知气动模型的传统MPC方法。
{"title":"Sparse Identification of Nonlinear Dynamics-Based Model Predictive Control for Multirotor Collision Avoidance","authors":"Jayden Dongwoo Lee,&nbsp;Youngjae Kim,&nbsp;Yoonseong Kim,&nbsp;Hyochoong Bang","doi":"10.1049/cth2.70049","DOIUrl":"https://doi.org/10.1049/cth2.70049","url":null,"abstract":"<p>This article proposes a data-driven model predictive control (MPC) method for multirotor collision avoidance, considering uncertainties and the unknown dynamics caused by a payload. To address this challenge, sparse identification of nonlinear dynamics (SINDy) is employed to derive the governing equations of the multirotor system. SINDy is capable of discovering the equations of target systems from limited data, under the assumption that a few dominant functions primarily characterize the system's behavior. In addition, a data collection framework that combines a baseline controller with MPC is proposed to generate diverse trajectories for model identification. A candidate function library, informed by prior knowledge of multirotor dynamics, along with a normalization technique, is utilized to enhance the accuracy of the SINDy-based model. Using data-driven model from SINDy, MPC is used to achieve accurate trajectory tracking while satisfying state and input constraints, including those for obstacle avoidance. Simulation results demonstrate that SINDy can successfully identify the governing equations of the multirotor system, accounting for mass parameter uncertainties and aerodynamic effects. Furthermore, the results confirm that the proposed method outperforms conventional MPC, which suffers from parameter uncertainty and an unknown aerodynamic model, in both obstacle avoidance and trajectory tracking performance.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"19 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.70049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scale-Wise Interaction Fusion Network for Land Cover Classification of Urban Scene Imagery 城市场景影像土地覆盖分类的尺度交互融合网络
IF 2 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-06-22 DOI: 10.1049/ipr2.70139
Muhammad Shafiq, Waeal J. Obidallah, Quanrun Fan, Anas Bilal, Yousef A. Alduraywish

Accurate land cover classification of urban aerial imagery presents significant challenges, particularly in recognising small objects and similar-appearing features (e.g., flat land, prepared land for cultivation, crop growing areas and built-up regions along with ground water resource areas). These challenges arise due to the irregular scaling of extracted features at various rates from complex urban scenes and the mismatch in feature information flow across channels, ultimately affecting the overall accuracy (OA) of the network. To address these issues, we propose the scale-wise interaction fusion network (SIFN) for land cover classification of urban scene imagery. The SIFN comprises four key modules: multi-scale feature extraction, scale-wise interaction, feature shuffle-fusion and adaptive mask generation. The multi-scale feature extraction module captures contextual information across different dilation rates of convolutional layers, effectively handling varying object sizes. The scale-wise interaction module enhances the learning of multi-scale contextual features, while the feature shuffle-fusion module facilitates cross-scale information exchange, improving feature representation. Lastly, adaptive mask generation ensures precise boundary delineation and reduces misclassification in transitional zones. The proposed network significantly improves boundary masking accuracy for small and similar objects, thereby enhancing the overall land cover classification performance.

城市航空图像的准确土地覆盖分类面临着重大挑战,特别是在识别小物体和相似的特征(例如,平坦的土地,准备耕种的土地,作物种植区和建成区以及地下水资源区)方面。这些挑战是由于从复杂的城市场景中提取的特征以不同的速率不规则缩放,以及特征信息流在通道之间的不匹配,最终影响网络的整体精度(OA)。为了解决这些问题,我们提出了用于城市场景图像土地覆盖分类的尺度交互融合网络(SIFN)。该算法包括四个关键模块:多尺度特征提取、尺度交互、特征融合和自适应掩码生成。多尺度特征提取模块通过不同的卷积层膨胀率捕获上下文信息,有效地处理不同的对象大小。基于尺度的交互模块增强了多尺度上下文特征的学习,而特征洗刷融合模块促进了跨尺度信息交换,提高了特征表示。最后,自适应掩码生成确保了精确的边界划分,减少了过渡区域的误分类。该网络显著提高了小而相似目标的边界掩蔽精度,从而提高了整体的土地覆盖分类性能。
{"title":"Scale-Wise Interaction Fusion Network for Land Cover Classification of Urban Scene Imagery","authors":"Muhammad Shafiq,&nbsp;Waeal J. Obidallah,&nbsp;Quanrun Fan,&nbsp;Anas Bilal,&nbsp;Yousef A. Alduraywish","doi":"10.1049/ipr2.70139","DOIUrl":"https://doi.org/10.1049/ipr2.70139","url":null,"abstract":"<p>Accurate land cover classification of urban aerial imagery presents significant challenges, particularly in recognising small objects and similar-appearing features (e.g., flat land, prepared land for cultivation, crop growing areas and built-up regions along with ground water resource areas). These challenges arise due to the irregular scaling of extracted features at various rates from complex urban scenes and the mismatch in feature information flow across channels, ultimately affecting the overall accuracy (OA) of the network. To address these issues, we propose the scale-wise interaction fusion network (SIFN) for land cover classification of urban scene imagery. The SIFN comprises four key modules: multi-scale feature extraction, scale-wise interaction, feature shuffle-fusion and adaptive mask generation. The multi-scale feature extraction module captures contextual information across different dilation rates of convolutional layers, effectively handling varying object sizes. The scale-wise interaction module enhances the learning of multi-scale contextual features, while the feature shuffle-fusion module facilitates cross-scale information exchange, improving feature representation. Lastly, adaptive mask generation ensures precise boundary delineation and reduces misclassification in transitional zones. The proposed network significantly improves boundary masking accuracy for small and similar objects, thereby enhancing the overall land cover classification performance.</p>","PeriodicalId":56303,"journal":{"name":"IET Image Processing","volume":"19 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2025-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ipr2.70139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 J. Field Rob. J. Bionic Eng. ACTA INFORM Adv. Rob. AI MAG Ann. Math. Artif. Intell. Appl. Bionics Biomech. APPL INTELL APPL COMPUT ELECTROM APPL ARTIF INTELL Artif. Intell. ARTIF INTELL REV CHEMOMETR INTELL LAB China Commun. CMC-Comput. Mater. Continua Complex Intell. Syst. Comput. Sci. Eng. Commun. ACM COMPUTER Comput. Graphics Forum COMPUTING EMPIR SOFTW ENG Enterp. Inf. Syst. EPJ Data Sci. ETRI J EURASIP J WIREL COMM Evolving Systems FORM METHOD SYST DES Front. Neurorob. FRONT COMPUT SCI-CHI IEEE Trans. Commun. IEEE Trans. Comput. Social Syst. IEEE Trans. Dependable Secure Comput. IEEE Trans. Green Commun. Networking IEEE Trans. Cognit. Commun. Networking IEEE Access IEEE Trans. Comput. IEEE Antennas Propag. Mag. IEEE Micro IEEE Trans. Antennas Propag. IEEE Trans. Control Syst. Technol. IEEE Trans. Big Data IEEE Trans. Cybern. IEEE Internet Comput. IEEE Trans. Affective Comput. IEEE Trans. Emerging Top. Comput. Intell. IEEE SECUR PRIV IEEE Trans. Emerging Top. Comput. IEEE Trans. Aerosp. Electron. Syst. IEEE Trans. Broadcast. IEEE Intell. Syst. IEEE Commun. Lett. IEEE Trans. Autom. Control IEEE Trans. Cloud Comput. IEEE Trans. Evol. Comput. IEEE Trans. Consum. Electron. IEEE Trans. Fuzzy Syst. IEEE Trans. Haptic IEEE Trans. Image Process. IEEE Multimedia IEEE Rob. Autom. Lett. IEEE J. Sel. Areas Commun. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. IETE Tech. Rev. IEEE Trans. Serv. Comput. IEEE Trans. Parallel Distrib. Syst. IEEE Trans. Sustainable Comput. IEEE Trans. Multimedia IEEE Trans. Ind. Inf. IEEE Trans. Neural Networks Learn. Syst. IEEE Trans. Software Eng. IEEE-ACM T AUDIO SPE IEEE Wireless Commun. IEEE Wireless Commun. Lett. IET MICROW ANTENNA P IEEE Trans. Visual Comput. Graphics IEEE Trans. Ind. Electron. IET Optoelectron IEEE Trans. Veh. Technol. IEEE Trans. Netw. Serv. Manage. IEEE Trans. Pattern Anal. Mach. Intell. IEEE Trans. Wireless Commun. IEEE ACM T NETWORK IEEE Trans. Inf. Forensics Secur. IEEE Trans. Inf. Theory IEEE Trans. Knowl. Data Eng. INFORM SYST FRONT INFORMS J COMPUT INFOR Int. J. Comput. Vision Int. J. Approximate Reasoning Int. J. Control Int. J. Commun. Syst. Int. J. Imaging Syst. Technol. Int. J. Fuzzy Syst. Int. J. Intell. Syst. Int. J. Network Manage. Int. J. Parallel Program. Int. J. Social Rob. Int. J. Software Tools Technol. Trans.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1