The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and ...The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and 19 bioclimatic variables were selected,and the environmental factors required for modeling were screened out by pearson correlation analysis and variance inflation factor(VIF)analysis.The potential suitable areas of Orchidaceae plants were predictat present and under different climate scenarios in 2090s by using geographic information system(GIS)and Maximum Entropy Model(MaxEnt).And then evaluated the prediction accuracy of the MaxEnt model using the AUC value,the TSS value and the Kappa value.The results showed that:1)The area under curve(AUC)values,true skill statistics(TSS)values and KAPPA values predicted by MaxEnt model were separately above 0.9,0.85 and 0.75.2)Under the climate scenario at present,the total suitable area of Orchidaceae plants was about 9.61×10^(6)km^(2),which was mainly distributed in Heilongjiang province.Among them,the high-suitable area of Cypripedium shanxiense S.C.Chen was the largest,the non-suitable area of Cypripedium guttatum Sw was the largest.3)Under different climate scenarios in 2090s,the total suitable area was slightly increasing(9.62×10^(6)km^(2)).Among them,Cypripedium shanxiense S.C.Chen and Gastrodiae Rhizoma both showed the trend of expansion to the southwest,China,and the suitable areas expanded significantly.Comprehensive factor analysis showed that temperature and precipitation were the main bioclimatic variables of suitable areas distribution,and the low emission scenario(SSP 2-4.5)will be more conducive to the survival of Orchidaceae plants.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and conti...Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and continuous innovation are indispensable for sustaining a competitive advantage in technological development,thereby securing national scientific capacity and long-term strategic growth.At present,however,China faces substantial risks of technological"stranglehold"in the high-end scientific instrument domain.The underlying causes are multifaceted,arising not only from insufficient accumulation of core technologies but also from entrenched systemic and ecosystem-level barriers that impede the application,scaling,and promotion of domestic instruments.This paper provides a systematic analysis of the challenges hindering the widespread adoption of domestically developed scientific instruments and proposes practical pathways to build a new,integrated"R&D-application-promotion"ecosystem.This ecosystem is anchored in trust,driven by user demand,and shaped through collaborative innovation.Key initiatives include organizing user visits to instrument manufacturers,convening seminars on domestic alternatives to imported equipment,establishing demonstration centers for application and promotion,and involving end-users directly in the R&D and iterative upgrading of domestic instruments.Together,these efforts aim to close the final critical gap,advancing domestic instruments from merely"functional"to genuinely"user-friendly",and ultimately to"widely implemented".By doing so,this framework offers both theoretical grounding and practical guidance for achieving high-level scientific and technological self-reliance and sustained innovation capacity.展开更多
THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-...THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-cloud collaborative design.However,the large-scale integration ofdistributed renewable energy resources,coupled with the extensivedeployment of sensing and communication devices,has resulted inthe new-type power system characterized by dynamic complexityand high uncertainty[1]-[4].展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighte...The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighted key value(RWKV)architecture has garnered widespread attention due to its linear computational complexity and its capability of parallel computation during training.Despite the RWKV model's proficiency in addressing long-range modeling tasks with linear computational complexity,most current RWKV-based approaches employ static scanning patterns.These patterns may inadvertently incorporate biased prior knowledge into the model's predictions.To address this challenge,we propose a multi-head scan strategy combined with padding methods to effectively simulate spatial continuity in 2D images.Within the Feature Aggregation Attention(FAA)module,asymmetric convolutions are designed to aggregate 1D sequence features along a single dimension,thereby expanding effective receptive fields while preserving structural sparsity.Additionally,panoramic token shift(P-Shift)effectively models local dependency relationships by moving tokens from a wide receptive field.Extensive experiments conducted on the ISIC17/18 and ACDC datasets demonstrate that our method exhibits superior performance in dense medical image prediction tasks.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key r...Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks.展开更多
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la...State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la...State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.展开更多
Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impair...Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property.展开更多
A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralde...A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.展开更多
Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca...Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.展开更多
The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)prot...The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.展开更多
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金funded by Project of Scientific Research Business Expenses of Provincial Scientific Research Institutes in Heilongjiang Province(No.CZKYF2023-1-B024)Heilongjiang Academy of Sciences Dean Fund Project(No.YZ2022ZR02)+1 种基金the Science and Technology Basic Resources Investigation Program of China(No.2019FY100500)the Fundamental Research Funds for the Central Universities(No.2572023CT11).
文摘The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and 19 bioclimatic variables were selected,and the environmental factors required for modeling were screened out by pearson correlation analysis and variance inflation factor(VIF)analysis.The potential suitable areas of Orchidaceae plants were predictat present and under different climate scenarios in 2090s by using geographic information system(GIS)and Maximum Entropy Model(MaxEnt).And then evaluated the prediction accuracy of the MaxEnt model using the AUC value,the TSS value and the Kappa value.The results showed that:1)The area under curve(AUC)values,true skill statistics(TSS)values and KAPPA values predicted by MaxEnt model were separately above 0.9,0.85 and 0.75.2)Under the climate scenario at present,the total suitable area of Orchidaceae plants was about 9.61×10^(6)km^(2),which was mainly distributed in Heilongjiang province.Among them,the high-suitable area of Cypripedium shanxiense S.C.Chen was the largest,the non-suitable area of Cypripedium guttatum Sw was the largest.3)Under different climate scenarios in 2090s,the total suitable area was slightly increasing(9.62×10^(6)km^(2)).Among them,Cypripedium shanxiense S.C.Chen and Gastrodiae Rhizoma both showed the trend of expansion to the southwest,China,and the suitable areas expanded significantly.Comprehensive factor analysis showed that temperature and precipitation were the main bioclimatic variables of suitable areas distribution,and the low emission scenario(SSP 2-4.5)will be more conducive to the survival of Orchidaceae plants.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金Management Research Project on the Transformation of Scientific and Technological Achievements at Peking University Health Science Center(Grant No.KT202501)Peking University Health Science Center 2025 Party Building Research Project(General Category,No.2)。
文摘Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and continuous innovation are indispensable for sustaining a competitive advantage in technological development,thereby securing national scientific capacity and long-term strategic growth.At present,however,China faces substantial risks of technological"stranglehold"in the high-end scientific instrument domain.The underlying causes are multifaceted,arising not only from insufficient accumulation of core technologies but also from entrenched systemic and ecosystem-level barriers that impede the application,scaling,and promotion of domestic instruments.This paper provides a systematic analysis of the challenges hindering the widespread adoption of domestically developed scientific instruments and proposes practical pathways to build a new,integrated"R&D-application-promotion"ecosystem.This ecosystem is anchored in trust,driven by user demand,and shaped through collaborative innovation.Key initiatives include organizing user visits to instrument manufacturers,convening seminars on domestic alternatives to imported equipment,establishing demonstration centers for application and promotion,and involving end-users directly in the R&D and iterative upgrading of domestic instruments.Together,these efforts aim to close the final critical gap,advancing domestic instruments from merely"functional"to genuinely"user-friendly",and ultimately to"widely implemented".By doing so,this framework offers both theoretical grounding and practical guidance for achieving high-level scientific and technological self-reliance and sustained innovation capacity.
基金partially supported by the National Natural Science Foundation of China(62293500,62293505,62233010,62503240)Natural Science Foundation of Jiangsu Province(BK20250679)。
文摘THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-cloud collaborative design.However,the large-scale integration ofdistributed renewable energy resources,coupled with the extensivedeployment of sensing and communication devices,has resulted inthe new-type power system characterized by dynamic complexityand high uncertainty[1]-[4].
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
基金Supported by Zhejiang Provincial Natural Science Foundation of China(LY22F020025)the National Natural Science Foundation of China(62072126)。
文摘The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighted key value(RWKV)architecture has garnered widespread attention due to its linear computational complexity and its capability of parallel computation during training.Despite the RWKV model's proficiency in addressing long-range modeling tasks with linear computational complexity,most current RWKV-based approaches employ static scanning patterns.These patterns may inadvertently incorporate biased prior knowledge into the model's predictions.To address this challenge,we propose a multi-head scan strategy combined with padding methods to effectively simulate spatial continuity in 2D images.Within the Feature Aggregation Attention(FAA)module,asymmetric convolutions are designed to aggregate 1D sequence features along a single dimension,thereby expanding effective receptive fields while preserving structural sparsity.Additionally,panoramic token shift(P-Shift)effectively models local dependency relationships by moving tokens from a wide receptive field.Extensive experiments conducted on the ISIC17/18 and ACDC datasets demonstrate that our method exhibits superior performance in dense medical image prediction tasks.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2024ZD0302500)the National Natural Science Foundation of China(Grant No.62250710162)the Beijing Natural Science Foundation(Grant No.Z230005)。
文摘Quantum key distribution(QKD)is recognized as an unconditionally secure method of communication encryption,relying solely on the principles of quantum mechanics.A key performance metric for QKD systems is secure key rate(SKR),which is a critical factor for real-world applications.Herein,we report a practical QKD system,equipped with compact gated InGaAs/InP single-photon detectors(SPDs),that can generate a high SKR of 15.2 Mb/s with a channel loss of 2 dB.This exceptional performance stems from the ultra-low afterpulsing probability of the SPDs,which significantly reduces the bit error rate in the QKD system.The typical quantum bit error rate is 1.3%.The results validate the feasibility of an integrated,practical QKD system and offer a reliable solution for the future development of real-world QKD networks.
基金supported in part by the National Natural Science Foundation of China under Grant 61941113,Grant 61971033,and Grant 61671057by the Henan Provincial Department of Science and Technology Project(No.212102210408)by the Henan Provincial Key Scientific Research Project(No.22A520041).
文摘5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.
基金supported by the National Natural Science Foundation of China(Grant Nos.42277161,42230709).
文摘Accurate identification and effective support of key blocks are crucial for ensuring the stability and safety of rock slopes.The number of structural planes and rock blocks were reduced in previous studies.This impairs the ability to characterize complex rock slopes accurately and inhibits the identification of key blocks.In this paper,a knowledge-data dually driven paradigm for accurate identification of key blocks in complex rock slopes is proposed.Our basic idea is to integrate key block theory into data-driven models based on finely characterizing structural features to identify key blocks in complex rock slopes accurately.The proposed novel paradigm consists of(1)representing rock slopes as graph-structured data based on complex systems theory,(2)identifying key nodes in the graph-structured data using graph deep learning,and(3)mapping the key nodes of graph-structured data to corresponding key blocks in the rock slope.Verification experiments and real-case applications are conducted by the proposed method.The verification results demonstrate excellent model performance,strong generalization capability,and effective classification results.Moreover,the real case application is conducted on the northern slope of the Yanqianshan Iron Mine.The results show that the proposed method can accurately identify key blocks in complex rock slopes,which can provide a decision-making basis and rational recommendations for effective support and instability prevention of rock slopes,thereby ensuring the stability of rock engineering and the safety of life and property.
基金Project supported by the National Natural Science Foundation of China(Grant No.62375140)the Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.KYCX241191 and SJCX250315)the Open Research Fund of the National Laboratory of Solid State Microstructures(Grant No.M36055)。
文摘A mode-pairing quantum key distribution based on heralded pair-coherent source with passive decoy-states is proposed,named HPCS-PDS-MP-QKD protocol,where the light sources at Alice and Bob sides are changed to heralded pair-coherent sources,and devices designed to implement passive decoy states are included at the transmitter sides to generate the decoy state pulses in the decoy-state window passively.With the defined efficient events and the designed pairing strategy,the key bits and bases can be obtained by data post-processing.Numerical simulation results verify the feasibility of the proposed protocol.The results show that the proposed protocol can exceed PLOB when the pairing interval setting is greater than 10^(3),and the transmission distance exceeds 200 km.When the key transmission distance reaches 300 km and the maximum pairing interval is equivalent to 1,its performance is improved by nearly 1.8 times compared to the original MP-QKD protocol with a weak coherent source(WCS-MP-QKD),and by 6.8 times higher than that of WCS-MPQKD with passive decoy states(WCS-PDS-MP-QKD).Meanwhile,the key transmission distance can reach 480 km,and surpasses the WCS-PDS-MP-QKD protocol by nearly 40 km.When the total pulse length is greater than 10^(11),the key generation rate is almost equal to that of infinite pulses.It is a promising QKD protocol that breaks the PLOB bound without requiring phase tracking and locking,has a longer transmission distance and a higher key generation rate,and eliminates the potential of side channel attack.
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701)the National Key Research and Development Program of China(Grant No.2018YFA0306403)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB43000000).
文摘Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.62171144and 62031024)Guangxi Science Foundation(Grant Nos.2025GXNSFAA069137 and GXR-1BGQ2424005)Innovation Project of Guangxi Graduate Education(Grant No.YCBZ2025064)。
文摘The advantage distillation(AD)technology has been proven to effectively improve the secret key rate and the communication distance of quantum key distribution(QKD).The mode-pairing quantum key distribution(MP-QKD)protocol can overcome a fundamental physical limit,known as the Pirandola-Laurenza-Ottaviani-Banchi bound,without requiring global phase-locking.In this work,we propose a method based on multi-step AD to further enhance the performance of MP-QKD.The simulation results show that,compared to one-step AD,multi-step AD achieves better performance in long-distance scenarios and can tolerate a higher quantum bit error rate.Specifically,when the difference between the communication distances from Alice and Bob to Charlie is 25 km,50 km and 75 km,and the corresponding transmission distance exceeds 523 km,512 km and 496 km,respectively,the secret key rate achieved by multi-step AD surpasses that of one-step AD.Our findings indicate that the proposed method can effectively promote the application of MP-QKD in scenarios with high loss and high error rate.