The therapeutic efficacy of traditional Chinese medicine has been widely acknowledged due to its extensive history of clinical effectiveness.However,the precise active components underlying each prescription remain in...The therapeutic efficacy of traditional Chinese medicine has been widely acknowledged due to its extensive history of clinical effectiveness.However,the precise active components underlying each prescription remain incompletely understood.Polysaccharides,as a major constituent of water decoctions—the most common preparation method for Chinese medicinals—may provide a crucial avenue for deepening our understanding of the efficacy principles of Chinese medicine and establishing a framework for its modern development.The structural complexity and diversity of Chinese herbal polysaccharides present significant challenges in their separation and analysis compared to small molecules.This paper aims to explore the potential of Chinese herbal polysaccharides efficiently by briefly summarizing recent advancements in polysaccharide chemical research,focusing on methods of acquisition,structure elucidation,and quality control.展开更多
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
OBJECTIVE:In recent years,the number of clinical research reports on acupuncture and manipulation for the treatment of greater occipital neuralgia has gradually increased,but the quality is uneven.There is currently n...OBJECTIVE:In recent years,the number of clinical research reports on acupuncture and manipulation for the treatment of greater occipital neuralgia has gradually increased,but the quality is uneven.There is currently no literature evaluating the quality of published reports,which is not conducive to the promotion of clinical use of these therapies.Therefore,this article assessed the reporting quality of randomized controlled trials on acupuncture and manipulation for greater occipital neuralgia.METHODS:Cochrane Library,PubMed,Web of Science,Embase,China National Knowledge Infrastructure(CNKI),VIP,WanFang Data,and Chinese BioMedical Literature Database(CBM)from inception to May 20,2024 were searched.The reporting quality of included randomized controlled trials was independently evaluated by two investigators using the CONSORT statement,STRICTA checklist,and Cochrane bias of risk assessment tool.A third investigator resolved any disagreement.RESULTS:A total of 62 articles were included.Based on the CONSORT statement,59.46%(22/37)of all entries had a reporting rate of less than 50%,mainly including“Identification as a randomized trial in the title(1/62,1.61%),”“How sample size was determined(7/62,11.29%),”“Implementation(1/62,1.61%),”“Blinding(1/62,1.61%),”and“Reports of Funding(4/62,6.45%).”According to the STRICTA checklist,29.41%(5/17)of all entries had a reporting rate of less than 50%,mainly including“Details of other interventions(7/58,12.07%),”“Setting and context of treatment(0/58,0%),”and“Description of participating acupuncturists(0/58,0%).”CONCLUSION:The reporting quality of randomized controlled trials on acupuncture and manipulation therapy for greater occipital neuralgia remains low.Future researchers need to make greater efforts to strictly adhere to the CONSORT statement and STRICTA checklist during trial design,implementation,and reporting.This will facilitate the standardization of research in this field and enhance the reliability and reproducibility of the research results.展开更多
The quality control chart of fructo-oligosaccharides in milk powder was established to determine whether the detection process and results are in control state.The content of fructo-oligosaccharides in milk powder con...The quality control chart of fructo-oligosaccharides in milk powder was established to determine whether the detection process and results are in control state.The content of fructo-oligosaccharides in milk powder control samples was determined by ion chromatography,and the quality control chart of fructo-oligosaccharides was established to analyze the controlled state.The results indicate that the median of the quality control chart is 1613.14 mg/100 g,and the standard deviation is 85.57 mg/100 g.The new quality control points were evaluated and analyzed,and the precision changed,but the mean value did not change.Further F test was conducted to determine that the precision did not change significantly,indicating that the test was in a statistical control state,and the detection process,method and results were controlled.展开更多
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem...Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.展开更多
High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support s...High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support stable and efficient transmission.The standard coupled congestion control algorithm in MPQUIC synchronizes these paths to manage congestion,meeting fairness requirements and improving transmission efficiency.However,current algorithms’Congestion Window(CWND)reduction approach significantly decreases CWND upon packet loss,which lowers effective throughput,regardless of the congestion origin.Furthermore,the uncoupled Slow-Start(SS)in MPQUIC leads to independent exponential CWND growth on each path,potentially causing buffer overflow.To address these issues,we propose the CC-OLIA,which incorporates Packet Loss Classifcation(PLC)and Coupled Slow-Start(CSS).The PLC distinguishes between congestion-induced and random packet losses,adjusting CWND reduction accordingly to maintain throughput.Concurrently,the CSS module coordinates CWND growth during the SS,preventing abrupt increases.Implementation on MININET shows that CC-OLIA not only maintains fair performance but also enhances transmission efficiency across diverse network conditions.展开更多
Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribut...Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources.展开更多
This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization(CCSO)technique.This approach mitigates the limitations of conventional Chicken Swarm Optimization(CS...This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization(CCSO)technique.This approach mitigates the limitations of conventional Chicken Swarm Optimization(CSO),especially in dealing with larger dimensions due to diversity loss during solution space exploration.Our experimentation involved 600 sample images encompassing facial,iris,and fingerprint data,collected from 200 students at Ladoke Akintola University of Technology(LAUTECH),Ogbomoso.The results demonstrate the remarkable effectiveness of CCSO,yielding accuracy rates of 90.42%,91.67%,and 91.25%within 54.77,27.35,and 113.92 s for facial,fingerprint,and iris biometrics,respectively.These outcomes significantly outperform those achieved by the conventional CSO technique,which produced accuracy rates of 82.92%,86.25%,and 84.58%at 92.57,63.96,and 163.94 s for the same biometric modalities.The study’s findings reveal that CCSO,through its integration of Cultural Algorithm(CA)Operators into CSO,not only enhances algorithm performance,exhibiting computational efficiency and superior accuracy,but also carries broader implications beyond biometric systems.This innovation offers practical benefits in terms of security enhancement,operational efficiency,and adaptability across diverse user populations,shaping more effective and resource-efficient access control systems with real-world applicability.展开更多
Objective:To evaluate the impact of subcutaneous tunneling on peripherally inserted central catheters(PICCs)dislodgement and malposition.Dislodged or malpositioned PICCs can lead to improper treatment.The subcutaneous...Objective:To evaluate the impact of subcutaneous tunneling on peripherally inserted central catheters(PICCs)dislodgement and malposition.Dislodged or malpositioned PICCs can lead to improper treatment.The subcutaneous tunneling strategy may be effective,but there is insufficient evidence,and proximal movement has not been explored.Methods:We randomized 630 patients who needed PICCs placement to either the tunneled PICCs(experimental group)or the non-tunneled PICCs(control group).Dislodgement and malposition of the catheter were the primary outcomes,and catheter-related infection(CRI)and catheter-related thrombosis(CRT)were the secondary outcomes.Results:Subcutaneous tunneling does not significantly reduce distal catheter movement,but it significantly reduces proximal catheter movement(4.3%vs.9.9%,P=0.007),which may explain the lower incidence of CRI(2.0%vs.5.3%,P=0.030)and CRT(3.6%vs.12.5%,P<0.001).Conclusions:Although subcutaneous tunneling does not significantly improve catheter prolapse,it should still be used clinically because proximal catheter movement can be a more serious problem associated with CRI and CRT.展开更多
Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the applicatio...Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications.展开更多
In this paper,based on the SVIQR model we develop a stochastic epidemic model with multiple vaccinations and time delay.Firstly,we prove the existence and uniqueness of the global positive solution of the model,and co...In this paper,based on the SVIQR model we develop a stochastic epidemic model with multiple vaccinations and time delay.Firstly,we prove the existence and uniqueness of the global positive solution of the model,and construct suitable functions to obtain sufficient conditions for disease extinction.Secondly,in order to effectively control the spread of the disease,appropriate control strategies are formulated by using optimal control theory.Finally,the results are verified by numerical simulation.展开更多
Congestion control is an inherent challenge of V2X(Vehicle to Everything)technologies.Due to the use of a broadcasting mechanism,channel congestion becomes severe with the increase in vehicle density.The researchers s...Congestion control is an inherent challenge of V2X(Vehicle to Everything)technologies.Due to the use of a broadcasting mechanism,channel congestion becomes severe with the increase in vehicle density.The researchers suggested reducing the frequency of packet dissemination to relieve congestion,which caused a rise in road driving risk.Obviously,high-risk vehicles should be able to send messages timely to alarm surrounding vehicles.Therefore,packet dissemination frequency should be set according to the corresponding vehicle’s risk level,which is hard to evaluate.In this paper,a two-stage fuzzy inference model is constructed to evaluate a vehicle’s risk level,while a congestion control algorithm DRG-DCC(Driving Risk Game-Distributed Congestion Control)is proposed.Moreover,HPSO is employed to find optimal solutions.The simulation results show that the proposed method adjusts the transmission frequency based on driving risk,effectively striking a balance between transmission delay and channel busy rate.展开更多
Objectives:College students face increasing mental health challenges.Although Acceptance and CommitmentTherapy(ACT)is effective,the efficacy of Internet-based ACT(iACT)needs further exploration.Methods:This study exam...Objectives:College students face increasing mental health challenges.Although Acceptance and CommitmentTherapy(ACT)is effective,the efficacy of Internet-based ACT(iACT)needs further exploration.Methods:This study examines the efficacy of iACT on college students’mental health through a randomized controlled trial.We recruited 90 college students(19.16±1.02 years old)and randomly divided them into the iACT group,face-to-face ACT group,and control group.The effects of the interventions were evaluated using the comprehensive assessment of ACT processes(CompACT)and the Depression Anxiety Stress Scales(DASS-21).Results:Two-factor repeated measures ANOVA revealed a significant time main effect of iACT.Face-to-face ACT and iACT effectively improved college students’psychological flexibility[F(2,83)=18.78,p<0.001,η^(2)=0.18]and alleviated their negative emotions[F(2,82)=41.17,p<0.001,η^(2)=0.36].Face-to-face ACT exhibited sustained effects on improving participants’psychological flexibility and alleviating their negative emotions(p<0.001),while iACT showed no sustained effect on improving participants’psychological flexibility(p>0.05).Conclusion:While iACT and face-to-face ACT are effective shortterm interventions,face-to-face ACT demonstrates superior sustainability.Integrating guided sessions into iACT may enhance long-term outcomes.These findings advocate for blended interventions to address college students’mental health needs,particularly in resource-limited settings.展开更多
Variable Cycle Engine(VCE)serves as the core system in achieving future advanced fighters with cross-generational performance and mission versatility.However,the resultant complex configuration and strong coupling of ...Variable Cycle Engine(VCE)serves as the core system in achieving future advanced fighters with cross-generational performance and mission versatility.However,the resultant complex configuration and strong coupling of control parameters present significant challenges in designing acceleration and deceleration control schedules.To thoroughly explore the performance potential of engine,a global integration design method for acceleration and deceleration control schedule based on inner and outer loop optimization is proposed.The outer loop optimization module employs Integrated Surrogate-Assisted Co-Differential Evolutionary(ISACDE)algorithm to optimize the variable geometry adjustment laws based on B-spline curve,and the inner loop optimization module adopts the fixed-state method to design the open-loop fuel–air ratio control schedules,which are aimed at minimizing the acceleration and deceleration time under multiple constraints.Simulation results demonstrate that the proposed global integration design method not only furthest shortens the acceleration and deceleration time,but also effectively safeguards the engine from overlimit.展开更多
The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms r...The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments.展开更多
CO_(2)-responsive gels,which swell upon contact with CO_(2),are widely used for profile control to plug high-permeability gas flow channels in carbon capture,utilization,and storage(CCUS)applications in oil reser-voir...CO_(2)-responsive gels,which swell upon contact with CO_(2),are widely used for profile control to plug high-permeability gas flow channels in carbon capture,utilization,and storage(CCUS)applications in oil reser-voirs.However,the use of these gels in high-temperature CCUS applications is limited due to their rever-sible swelling behavior at elevated temperatures.In this study,a novel dispersed particle gel(DPG)suspension is developed for high-temperature profile control in CCUS applications.First,we synthesize a double-network hydrogel consisting of a crosslinked polyacrylamide(PAAm)network and a crosslinked sodium alginate(SA)network.The hydrogel is then sheared in water to form a pre-prepared DPG suspen-sion.To enhance its performance,the gel particles are modified by introducing potassium methylsilan-etriolate(PMS)upon CO_(2) exposure.Comparing the particle size distributions of the modified and pre-prepared DPG suspension reveals a significant swelling of gel particles,over twice their original size.Moreover,subjecting the new DPG suspension to a 100℃ environment for 24 h demonstrates that its gel particle sizes do not decrease,confirming irreversible swelling,which is a significant advantage over the traditional CO_(2)-responsive gels.Thermogravimetric analysis further indicates improved thermal sta-bility compared to the pre-prepared DPG particles.Core flooding experiments show that the new DPG suspension achieves a high plugging efficiency of 95.3%in plugging an ultra-high permeability sandpack,whereas the pre-prepared DPG suspension achieves only 82.8%.With its high swelling ratio,irreversible swelling at high temperatures,enhanced thermal stability,and superior plugging performance,the newly developed DPG suspension in this work presents a highly promising solution for profile control in high-temperature CCUS applications.展开更多
基金supported by the Science and Technology Development Fund,Macao SAR (Nos.0075/2022/A and028/2022/ITP)the Zhuhai Science and Technology Plan Project in the Social Development Field (No.2220004000117)the University of Macao (Nos.MYRG-GRG2023-00082-ICMS-UMDF/CPG2024-00011-ICMS)。
文摘The therapeutic efficacy of traditional Chinese medicine has been widely acknowledged due to its extensive history of clinical effectiveness.However,the precise active components underlying each prescription remain incompletely understood.Polysaccharides,as a major constituent of water decoctions—the most common preparation method for Chinese medicinals—may provide a crucial avenue for deepening our understanding of the efficacy principles of Chinese medicine and establishing a framework for its modern development.The structural complexity and diversity of Chinese herbal polysaccharides present significant challenges in their separation and analysis compared to small molecules.This paper aims to explore the potential of Chinese herbal polysaccharides efficiently by briefly summarizing recent advancements in polysaccharide chemical research,focusing on methods of acquisition,structure elucidation,and quality control.
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.
文摘OBJECTIVE:In recent years,the number of clinical research reports on acupuncture and manipulation for the treatment of greater occipital neuralgia has gradually increased,but the quality is uneven.There is currently no literature evaluating the quality of published reports,which is not conducive to the promotion of clinical use of these therapies.Therefore,this article assessed the reporting quality of randomized controlled trials on acupuncture and manipulation for greater occipital neuralgia.METHODS:Cochrane Library,PubMed,Web of Science,Embase,China National Knowledge Infrastructure(CNKI),VIP,WanFang Data,and Chinese BioMedical Literature Database(CBM)from inception to May 20,2024 were searched.The reporting quality of included randomized controlled trials was independently evaluated by two investigators using the CONSORT statement,STRICTA checklist,and Cochrane bias of risk assessment tool.A third investigator resolved any disagreement.RESULTS:A total of 62 articles were included.Based on the CONSORT statement,59.46%(22/37)of all entries had a reporting rate of less than 50%,mainly including“Identification as a randomized trial in the title(1/62,1.61%),”“How sample size was determined(7/62,11.29%),”“Implementation(1/62,1.61%),”“Blinding(1/62,1.61%),”and“Reports of Funding(4/62,6.45%).”According to the STRICTA checklist,29.41%(5/17)of all entries had a reporting rate of less than 50%,mainly including“Details of other interventions(7/58,12.07%),”“Setting and context of treatment(0/58,0%),”and“Description of participating acupuncturists(0/58,0%).”CONCLUSION:The reporting quality of randomized controlled trials on acupuncture and manipulation therapy for greater occipital neuralgia remains low.Future researchers need to make greater efforts to strictly adhere to the CONSORT statement and STRICTA checklist during trial design,implementation,and reporting.This will facilitate the standardization of research in this field and enhance the reliability and reproducibility of the research results.
基金Supported by the Inner Mongolia Autonomous Region's Key Research and Achievement Transformation plan (2023YFHH0093).
文摘The quality control chart of fructo-oligosaccharides in milk powder was established to determine whether the detection process and results are in control state.The content of fructo-oligosaccharides in milk powder control samples was determined by ion chromatography,and the quality control chart of fructo-oligosaccharides was established to analyze the controlled state.The results indicate that the median of the quality control chart is 1613.14 mg/100 g,and the standard deviation is 85.57 mg/100 g.The new quality control points were evaluated and analyzed,and the precision changed,but the mean value did not change.Further F test was conducted to determine that the precision did not change significantly,indicating that the test was in a statistical control state,and the detection process,method and results were controlled.
基金supported in part by the National Key R&D Program of China(Grant No.2019YFB2101700)the National Natural Science Foundation of China(Grant No.62272102,No.62172320,No.U21A20466)+4 种基金the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(Grant No.ZCL21015)the Qinghai Key R&D and Transformation Projects(Grant No.2021-GX-112)the Natural Science Foundation of Nanjing University of Posts and Telecommunications(Grant No.NY222141)the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant(No.22KJB520029)Henan Key Laboratory of Network Cryptography Technology(No.LNCT2022-A10)。
文摘Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
文摘High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support stable and efficient transmission.The standard coupled congestion control algorithm in MPQUIC synchronizes these paths to manage congestion,meeting fairness requirements and improving transmission efficiency.However,current algorithms’Congestion Window(CWND)reduction approach significantly decreases CWND upon packet loss,which lowers effective throughput,regardless of the congestion origin.Furthermore,the uncoupled Slow-Start(SS)in MPQUIC leads to independent exponential CWND growth on each path,potentially causing buffer overflow.To address these issues,we propose the CC-OLIA,which incorporates Packet Loss Classifcation(PLC)and Coupled Slow-Start(CSS).The PLC distinguishes between congestion-induced and random packet losses,adjusting CWND reduction accordingly to maintain throughput.Concurrently,the CSS module coordinates CWND growth during the SS,preventing abrupt increases.Implementation on MININET shows that CC-OLIA not only maintains fair performance but also enhances transmission efficiency across diverse network conditions.
基金supported by National Natural Science Foundation of China(No.62102449).
文摘Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources.
基金supported by Ladoke Akintola University of Technology,Ogbomoso,Nigeria and the University of Zululand,South Africa.
文摘This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization(CCSO)technique.This approach mitigates the limitations of conventional Chicken Swarm Optimization(CSO),especially in dealing with larger dimensions due to diversity loss during solution space exploration.Our experimentation involved 600 sample images encompassing facial,iris,and fingerprint data,collected from 200 students at Ladoke Akintola University of Technology(LAUTECH),Ogbomoso.The results demonstrate the remarkable effectiveness of CCSO,yielding accuracy rates of 90.42%,91.67%,and 91.25%within 54.77,27.35,and 113.92 s for facial,fingerprint,and iris biometrics,respectively.These outcomes significantly outperform those achieved by the conventional CSO technique,which produced accuracy rates of 82.92%,86.25%,and 84.58%at 92.57,63.96,and 163.94 s for the same biometric modalities.The study’s findings reveal that CCSO,through its integration of Cultural Algorithm(CA)Operators into CSO,not only enhances algorithm performance,exhibiting computational efficiency and superior accuracy,but also carries broader implications beyond biometric systems.This innovation offers practical benefits in terms of security enhancement,operational efficiency,and adaptability across diverse user populations,shaping more effective and resource-efficient access control systems with real-world applicability.
文摘Objective:To evaluate the impact of subcutaneous tunneling on peripherally inserted central catheters(PICCs)dislodgement and malposition.Dislodged or malpositioned PICCs can lead to improper treatment.The subcutaneous tunneling strategy may be effective,but there is insufficient evidence,and proximal movement has not been explored.Methods:We randomized 630 patients who needed PICCs placement to either the tunneled PICCs(experimental group)or the non-tunneled PICCs(control group).Dislodgement and malposition of the catheter were the primary outcomes,and catheter-related infection(CRI)and catheter-related thrombosis(CRT)were the secondary outcomes.Results:Subcutaneous tunneling does not significantly reduce distal catheter movement,but it significantly reduces proximal catheter movement(4.3%vs.9.9%,P=0.007),which may explain the lower incidence of CRI(2.0%vs.5.3%,P=0.030)and CRT(3.6%vs.12.5%,P<0.001).Conclusions:Although subcutaneous tunneling does not significantly improve catheter prolapse,it should still be used clinically because proximal catheter movement can be a more serious problem associated with CRI and CRT.
文摘Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications.
基金supported by the Fundamental Research Funds for the Central Universities(No.3122025090)。
文摘In this paper,based on the SVIQR model we develop a stochastic epidemic model with multiple vaccinations and time delay.Firstly,we prove the existence and uniqueness of the global positive solution of the model,and construct suitable functions to obtain sufficient conditions for disease extinction.Secondly,in order to effectively control the spread of the disease,appropriate control strategies are formulated by using optimal control theory.Finally,the results are verified by numerical simulation.
基金supported by the special key project of Chongqing Technology Innovation and Application Development under Grant No.cstc2021jscx-gksbX0057the Special Major Project of Chongqing Technology Innovation and Application Development under Grant No.CSTB2022TIADSTX0003.
文摘Congestion control is an inherent challenge of V2X(Vehicle to Everything)technologies.Due to the use of a broadcasting mechanism,channel congestion becomes severe with the increase in vehicle density.The researchers suggested reducing the frequency of packet dissemination to relieve congestion,which caused a rise in road driving risk.Obviously,high-risk vehicles should be able to send messages timely to alarm surrounding vehicles.Therefore,packet dissemination frequency should be set according to the corresponding vehicle’s risk level,which is hard to evaluate.In this paper,a two-stage fuzzy inference model is constructed to evaluate a vehicle’s risk level,while a congestion control algorithm DRG-DCC(Driving Risk Game-Distributed Congestion Control)is proposed.Moreover,HPSO is employed to find optimal solutions.The simulation results show that the proposed method adjusts the transmission frequency based on driving risk,effectively striking a balance between transmission delay and channel busy rate.
基金funded by the Education and Teaching Reform Research Major Project of Anhui Province(2022xqhz023)(2023sx170).
文摘Objectives:College students face increasing mental health challenges.Although Acceptance and CommitmentTherapy(ACT)is effective,the efficacy of Internet-based ACT(iACT)needs further exploration.Methods:This study examines the efficacy of iACT on college students’mental health through a randomized controlled trial.We recruited 90 college students(19.16±1.02 years old)and randomly divided them into the iACT group,face-to-face ACT group,and control group.The effects of the interventions were evaluated using the comprehensive assessment of ACT processes(CompACT)and the Depression Anxiety Stress Scales(DASS-21).Results:Two-factor repeated measures ANOVA revealed a significant time main effect of iACT.Face-to-face ACT and iACT effectively improved college students’psychological flexibility[F(2,83)=18.78,p<0.001,η^(2)=0.18]and alleviated their negative emotions[F(2,82)=41.17,p<0.001,η^(2)=0.36].Face-to-face ACT exhibited sustained effects on improving participants’psychological flexibility and alleviating their negative emotions(p<0.001),while iACT showed no sustained effect on improving participants’psychological flexibility(p>0.05).Conclusion:While iACT and face-to-face ACT are effective shortterm interventions,face-to-face ACT demonstrates superior sustainability.Integrating guided sessions into iACT may enhance long-term outcomes.These findings advocate for blended interventions to address college students’mental health needs,particularly in resource-limited settings.
基金supported by the Basic Research on Dynamic Real-time Modeling and Onboard Adaptive Modeling of Aero Engine,China(No.QZPY202308)。
文摘Variable Cycle Engine(VCE)serves as the core system in achieving future advanced fighters with cross-generational performance and mission versatility.However,the resultant complex configuration and strong coupling of control parameters present significant challenges in designing acceleration and deceleration control schedules.To thoroughly explore the performance potential of engine,a global integration design method for acceleration and deceleration control schedule based on inner and outer loop optimization is proposed.The outer loop optimization module employs Integrated Surrogate-Assisted Co-Differential Evolutionary(ISACDE)algorithm to optimize the variable geometry adjustment laws based on B-spline curve,and the inner loop optimization module adopts the fixed-state method to design the open-loop fuel–air ratio control schedules,which are aimed at minimizing the acceleration and deceleration time under multiple constraints.Simulation results demonstrate that the proposed global integration design method not only furthest shortens the acceleration and deceleration time,but also effectively safeguards the engine from overlimit.
文摘The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments.
基金Lin Du acknowledges the financial support provided by China Scholarship Council(CSC)via a Ph.D.Scholarship(202008510128)supported by Core Technology Project of China National Petroleum Corporation(CNPC)"Research on Thermal Miscible Flooding Technology"(2023ZG18)。
文摘CO_(2)-responsive gels,which swell upon contact with CO_(2),are widely used for profile control to plug high-permeability gas flow channels in carbon capture,utilization,and storage(CCUS)applications in oil reser-voirs.However,the use of these gels in high-temperature CCUS applications is limited due to their rever-sible swelling behavior at elevated temperatures.In this study,a novel dispersed particle gel(DPG)suspension is developed for high-temperature profile control in CCUS applications.First,we synthesize a double-network hydrogel consisting of a crosslinked polyacrylamide(PAAm)network and a crosslinked sodium alginate(SA)network.The hydrogel is then sheared in water to form a pre-prepared DPG suspen-sion.To enhance its performance,the gel particles are modified by introducing potassium methylsilan-etriolate(PMS)upon CO_(2) exposure.Comparing the particle size distributions of the modified and pre-prepared DPG suspension reveals a significant swelling of gel particles,over twice their original size.Moreover,subjecting the new DPG suspension to a 100℃ environment for 24 h demonstrates that its gel particle sizes do not decrease,confirming irreversible swelling,which is a significant advantage over the traditional CO_(2)-responsive gels.Thermogravimetric analysis further indicates improved thermal sta-bility compared to the pre-prepared DPG particles.Core flooding experiments show that the new DPG suspension achieves a high plugging efficiency of 95.3%in plugging an ultra-high permeability sandpack,whereas the pre-prepared DPG suspension achieves only 82.8%.With its high swelling ratio,irreversible swelling at high temperatures,enhanced thermal stability,and superior plugging performance,the newly developed DPG suspension in this work presents a highly promising solution for profile control in high-temperature CCUS applications.