Under hydrothermal and solvothermal conditions,two novel cobalt-based complexes,{[Co_(2)(CIA)(OH)(1,4-dtb)]·3.2H_(2)O}n(HU23)and{[Co_(2)(CIA)(OH)(1,4-dib)]·3.5H2O·DMF}n(HU24),were successfully construct...Under hydrothermal and solvothermal conditions,two novel cobalt-based complexes,{[Co_(2)(CIA)(OH)(1,4-dtb)]·3.2H_(2)O}n(HU23)and{[Co_(2)(CIA)(OH)(1,4-dib)]·3.5H2O·DMF}n(HU24),were successfully constructed by coordinatively assembling the semi-rigid multidentate ligand 5-(1-carboxyethoxy)isophthalic acid(H₃CIA)with the Nheterocyclic ligands 1,4-di(4H-1,2,4-triazol-4-yl)benzene(1,4-dtb)and 1,4-di(1H-imidazol-1-yl)benzene(1,4-dib),respectively,around Co^(2+)ions.Single-crystal X-ray diffraction analysis revealed that in both complexes HU23 and HU24,the CIA^(3-)anions adopt aκ^(7)-coordination mode,bridging six Co^(2+)ions via their five carboxylate oxygen atoms and one ether oxygen atom.This linkage forms tetranuclear[Co4(μ3-OH)2]^(6+)units.These Co-oxo cluster units were interconnected by CIA^(3-)anions to assemble into 2D kgd-type structures featuring a 3,6-connected topology.The 2D layers were further connected by 1,4-dtb and 1,4-dib,resulting in 3D pillar-layered frameworks for HU23 and HU24.Notably,despite the similar configurations of 1,4-dtb and 1,4-dib,differences in their coordination spatial orientations lead to topological divergence in the 3D frameworks of HU23 and HU24.Topological analysis indicates that the frameworks of HU23 and HU24 can be simplified into a 3,10-connected net(point symbol:(4^(10).6^(3).8^(2))(4^(3))_(2))and a 3,8-connected tfz-d net(point symbol:(4^(3))_(2)((4^(6).6^(18).8^(4)))),respectively.This structural differentiation confirms the precise regulatory role of ligands on the topology of metal-organic frameworks.Moreover,the ultraviolet-visible absorption spectra confirmed that HU23 and HU24 have strong absorption capabilities for ultraviolet and visible light.According to the Kubelka-Munk method,their bandwidths were 2.15 and 2.08 eV,respectively,which are consistent with those of typical semiconductor materials.Variable-temperature magnetic susceptibility measurements(2-300 K)revealed significant antiferromagnetic coupling in both complexes,with their effective magnetic moments decreasing markedly as the temperature lowered.CCDC:2457554,HU23;2457553,HU24.展开更多
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe...Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.展开更多
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ...Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.展开更多
The preparation of carbon-based electromagnetic wave(EMW)absorbers possessing thin matching thickness,wide absorption bandwidth,strong absorption intensity,and low filling ratio remains a huge challenge.Metal-organic ...The preparation of carbon-based electromagnetic wave(EMW)absorbers possessing thin matching thickness,wide absorption bandwidth,strong absorption intensity,and low filling ratio remains a huge challenge.Metal-organic frameworks(MOFs)are ideal self-sacrificing templates for the construction of carbon-based EMW absorbers.In this work,bimetallic FeMn-MOF-derived MnFe_(2)O_(4)/C/graphene composites were fabricated via a two-step route of solvothermal reaction and the following pyrolysis treatment.The results re-veal the evolution of the microscopic morphology of carbon skeletons from loofah-like to octahedral and then to polyhedron and pomegran-ate after the adjustment of the Fe^(3+)to Mn^(2+)molar ratio.Furthermore,at the Fe^(3+)to Mn^(2+)molar ratio of 2:1,the obtained MnFe_(2)O_(4)/C/graphene composite exhibited the highest EMW absorption capacity.Specifically,a minimum reflection loss of-72.7 dB and a max-imum effective absorption bandwidth of 5.1 GHz were achieved at a low filling ratio of 10wt%.In addition,the possible EMW absorp-tion mechanism of MnFe_(2)O_(4)/C/graphene composites was proposed.Therefore,the results of this work will contribute to the construction of broadband and efficient carbon-based EMW absorbers derived from MOFs.展开更多
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f...Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.展开更多
Enhancing ecological security for sustainable social,economic,and environmental development is a key focus of current research and a practical necessity for ecological management.However,the integration of retrospecti...Enhancing ecological security for sustainable social,economic,and environmental development is a key focus of current research and a practical necessity for ecological management.However,the integration of retrospective ecological security assessments with future trend predictions and fine-scale targeted regulations remains inadequate,limiting effective ecological governance and sustainable regional development.Guided by Social-Economic-Natural Complex Ecosystems(SENCE)theory,this study proposes an analytical framework that integrates ecological security assessment,prediction,and zoning management.The Daqing River Basin,a typical river basin in the North China Plain,was selected as a case study.The results indicate that overall ecological security in the Daqing River Basin improved from a“Moderate”level to a“Relatively Safe”level between 2000 and 2020;however,spatial heterogeneity persisted,with higher ecological security in northwestern and eastern regions and lower ecological security in the central region.Approximately 62% of the Basin experienced an improvement in ecological security level,except in the major urban areas of Beijing,Tianjin,and Hebei,where ecological security deteriorated.From 2025 to 2040,the overall ecological security of the Daqing River Basin is expected to improve and remain at the“Relatively Safe”level.However,spatial heterogeneity will be further aggravated as the ecological security of major urban areas continues to deteriorate.Ecological security management zones and regulation strategies are proposed at the regional and county scales to emphasize integrated regulation for the entire basin and major urban areas.The proposed analytical framework provides valuable insights for advancing theoretical research on ecological security.The case study offers a practical reference for ecological security enhancement in river basins and other regions facing significant human-land conflicts.展开更多
The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementat...The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource sharing. The framework improves efficiency and scalability in IoT, exposes vulnerable subsystems and components as possible weak links to system compromise, and meets the requirements of a heterogeneous computing environment. Other features of the framework including efficient resource sharing, fault tolerance, and distributed storage support the Internet of Things. We discuss the design requirements and carry out the implementation of Proof of Concept and evaluation of our framework. Two underlying technologies: the actor model and the blockchain were used for the implementation. Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel. Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability. We conclude from the evaluations that the actor-based implementation has better scalability than the block-chain-based implementation. Also, the blockchain seems to be computationally more intensive than the actors and less suitable for IoT systems.展开更多
Against the backdrop of intensifying global water scarcity,reclaimed water reuse has emerged as a critical strategy for ecological replenishment of landscape water bodies.However,its potential ecological risks remain ...Against the backdrop of intensifying global water scarcity,reclaimed water reuse has emerged as a critical strategy for ecological replenishment of landscape water bodies.However,its potential ecological risks remain underexplored.This study aims to establish a multidimensional ecological safety evaluation framework for reclaimed water replenishment systems and propose hierarchical risk prevention strategies.By integrating ecotoxicological assays(algae growth inhibition,Daphnia behavioral anomalies,zebrafish embryo toxicity),multimedia exposure modeling,and Monte Carlo probabilistic simulations,the risk contributions and spatial heterogeneity of typical pollutants are quantitatively analyzed.Results revealed that sulfamethoxazole(RQ=2.3)and diclofenac(RQ=1.8)posed high ecological risks,with their effects nonlinearly correlated with hydraulic retention time(HRT<3 days)and nutrient loading(TN>1.2 mg/L).A three-tier risk prevention system was developed based on the“source-pathway-receptor”framework:ozone-activated carbon pretreatment achieved 85%removal efficiency for pharmaceutical contaminants,ecological floating beds enhanced nitrogen and phosphorus retention by 40%-60%,and hydraulic regulation(flow velocity>0.1 m/s)effectively suppressed pathogen proliferation.The innovation of this study lies in establishing a chemical-biological-hydrological coupled risk quantification model for reclaimed water reuse scenarios.The hierarchical prevention standards have been incorporated into local reclaimed water management regulations,providing a scientific foundation and technical paradigm for sustainable landscape water replenishment.展开更多
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se...Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam.展开更多
The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security....The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system.展开更多
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai...IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks.展开更多
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ...Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.展开更多
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c...Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future.展开更多
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens...The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.展开更多
A thickness-controllable method for preparing metal-organic framework hollow nanofiowers on magnetic cores(Fe_(3)O_(4)@MOFs HFs)was demonstrated for the first time.The petal of magnetic core with hollow nanofiower str...A thickness-controllable method for preparing metal-organic framework hollow nanofiowers on magnetic cores(Fe_(3)O_(4)@MOFs HFs)was demonstrated for the first time.The petal of magnetic core with hollow nanofiower structure served as medium for assembling Ui O-66-NH_(2)shell with different thickness.To further improve its performance,Zr^(4+)was immobilized on the surface of Fe_(3)O_(4)@Ui O-66-NH_(2).Compared with conventional Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)nanospheres,the Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs showed increased enrichment performance for phosphopeptides.The Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs served as an attractive restricted-access adsorption material exhibited good selectivity(m_(β-casein):m_(BSA)=1:1000),high sensitivity(1.0 fmol)and excellent size-exclusion effect(m)((β-casein digests):m_(BSA)=1:200).Furthermore,the Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)HFs was successfully applied to the specific capture of ultratrace phosphopeptide from complex biological samples,revealing the great potential for the identification and analysis of trace phosphopeptides in clinical analysis.This work can be easily extended to the fabrication of diverse mag-MOF HFs with multifunctional and easy to post-modify properties,and open up a new avenue for the design and construction of new MOFs material.展开更多
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi...Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.展开更多
As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust acces...As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust access control mechanisms.The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control,which relies on trusted third parties and complex computations,resulting in intricate interactions,higher hardware costs,and processing delays.To address these issues,this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission.This method enhances data security and resource efficiency without imposing heavy computational and network burdens.In comparison to the best existing approach,it achieves a 7%improvement in accuracy,effectively addressing existing gaps in lightweight encryption and recognition performance.展开更多
This research presents an analysis of smart grid units to enhance connected units’security during data transmissions.The major advantage of the proposed method is that the system model encompasses multiple aspects su...This research presents an analysis of smart grid units to enhance connected units’security during data transmissions.The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring,data expansion,control association,throughput,and losses.In addition,all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks.Moreover,the quantitative analysis of the optimization algorithm is discussed concerning two case studies,thereby achieving early convergence at reduced complexities.The suggested method ensures that each communication unit has its own distinct channels,maximizing the possibility of accurate measurements.This results in the provision of only the original data values,hence enhancing security.Both power and line values are individually observed to establish control in smart grid-connected channels,even in the presence of adaptive settings.A comparison analysis is conducted to showcase the results,using simulation studies involving four scenarios and two case studies.The proposed method exhibits reduced complexity,resulting in a throughput gain of over 90%.展开更多
Bridge networks are essential components of civil infrastructure,supporting communities by delivering vital services and facilitating economic activities.However,bridges are vulnerable to natural disasters,particularl...Bridge networks are essential components of civil infrastructure,supporting communities by delivering vital services and facilitating economic activities.However,bridges are vulnerable to natural disasters,particularly earthquakes.To develop an effective disaster management strategy,it is critical to identify reliable,robust,and efficient indicators.In this regard,Life-Cycle Cost(LCC)and Resilience(R)serve as key indicators to assist decision-makers in selecting the most effective disaster risk reduction plans.This study proposes an innova-tive LCC-R optimization framework to identify the most optimal retrofit strategies for bridge networks facing hazardous events during their lifespan.The proposed framework employs both single-and multi-objective opti-mization techniques to identify retrofit strategies that maximize the R index while minimizing the LCC for the under-study bridge networks.The considered retrofit strategies include various options such as different mate-rials(steel,CFRP,and GFRP),thicknesses,arrangements,and timing of retrofitting actions.The first step in the proposed framework involves constructing fragility curves by performing a series of nonlinear time-history incre-mental dynamic analyses for each case.In the subsequent step,the seismic resilience surfaces are calculated using the obtained fragility curves and assuming a recovery function.Next,the LCC is evaluated according to the pro-posed formulation for multiple seismic occurrences,which incorporates the effects of complete and incomplete repair actions resulting from previous multiple seismic events.For optimization purposes,the Non-Dominated Sorting Genetic Algorithm II(NSGA-II)evolutionary algorithm efficiently identifies the Pareto front to represent the optimal set of solutions.The study presents the most effective retrofit strategies for an illustrative bridge network,providing a comprehensive discussion and insights into the resulting tactical approaches.The findings underscore that the methodologies employed lead to logical and actionable retrofit strategies,paving the way for enhanced resilience and cost-effectiveness in bridge network management against seismic hazards.展开更多
The evaluation and assessment of network security is a decision-making(DM)problem that occurs in an environment with multiple criteria,which have uncertainty,bipolarity,and extra-related information.The traditional ap...The evaluation and assessment of network security is a decision-making(DM)problem that occurs in an environment with multiple criteria,which have uncertainty,bipolarity,and extra-related information.The traditional approaches fail to address the need to acquire a wide range of information for the assessment,especially in situations where the criteria have both positive and negative aspects and contain extra fuzzy information.Therefore,in this manuscript,we aim to introduce a DM approach based on the concept of bipolar complex fuzzy(BCF)Yager aggregation operators(AOs).The related properties of these aggregation operators(AOs)are also discussed.Moreover,in this article,we diagnose the Yager operations in the setting of BCF.The basic idea of the interpreted operators and DM approach is to access the problem linked with the network security that is to evaluate and select the finest network security control and network security protocols for protecting and safeguarding the network of any organization or home(case studies).Finally,to exhibit the supremacy and success of the described theory,we examine them with the prevailing theories.展开更多
文摘Under hydrothermal and solvothermal conditions,two novel cobalt-based complexes,{[Co_(2)(CIA)(OH)(1,4-dtb)]·3.2H_(2)O}n(HU23)and{[Co_(2)(CIA)(OH)(1,4-dib)]·3.5H2O·DMF}n(HU24),were successfully constructed by coordinatively assembling the semi-rigid multidentate ligand 5-(1-carboxyethoxy)isophthalic acid(H₃CIA)with the Nheterocyclic ligands 1,4-di(4H-1,2,4-triazol-4-yl)benzene(1,4-dtb)and 1,4-di(1H-imidazol-1-yl)benzene(1,4-dib),respectively,around Co^(2+)ions.Single-crystal X-ray diffraction analysis revealed that in both complexes HU23 and HU24,the CIA^(3-)anions adopt aκ^(7)-coordination mode,bridging six Co^(2+)ions via their five carboxylate oxygen atoms and one ether oxygen atom.This linkage forms tetranuclear[Co4(μ3-OH)2]^(6+)units.These Co-oxo cluster units were interconnected by CIA^(3-)anions to assemble into 2D kgd-type structures featuring a 3,6-connected topology.The 2D layers were further connected by 1,4-dtb and 1,4-dib,resulting in 3D pillar-layered frameworks for HU23 and HU24.Notably,despite the similar configurations of 1,4-dtb and 1,4-dib,differences in their coordination spatial orientations lead to topological divergence in the 3D frameworks of HU23 and HU24.Topological analysis indicates that the frameworks of HU23 and HU24 can be simplified into a 3,10-connected net(point symbol:(4^(10).6^(3).8^(2))(4^(3))_(2))and a 3,8-connected tfz-d net(point symbol:(4^(3))_(2)((4^(6).6^(18).8^(4)))),respectively.This structural differentiation confirms the precise regulatory role of ligands on the topology of metal-organic frameworks.Moreover,the ultraviolet-visible absorption spectra confirmed that HU23 and HU24 have strong absorption capabilities for ultraviolet and visible light.According to the Kubelka-Munk method,their bandwidths were 2.15 and 2.08 eV,respectively,which are consistent with those of typical semiconductor materials.Variable-temperature magnetic susceptibility measurements(2-300 K)revealed significant antiferromagnetic coupling in both complexes,with their effective magnetic moments decreasing markedly as the temperature lowered.CCDC:2457554,HU23;2457553,HU24.
基金financially supported by the Ongoing Research Funding Program(ORF-2025-846),King Saud University,Riyadh,Saudi Arabia.
文摘Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.
文摘Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.
基金supported by the Natural Science Research Project of the Anhui Educational Committee,China(No.2022AH050827)the Open Research Fund Program of Anhui Province Key Laboratory of Specialty Polymers,Anhui University of Science and Technology,China(No.AHKLSP23-12)the Joint National-Local Engineering Research Center for Safe and Precise Coal Mining Fund,China(No.EC2022020)。
文摘The preparation of carbon-based electromagnetic wave(EMW)absorbers possessing thin matching thickness,wide absorption bandwidth,strong absorption intensity,and low filling ratio remains a huge challenge.Metal-organic frameworks(MOFs)are ideal self-sacrificing templates for the construction of carbon-based EMW absorbers.In this work,bimetallic FeMn-MOF-derived MnFe_(2)O_(4)/C/graphene composites were fabricated via a two-step route of solvothermal reaction and the following pyrolysis treatment.The results re-veal the evolution of the microscopic morphology of carbon skeletons from loofah-like to octahedral and then to polyhedron and pomegran-ate after the adjustment of the Fe^(3+)to Mn^(2+)molar ratio.Furthermore,at the Fe^(3+)to Mn^(2+)molar ratio of 2:1,the obtained MnFe_(2)O_(4)/C/graphene composite exhibited the highest EMW absorption capacity.Specifically,a minimum reflection loss of-72.7 dB and a max-imum effective absorption bandwidth of 5.1 GHz were achieved at a low filling ratio of 10wt%.In addition,the possible EMW absorp-tion mechanism of MnFe_(2)O_(4)/C/graphene composites was proposed.Therefore,the results of this work will contribute to the construction of broadband and efficient carbon-based EMW absorbers derived from MOFs.
文摘Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.
基金supported by the project of the National Natural Science Foundation of China(42330705).
文摘Enhancing ecological security for sustainable social,economic,and environmental development is a key focus of current research and a practical necessity for ecological management.However,the integration of retrospective ecological security assessments with future trend predictions and fine-scale targeted regulations remains inadequate,limiting effective ecological governance and sustainable regional development.Guided by Social-Economic-Natural Complex Ecosystems(SENCE)theory,this study proposes an analytical framework that integrates ecological security assessment,prediction,and zoning management.The Daqing River Basin,a typical river basin in the North China Plain,was selected as a case study.The results indicate that overall ecological security in the Daqing River Basin improved from a“Moderate”level to a“Relatively Safe”level between 2000 and 2020;however,spatial heterogeneity persisted,with higher ecological security in northwestern and eastern regions and lower ecological security in the central region.Approximately 62% of the Basin experienced an improvement in ecological security level,except in the major urban areas of Beijing,Tianjin,and Hebei,where ecological security deteriorated.From 2025 to 2040,the overall ecological security of the Daqing River Basin is expected to improve and remain at the“Relatively Safe”level.However,spatial heterogeneity will be further aggravated as the ecological security of major urban areas continues to deteriorate.Ecological security management zones and regulation strategies are proposed at the regional and county scales to emphasize integrated regulation for the entire basin and major urban areas.The proposed analytical framework provides valuable insights for advancing theoretical research on ecological security.The case study offers a practical reference for ecological security enhancement in river basins and other regions facing significant human-land conflicts.
文摘The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource sharing. The framework improves efficiency and scalability in IoT, exposes vulnerable subsystems and components as possible weak links to system compromise, and meets the requirements of a heterogeneous computing environment. Other features of the framework including efficient resource sharing, fault tolerance, and distributed storage support the Internet of Things. We discuss the design requirements and carry out the implementation of Proof of Concept and evaluation of our framework. Two underlying technologies: the actor model and the blockchain were used for the implementation. Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel. Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability. We conclude from the evaluations that the actor-based implementation has better scalability than the block-chain-based implementation. Also, the blockchain seems to be computationally more intensive than the actors and less suitable for IoT systems.
文摘Against the backdrop of intensifying global water scarcity,reclaimed water reuse has emerged as a critical strategy for ecological replenishment of landscape water bodies.However,its potential ecological risks remain underexplored.This study aims to establish a multidimensional ecological safety evaluation framework for reclaimed water replenishment systems and propose hierarchical risk prevention strategies.By integrating ecotoxicological assays(algae growth inhibition,Daphnia behavioral anomalies,zebrafish embryo toxicity),multimedia exposure modeling,and Monte Carlo probabilistic simulations,the risk contributions and spatial heterogeneity of typical pollutants are quantitatively analyzed.Results revealed that sulfamethoxazole(RQ=2.3)and diclofenac(RQ=1.8)posed high ecological risks,with their effects nonlinearly correlated with hydraulic retention time(HRT<3 days)and nutrient loading(TN>1.2 mg/L).A three-tier risk prevention system was developed based on the“source-pathway-receptor”framework:ozone-activated carbon pretreatment achieved 85%removal efficiency for pharmaceutical contaminants,ecological floating beds enhanced nitrogen and phosphorus retention by 40%-60%,and hydraulic regulation(flow velocity>0.1 m/s)effectively suppressed pathogen proliferation.The innovation of this study lies in establishing a chemical-biological-hydrological coupled risk quantification model for reclaimed water reuse scenarios.The hierarchical prevention standards have been incorporated into local reclaimed water management regulations,providing a scientific foundation and technical paradigm for sustainable landscape water replenishment.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Saudi Arabia under Grant No.(GPIP:71-829-2024).
文摘Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam.
文摘The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system.
基金The author Dr.Arshiya Sajid Ansari extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number(R-2025-1706).
文摘IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks.
文摘Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
文摘Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future.
基金supported in part by Jiangsu Province High Level“333”Program (0401206044)National Natural Science Foundation of China (61801243,62072255)+4 种基金Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology (JIT-B-202031)University Incubator Foundation of Jinling Institute of Technology (JIT-FHXM-202110)Open Project of Fujian Provincial Key Lab.of Network Security and Cryptology (NSCL-KF2021-02)Open Foundation of National Railway Intelligence Transportation System Engineering Tech.Research Center (RITS2021KF02)China Postdoctoral Science Foundation (2019M651914)。
文摘The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.
基金sponsored by the National Natural Science Foundation of China (Nos. 22106038, 22204171 and 22076038)the Henan Provincial Science and Technology Research Project (No. 232102310112)+2 种基金the China Postdoctoral Science Foundation (No. 2022M713299)Natural Science Foundation of Henan Province, China (No. 202300410044)Henan key scientific research programs to Universities and Colleges (No. 22ZX003)。
文摘A thickness-controllable method for preparing metal-organic framework hollow nanofiowers on magnetic cores(Fe_(3)O_(4)@MOFs HFs)was demonstrated for the first time.The petal of magnetic core with hollow nanofiower structure served as medium for assembling Ui O-66-NH_(2)shell with different thickness.To further improve its performance,Zr^(4+)was immobilized on the surface of Fe_(3)O_(4)@Ui O-66-NH_(2).Compared with conventional Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)nanospheres,the Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs showed increased enrichment performance for phosphopeptides.The Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs served as an attractive restricted-access adsorption material exhibited good selectivity(m_(β-casein):m_(BSA)=1:1000),high sensitivity(1.0 fmol)and excellent size-exclusion effect(m)((β-casein digests):m_(BSA)=1:200).Furthermore,the Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)HFs was successfully applied to the specific capture of ultratrace phosphopeptide from complex biological samples,revealing the great potential for the identification and analysis of trace phosphopeptides in clinical analysis.This work can be easily extended to the fabrication of diverse mag-MOF HFs with multifunctional and easy to post-modify properties,and open up a new avenue for the design and construction of new MOFs material.
文摘Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.
基金supported in part by the National Natural Science Foundation of China under Grants(62250410365,62071084)the Youth Program of Humanities and Social Sciences of the MoE(23YJCZH291)+1 种基金the Key Laboratory of Computing Power Network and Information Security,Ministry of Education(2023ZD02)Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/15/46.
文摘As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust access control mechanisms.The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control,which relies on trusted third parties and complex computations,resulting in intricate interactions,higher hardware costs,and processing delays.To address these issues,this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission.This method enhances data security and resource efficiency without imposing heavy computational and network burdens.In comparison to the best existing approach,it achieves a 7%improvement in accuracy,effectively addressing existing gaps in lightweight encryption and recognition performance.
基金supported by the Researchers Supporting Project number RSP2025R244,King Saud University,Riyadh,Saudi Arabia.
文摘This research presents an analysis of smart grid units to enhance connected units’security during data transmissions.The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring,data expansion,control association,throughput,and losses.In addition,all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks.Moreover,the quantitative analysis of the optimization algorithm is discussed concerning two case studies,thereby achieving early convergence at reduced complexities.The suggested method ensures that each communication unit has its own distinct channels,maximizing the possibility of accurate measurements.This results in the provision of only the original data values,hence enhancing security.Both power and line values are individually observed to establish control in smart grid-connected channels,even in the presence of adaptive settings.A comparison analysis is conducted to showcase the results,using simulation studies involving four scenarios and two case studies.The proposed method exhibits reduced complexity,resulting in a throughput gain of over 90%.
文摘Bridge networks are essential components of civil infrastructure,supporting communities by delivering vital services and facilitating economic activities.However,bridges are vulnerable to natural disasters,particularly earthquakes.To develop an effective disaster management strategy,it is critical to identify reliable,robust,and efficient indicators.In this regard,Life-Cycle Cost(LCC)and Resilience(R)serve as key indicators to assist decision-makers in selecting the most effective disaster risk reduction plans.This study proposes an innova-tive LCC-R optimization framework to identify the most optimal retrofit strategies for bridge networks facing hazardous events during their lifespan.The proposed framework employs both single-and multi-objective opti-mization techniques to identify retrofit strategies that maximize the R index while minimizing the LCC for the under-study bridge networks.The considered retrofit strategies include various options such as different mate-rials(steel,CFRP,and GFRP),thicknesses,arrangements,and timing of retrofitting actions.The first step in the proposed framework involves constructing fragility curves by performing a series of nonlinear time-history incre-mental dynamic analyses for each case.In the subsequent step,the seismic resilience surfaces are calculated using the obtained fragility curves and assuming a recovery function.Next,the LCC is evaluated according to the pro-posed formulation for multiple seismic occurrences,which incorporates the effects of complete and incomplete repair actions resulting from previous multiple seismic events.For optimization purposes,the Non-Dominated Sorting Genetic Algorithm II(NSGA-II)evolutionary algorithm efficiently identifies the Pareto front to represent the optimal set of solutions.The study presents the most effective retrofit strategies for an illustrative bridge network,providing a comprehensive discussion and insights into the resulting tactical approaches.The findings underscore that the methodologies employed lead to logical and actionable retrofit strategies,paving the way for enhanced resilience and cost-effectiveness in bridge network management against seismic hazards.
基金funded by Ongoing Research Funding Program(Grant OR-‐2025-749),King Saud University,Riyadh,Saudi Arabia.
文摘The evaluation and assessment of network security is a decision-making(DM)problem that occurs in an environment with multiple criteria,which have uncertainty,bipolarity,and extra-related information.The traditional approaches fail to address the need to acquire a wide range of information for the assessment,especially in situations where the criteria have both positive and negative aspects and contain extra fuzzy information.Therefore,in this manuscript,we aim to introduce a DM approach based on the concept of bipolar complex fuzzy(BCF)Yager aggregation operators(AOs).The related properties of these aggregation operators(AOs)are also discussed.Moreover,in this article,we diagnose the Yager operations in the setting of BCF.The basic idea of the interpreted operators and DM approach is to access the problem linked with the network security that is to evaluate and select the finest network security control and network security protocols for protecting and safeguarding the network of any organization or home(case studies).Finally,to exhibit the supremacy and success of the described theory,we examine them with the prevailing theories.