期刊文献+
共找到239篇文章
< 1 2 12 >
每页显示 20 50 100
Security Rate Optimization of D2D Communication Based on Power Control 被引量:2
1
作者 王珍 李莉 +1 位作者 龚帅 叶鹏 《Journal of Donghua University(English Edition)》 EI CAS 2017年第5期624-629,共6页
An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the c... An optimization of device-to-device(D2D) security rate algorithm based on power control is provided to enhance the physical layer security underlaying D2D communication and guarantee the data rate requirement of the cellular user(CU) at the same time.First,a scenario model is set up,in which an eavesdropper is considered to wiretap the information of D2D transmitters.Then,a secure region of D2D communication is proposed.When D2D communication users reside outside the secure region,the spectrum of CU's is not allowed to share with the D2D communication so as to avoid eavesdropper tapping useful information of D2D communication.When D2D communication users reside inside the secure region,the security rate of D2D is maximized by optimization of the transmitting power of D2D and CU.The simulation results showthat the achieved D2D security rate of the proposed algorithm increases 2.8 bps/Hz when the signal to noise ratio(SNR) is 15 d B,compared with that when the random access algorithm is used. 展开更多
关键词 device-to-device(D2D) security rate secure region power control
在线阅读 下载PDF
A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System 被引量:5
2
作者 GUO Fangfang HU Yibing +2 位作者 XIU Longting FENG Guangsheng WANG Shuaishuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期126-132,共7页
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po... A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively. 展开更多
关键词 distributed security behavior monitoring peer-to- peer (P2P) data fusion DS evidence theory PSO algorithm
原文传递
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
3
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
在线阅读 下载PDF
Navigating the Blockchain Trilemma:A Review of Recent Advances and Emerging Solutions in Decentralization,Security,and Scalability Optimization
4
作者 Saha Reno Koushik Roy 《Computers, Materials & Continua》 2025年第8期2061-2119,共59页
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl... The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures. 展开更多
关键词 Blockchain trilemma SCALABILITY DECENTRALIZATION security consensus algorithms sharding layer-2 solutions DAG-based architectures cross-chain interoperability blockchain optimization
在线阅读 下载PDF
Sustainable development at the crossroads: Geopolitical risks, natural resource scarcity, and renewable energy in energy security transitions
5
作者 Jinjun Zhang Xiao-feng Liu 《Geoscience Frontiers》 2025年第5期485-498,共14页
Energy security is a crucial aspect of modern societies,as it directly impacts the availability,accessibility,and reliability of energy sources.The reliance on natural resources and geopolitical factors in shaping ene... Energy security is a crucial aspect of modern societies,as it directly impacts the availability,accessibility,and reliability of energy sources.The reliance on natural resources and geopolitical factors in shaping energy security has gained significant attention in recent years.Natural resources and geopolitical risk are examined in 38 countries at risk of geopolitical conflict between 1990 and 2021 by examining CO_(2) emissions,renewable energy consumption,and foreign direct investment as controlling variables.The long-run analysis conducted in this study focused on slope heterogeneity,Westerlund cointegration,and dynamic panel data estimation.The findings indicated that the energy security index is positively associated with various determinants,including natural resources,geopolitical risk,CO_(2) emissions,and renewable energy consumption.However,foreign direct investment was found to be negatively associated with the energy security index among the selected 38 geopolitical risk countries.The role of natural resources and geopolitical risk in energy security cannot be overlooked.Natural resources provide the raw materials for generating electricity and powering our societies,while geopolitical risks can disrupt energy supply chains and threaten stability.Achieving sustainable energy security requires a comprehensive approach that addresses both aspects of energy provision.Transitioning to renewable energy sources,improving energy efficiency,diversifying energy supplies,promoting international cooperation,and conserving natural resources are essential steps towards a more sustainable and resilient energy future. 展开更多
关键词 Energy security risk Natural resource management Renewable energy transition CO_(2)emissions Sustainable investment Resource-dependent economies
在线阅读 下载PDF
Designing a Security Architecture for a P2P Video Conference System
6
作者 Hartmut Koeni 《China Communications》 SCIE CSCD 2008年第2期49-58,共10页
More and more modern group oriented collaborativeapplications use the peer-to-peer(P2P)paradigm tobe independent of expensive infrastructures as theyare,for instance,provided for audio and video conferencesby H.323 sy... More and more modern group oriented collaborativeapplications use the peer-to-peer(P2P)paradigm tobe independent of expensive infrastructures as theyare,for instance,provided for audio and video conferencesby H.323 systems.Decentralized collaborativeP2P solutions require appropriate mechanismsto protect group privacy and data integrity.A centralizedclient/server based video conference system canbe well shielded in a standard manner,whilst thereare no off-the-shelf approaches to secure a P2P videoconference up to now.The paper addresses this issueand presents a flexible security architecture.Usingthe BRAVIS system[4]as an example it shows howthe architecture can be embedded into a P2P videoconferencing system. 展开更多
关键词 PEER-TO-PEER (P2P) security architecture VIDEO CONFERENCE
在线阅读 下载PDF
A Novel Approach to Improve the Security of P2P File-Sharing Systems
7
作者 Cuihua ZUO Ruixuan LI Zhengding LU 《International Journal of Communications, Network and System Sciences》 2009年第3期229-236,共8页
The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an impor-ta... The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an impor-tant research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the nature of trust, fuzzy, complex and dynamic, which results in low efficiency in resisting the attacks of malicious nodes. In this paper, a new trust model named NatureTrust that can alleviate the shortage brought by the nature of trust is proposed. In order to cope with the fuzzy characteristic of trust, linguistic terms are used to express trust. Additionally, fuzzy inference rules are employed to evaluate trust of each transaction so as to handle the complex characteristic of trust. Fur-thermore, risk factor is deployed into NatureTrust to represent and reason with the dynamic characteristic of trust. Both risk and trust factors are considered in evaluating the trustworthiness of each peer. Experimental results show that the trust model analyzed here thus stands against malicious act effectively. 展开更多
关键词 PEER-TO-PEER (P2P) FILE-SHARING security RISK TRUST Model Fuzzy INFERENCE
在线阅读 下载PDF
一种IND-CCA2完全匿名的短群签名 被引量:4
8
作者 张跃宇 陈杰 +1 位作者 苏万力 王育民 《计算机学报》 EI CSCD 北大核心 2007年第10期1865-1871,共7页
基于线性假设下的Cramer-Shoup加密方案和SDH假设,提出一种新的SDH问题的零知识证明协议,并基于此协议构造了一种在Bellare-Micciancio-Warinshi模型下可证明安全的短群签名方案.该方案具有IND-CCA2完全匿名性,允许攻击者在攻击完全匿... 基于线性假设下的Cramer-Shoup加密方案和SDH假设,提出一种新的SDH问题的零知识证明协议,并基于此协议构造了一种在Bellare-Micciancio-Warinshi模型下可证明安全的短群签名方案.该方案具有IND-CCA2完全匿名性,允许攻击者在攻击完全匿名性时提问打开预言机.签名的长度仅为1704bits. 展开更多
关键词 群签名 完全匿名性 线性Cramer-Shoup加密 ind-cca2安全 判定线性假设
在线阅读 下载PDF
Secure Beamforming Design for SWIPT in Cooperative D2D Communications 被引量:5
9
作者 Li Jiang Cheng Qin +1 位作者 Xixi Zhang Hui Tian 《China Communications》 SCIE CSCD 2017年第1期20-33,共14页
In device-to-device(D2D) communications, device terminal relaying makes it possible for devices in a network to function as transmission relays for each other to enhance the spectral efficiency. In this paper we consi... In device-to-device(D2D) communications, device terminal relaying makes it possible for devices in a network to function as transmission relays for each other to enhance the spectral efficiency. In this paper we consider a cooperative D2D communication system with simultaneous wireless information and power transfer(SWIPT). The cooperative D2D communication scheme allows two nearby devices to communicate with each other in the licensed cellular bandwidth by assigning D2D transmitters as half-duplex(HD) relay to assists cellular downlink transmissions. In particular, we focus on secure information transmission for the cellular users when the idle D2D users are the potential eavesdroppers. We aim to design secure beamforming schemes to maximize the D2D users data rate while guaranteeing the secrecy rate requirements of the cellular users and the minimum required amounts of power transferred to the idle D2D users. To solve this non-convex problem, a semi-definite programming relaxation(SDR) approach is adopted to obtain the optimal solution. Furthermore, we propose two suboptimal secure beamforming schemes with low computational complexity for providing secure communication and efficient energy transfer. Simulation results demonstrate the superiority of our proposed scheme. 展开更多
关键词 device-to-device(D2D) communications half-duplex relaying physical layer security secure beamforming simultaneous wireless information and power transfer
在线阅读 下载PDF
Fighting COVID-19 and Future Pandemics With the Internet of Things:Security and Privacy Perspectives 被引量:3
10
作者 Mohamed Amine Ferrag Lei Shu Kim-Kwang Raymond Choo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第9期1477-1499,共23页
The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2;also referred to as novel Coronavirus 2019 and COVID-19)have resulted in a global pandemic,with significant health,f... The speed and pace of the transmission of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2;also referred to as novel Coronavirus 2019 and COVID-19)have resulted in a global pandemic,with significant health,financial,political,and other implications.There have been various attempts to manage COVID-19 and other pandemics using technologies such as Internet of Things(IoT)and 5G/6G communications.However,we also need to ensure that IoT devices used to facilitate COVID-19 monitoring and treatment(e.g.,medical IoT devices)are secured,as the compromise of such devices can have significant consequences(e.g.,life-threatening risks to COVID-19 patients).Hence,in this paper we comprehensively survey existing IoT-related solutions,potential security and privacy risks and their requirements.For example,we classify existing security and privacy solutions into five categories,namely:authentication and access control solutions,key management and cryptography solutions,blockchain-based solutions,intrusion detection systems,and privacy-preserving solutions.In each category,we identify the associated challenges.We also identify a number of recommendations to inform future research. 展开更多
关键词 Blockchain COVID-19 healthcare PRIVACY SARS-CoV-2 security
在线阅读 下载PDF
基于Spring Security安全框架的联通资源管理系统安全分析
11
作者 董一璠 李宝林 何先波 《电子设计工程》 2013年第8期61-64,共4页
基于为联通资源管系统提供一个方便可靠的安全框架的目的,采用"面向切面编程"(AOP)的Spring Security安全框架,结合了Spring框架提供的"控制反转"技术,最终创建了一个功能强大、安全可靠的权限控制安全框架。
关键词 软件工程 J2EE SPRING security 过滤器 B S
在线阅读 下载PDF
达格列净联合胰岛素强化治疗在老年初诊2型糖尿病患者中的应用效果及安全性
12
作者 马竹仙 周红坚 《中国药物经济学》 2025年第8期86-89,共4页
目的探讨达格列净联合胰岛素强化治疗在老年初诊2型糖尿病(TD2M)患者中的应用效果及安全性。方法选取2022年1月至2023年12月玉溪市人民医院收治的老年初诊TD2M患者,按随机数字表法分为对照组与观察组,各50例。对照组予以胰岛素强化治疗... 目的探讨达格列净联合胰岛素强化治疗在老年初诊2型糖尿病(TD2M)患者中的应用效果及安全性。方法选取2022年1月至2023年12月玉溪市人民医院收治的老年初诊TD2M患者,按随机数字表法分为对照组与观察组,各50例。对照组予以胰岛素强化治疗,观察组在对照组基础上联合达格列净治疗。比较两组患者血糖水平、血糖波动、胰岛β细胞功能及不良反应发生情况。结果治疗后观察组糖化血红蛋白(HbA1c)、餐后2 h血糖(2hPBG)、空腹血糖(FPG)水平低于对照组,差异有统计学意义(P<0.05);观察组治疗后平均血糖(MBG)、最大血糖波动幅度(LAGE)、血糖标准差(SDBC)、平均血糖波动幅度(MAGE)水平低于对照组,差异有统计学意义(P<0.05);治疗后观察组胰岛素抵抗指数(HOMA-IR)水平较对照组低,空腹胰岛素(FINS)及胰岛β细胞功能指数(HOMA-β)水平较对照组高,差异有统计学意义(P<0.05);两组不良反应发生率比较差异无统计学意义(P>0.05)。结论予以老年初诊TD2M患者达格列净+胰岛素强化治疗,能够有效改善血糖水平,降低血糖波动,改善胰岛β细胞功能,且具有较好的应用安全性。 展开更多
关键词 初诊2型糖尿病 达格列净 胰岛素强化治疗 血糖水平 应用安全性 血糖波动
原文传递
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things 被引量:1
13
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
在线阅读 下载PDF
点阵CO_(2)激光联合短波治疗仪导入rb-bFGF修复痤疮凹陷性瘢痕的临床观察
14
作者 任晓萍 杨蓉娅 +3 位作者 解佳璐 庞亚妮 周丽媛 张纯 《中国美容医学》 2025年第10期108-112,共5页
目的:探讨点阵CO_(2)激光联合短波治疗仪导入重组牛碱性成纤维细胞生长因子(Recombinant bovine basic fibroblast growth factor,rb-bFGF)凝胶修复痤疮凹陷性瘢痕的美学效果及安全性。方法:纳入2023年1月-2024年1月就诊于笔者医院的13... 目的:探讨点阵CO_(2)激光联合短波治疗仪导入重组牛碱性成纤维细胞生长因子(Recombinant bovine basic fibroblast growth factor,rb-bFGF)凝胶修复痤疮凹陷性瘢痕的美学效果及安全性。方法:纳入2023年1月-2024年1月就诊于笔者医院的134例痤疮凹陷性瘢痕患者,根据随机数字表法将其分为对照组和观察组,各67例;对照组接受点阵CO_(2)激光治疗,观察组接受点阵CO_(2)激光联合短波治疗仪导入rb-bFGF凝胶治疗。比较两组临床疗效、皮肤生理指标、美学效果评分及不良事件。结果:观察组临床疗效率(94.03%)显著高于对照组(76.12%)(P<0.05)。在调整治疗前各皮肤生理指标后,观察组治疗后经皮水分丢失量(Transdermal water loss,TEWL)、蛋白质含量均低于对照组,皮肤角质层含水量(Water content of cuticle of skin,WCSC)高于对照组(P<0.05)。在调整治疗前美观评分量表各条目后,观察组治疗后舒适度、心理影响、社交影响、自我观感、可接受性、色素沉着、柔软度、平整度和瑕疵范围得分均高于对照组(P<0.05)。两组痤疮凹陷性瘢痕患者水肿、红斑、色素沉着等不良事件发生率比较,差异无统计学意义(11.94%vs.5.97%,P>0.05)。结论:点阵CO_(2)激光联合短波治疗仪导入rb-bFGF用于痤疮凹陷性瘢痕患者的临床疗效确切,可改善皮肤生理指标,显著提升美学效果,且安全性良好。 展开更多
关键词 点阵CO_(2)激光 修复 重组牛碱性成纤维细胞生长因子(rb-bFGF) 痤疮凹陷性瘢痕 美学 安全性 短波治疗
暂未订购
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
15
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access Communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
四川盆地卧龙河气田CO_(2)-EGR先导试验新进展 被引量:1
16
作者 何新兴 甘笑非 +5 位作者 杨长城 金亦秋 赵梓寒 曹成 张烈辉 赵玉龙 《天然气工业》 北大核心 2025年第9期19-32,I0001,共15页
CO_(2)-EGR技术对于高效开发天然气和减缓温室效应具有重要的战略和现实意义,但当前中国的CO_(2)-EGR工程实践仍处于探索阶段,尚需进行大量研究以支撑先导试验的开展。为此,系统梳理了国内外CO_(2)-EGR技术取得的认识与进展,结合四川盆... CO_(2)-EGR技术对于高效开发天然气和减缓温室效应具有重要的战略和现实意义,但当前中国的CO_(2)-EGR工程实践仍处于探索阶段,尚需进行大量研究以支撑先导试验的开展。为此,系统梳理了国内外CO_(2)-EGR技术取得的认识与进展,结合四川盆地卧龙河气田CO_(2)-EGR先导试验进展情况,深入分析了在该盆地开展CO_(2)-EGR技术面临的挑战,最后展望了CO_(2)-EGR协同封存技术的发展方向。研究结果表明:①CO_(2)-EGG作用机理主要包括增压补能与驱替作用、重力分异作用、黏度差异辅助驱替作用、优势吸附置换作用、溶蚀改造作用、抑制水侵作用等;②CO_(2)-水-岩反应促使碳酸盐岩中的方解石溶蚀,储层孔隙度、渗透率发生变化;③CO_(2)具有一定的阻水效果且超临界CO_(2)阻水效果更强,较之于纯CO_(2),含杂质CO_(2)体系与CH_(4)之间的物性差异较小且杂质含量越多物性差异越小;④为获得更优的驱气效果,应使用纯CO_(2)作为注入介质,并确保CO_(2)处于超临界态。结论认为:①四川盆地卧龙河气田CCUS-EGR先导试验方案设计具有精细化的气藏工程设计理念、“南北分区”的创新性试验布局、注入介质优化与相态控制3个特点,并形成了一套适应性工艺、注采设计与经济性论证相结合的CO_(2)-EGR实施方案;②后期需要攻关关键技术瓶颈、构建CO_(2)-EGR汇源网络、形成信息化全流程监管、落实风险识别管控措施,以推进CO_(2)-EGR现场试验的进一步开展。 展开更多
关键词 四川盆地 卧龙河气田 先导试验 CO_(2)-EGR 技术机理 碳达峰碳中和 CO_(2)封存 能源安全
在线阅读 下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
17
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 Communication Protocol Hybrid Encryption security Protection
在线阅读 下载PDF
高压CO_(2)泡沫压裂钻孔瓦斯渗流机理及方程改进 被引量:1
18
作者 庞明坤 张天宇 +3 位作者 潘红宇 宋宪峰 伍珊 张天军 《煤田地质与勘探》 北大核心 2025年第5期36-45,共10页
【目的】为解决高瓦斯煤层特殊低孔渗结构限制瓦斯抽采效率的问题,精准测定CO_(2)泡沫压裂钻孔孔周“环状”破裂煤体的渗透参数,提高煤层瓦斯预抽钻孔设计的准确性和瓦斯抽采效率。【方法】采用自主设计的孔周破碎煤体渗流试验仪器,从... 【目的】为解决高瓦斯煤层特殊低孔渗结构限制瓦斯抽采效率的问题,精准测定CO_(2)泡沫压裂钻孔孔周“环状”破裂煤体的渗透参数,提高煤层瓦斯预抽钻孔设计的准确性和瓦斯抽采效率。【方法】采用自主设计的孔周破碎煤体渗流试验仪器,从不同初始孔隙结构的角度,对钻孔周围“环状”孔隙、裂隙的煤体进行研究。测试不同初始孔隙结构试样的渗透率,分析孔周破裂煤体渗透率的演变特征。基于改进的Ergun方程,得到破裂煤体介质瓦斯渗流基本方程,并对其合理性进行验证。【结果】对于孔周“环状”破裂煤体在压实过程中会经历三个阶段的破碎变形过程。当应力在1.2~1.3 kPa时,即颗粒变形后期,破碎量明显减少。这是由于颗粒变形后期之前阶段产生的细小颗粒已填充了大部分孔隙。在外部载荷的作用下,煤体颗粒会经历进一步的压缩变形,最终导致颗粒之间相互压缩,形成一个致密的整体。随着流速的持续增加,流动过程主要受惯性力作用,通过将方程中的二次项系数中的参数设置成与流动状态相关的变量,得到a/b与v基本上符合负指数关系。改进型Ergun公式克服了传统公式的缺陷,能够较好地预测不同孔隙率、不同颗粒直径以及不同流速时孔隙介质渗流过程中的负压损失。【结论】在煤层瓦斯预抽工作中,通过运用改进后的破裂煤体瓦斯渗流方程,可以计算瓦斯预抽钻孔孔周的“环状”破碎煤体渗透率,进而可以准确给出有效致裂半径,为优化设计瓦斯抽采钻孔布孔方式提供了重要的理论基础,并为高瓦斯低透煤层绿色高效抽采提供新思路和新方法。 展开更多
关键词 能源安全 CO_(2)泡沫压裂 裂隙扩展 渗流理论 渗流方程 渗透率
在线阅读 下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
19
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
在线阅读 下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部