With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating th...Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating this condition.Nevertheless,considering the vast amount of research that is currently being conducted,focusing on the utilization of TCM in the management of myopia,there is an urgent requirement for a thorough and comprehensive review.The review would serve to clarify the practical applications of TCM within this specific field,and it would also aim to elucidate the underlying mechanisms that are at play,providing a deeper understanding of how TCM principles can be effectively integrated into modern medical practices.Here,some modern medical pathogenesis of myopia and appropriate TCM techniques studies are summarized in the prevention and treatment of myopia.Further,we discussed the potential mechanisms and the future research directions of TCM against myopia.Identifying these mechanisms is crucial for understanding how TCM can be effectively utilized in this context.The combination of various TCM methods or the combination of traditional Chinese and Western medicine is of great significance for the prevention and control of myopia in the future.展开更多
Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance ...Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance and scalability,as current trends require the distribution of computation across network nodes/points.In this paper,we survey a large number of mapping and scheduling techniques designed for NoC architectures.This time,we concentrated on 3D systems.We take a systematic literature review approach to analyze existing methods across static,dynamic,hybrid,and machine-learning-based approaches,alongside preliminary AI-based dynamic models in recent works.We classify them into several main aspects covering power-aware mapping,fault tolerance,load-balancing,and adaptive for dynamic workloads.Also,we assess the efficacy of each method against performance parameters,such as latency,throughput,response time,and error rate.Key challenges,including energy efficiency,real-time adaptability,and reinforcement learning integration,are highlighted as well.To the best of our knowledge,this is one of the recent reviews that identifies both traditional and AI-based algorithms for mapping over a modern NoC,and opens research challenges.Finally,we provide directions for future work toward improved adaptability and scalability via lightweight learned models and hierarchical mapping frameworks.展开更多
Heat exchangers play a crucial role in thermal energy systems,with their performance directly impacting efficiency,cost,and environmental impact.Apowerful technique for performance improvement can be given by passive ...Heat exchangers play a crucial role in thermal energy systems,with their performance directly impacting efficiency,cost,and environmental impact.Apowerful technique for performance improvement can be given by passive enhancement strategies,which are characterized by their dependability and minimal external power requirements.This comprehensive review critically assesses recent advancements in such passive methods to evaluate their heat transfer mechanisms,performance characteristics,and practical implementation challenges.Our methodology involves a systematic and comprehensive analysis of various heat transfer enhancement techniques,including surface modifications,extended surfaces,swirl flow devices,and tube inserts.This approach synthesizes and integrates findings from a broad spectrum of experimental investigations and numerical simulations to establish a cohesive understanding of their performance characteristics and underlyingmechanisms.Based on the findings,passive heat transfer techniques result in significant improvements in thermal performance;for instance,corrugated and roughened surfaces increase the heat transfer coefficient by 50%–200%,and advanced insert geometries,such as modified twisted tapes,can increase it by more than 300%,typically accompanied by significant pressure-drop penalties.However,an important finding is the general trade-off between enhanced heat transfer and higher frictional loss,which requires optimization depending on the applications.Finally,this review also provides recommendations that will document the gaps of various passive techniques in heat exchangers to future address.展开更多
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp...With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Ganmai Dazao Decoction,originating from“Jin Gui Yao Lue”(Synopsis of the Golden Chamber),is a classical prescription for treating visceral agitation.Composed of three medicinal and edible substances-licorice(Gancao)...Ganmai Dazao Decoction,originating from“Jin Gui Yao Lue”(Synopsis of the Golden Chamber),is a classical prescription for treating visceral agitation.Composed of three medicinal and edible substances-licorice(Gancao),wheat(Xiaomai),and jujube(Dazao),it functions to nourish the heart and calm the mind,harmonize the middle burner and regulate Qi,and alleviate urgency and restlessness.As its clinical application has expanded from traditional emotional disorders to neurological,endocrine,and various psychosomatic diseases,establishing a scientifically precise quality control system and deeply elucidating its pharmacodynamic material basis and mechanism of action have become critical tasks.Modern analytical methods,typified by chromatography,spectroscopy,and their hyphenated techniques,with their high sensitivity,high resolution,and powerful substance characterization capabilities,have become the core driving force for standardizing the quality control and modernizing the clinical application research of this formula.This paper systematically reviews the progress of the aforementioned analytical techniques and chemometrics in interpreting the chemical composition,establishing fingerprint profiles,controlling process quality,and researching the pharmacodynamic material basis of Ganmai Dazao Decoction.Furthermore,it discusses integrated approaches combining analytical techniques with pharmacology and clinical medicine to reveal mechanisms of action and explore therapeutic biomarkers.Finally,it provides an outlook on future directions and challenges,including technological integration and innovation,standardization of whole-process quality control systems,and evidence-based research aimed at internationalization.展开更多
Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience...Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience-dependent mechanisms.The pruning process involves multiple molecular signals and a series of regulatory activities governing the“eat me”and“don't eat me”states.Under physiological conditions,the interaction between glial cells and neurons results in the clearance of unnecessary synapses,maintaining normal neural circuit functionality via synaptic pruning.Alterations in genetic and environmental factors can lead to imbalanced synaptic pruning,thus promoting the occurrence and development of autism spectrum disorder,schizophrenia,Alzheimer's disease,and other neurological disorders.In this review,we investigated the molecular mechanisms responsible for synaptic pruning during neural development.We focus on how synaptic pruning can regulate neural circuits and its association with neurological disorders.Furthermore,we discuss the application of emerging optical and imaging technologies to observe synaptic structure and function,as well as their potential for clinical translation.Our aim was to enhance our understanding of synaptic pruning during neural development,including the molecular basis underlying the regulation of synaptic function and the dynamic changes in synaptic density,and to investigate the potential role of these mechanisms in the pathophysiology of neurological diseases,thus providing a theoretical foundation for the treatment of neurological disorders.展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of...THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of the Yuan(1206-1368),Ming(1368-1644),and Qing(1616-1911)dynasties,and is still highly regarded to this day.展开更多
In-situ stress is a key parameter for underground mine design and rock stability analysis.The borehole overcoring technique is widely used for in-situ stress measurement,but the rheological recovery deformation of roc...In-situ stress is a key parameter for underground mine design and rock stability analysis.The borehole overcoring technique is widely used for in-situ stress measurement,but the rheological recovery deformation of rocks after stress relief introduces errors.To improve accuracy,this study proposes an in-situ stress solution theory that incorporates time-dependent stress relief effects.Triaxial stepwise loadingunloading rheological tests on granite and siltstone established quantitative relationships between instantaneous elastic recovery and viscoelastic recovery under different stress levels,confirming their impact on measurement accuracy.By integrating a dual-class elastic deformation recovery model,an improved in-situ stress solution theory was derived.Additionally,accounting for the nonlinear characteristics of rock masses,a determination method for time-dependent nonlinear mechanical parameters was proposed.Based on the CSIRO hollow inclusion strain cell,time-dependent strain correction equations and long-term confining pressure calibration equations were formulated.Finally,the proposed theory was successfully applied at one iron mine(736 m depth)in Xinjiang,China,and one coal mine(510 m depth)in Ningxia,China.Compared to classical theory,the calculated mean stress values showed accuracy improvements of 6.0%and 9.4%,respectively,validating the applicability and reliability of the proposed theory.展开更多
[Objective] The aim of this study was to investigate the efficient technique of artificial insemination for silkworm. [Method] Sperms were extracted from bursa copulatrix of female moths mated for 30 min through extru...[Objective] The aim of this study was to investigate the efficient technique of artificial insemination for silkworm. [Method] Sperms were extracted from bursa copulatrix of female moths mated for 30 min through extruding and centrifugal method, and then the semen was injected into other virgin moths with trypsinase. [ Result] A high-effective collection technology of spermatids from silkworm was established successfully, 50 μl semen could be collected by only one person in each hour. The survival rate of spermatids was over 80% in vito after collected from bursa copulatrix, while the obtained semen was quite pure and the average fertilization rate of silkworm was 76,5%. [ Conclusion] The establishment of high-effective semen extraction technique of silkworm provides the technical basis for studies on other related techniques for silkworm sperm.展开更多
In recent years,U.S.tight oil exploration and development have achieved significant progress,with rapidly increasing production,which has significantly changed the U.S.A.energy supply pattern(Fig.1).Compared with th...In recent years,U.S.tight oil exploration and development have achieved significant progress,with rapidly increasing production,which has significantly changed the U.S.A.energy supply pattern(Fig.1).Compared with the North American marine to marginal marine-continental transitional facies,China’s tight oil(Fig.1)展开更多
Deep-sea sediment is extremely important in marine scientific research,such as that concerning marine geology and microbial communities.The research findings are closely related to the in-situ information of the sedim...Deep-sea sediment is extremely important in marine scientific research,such as that concerning marine geology and microbial communities.The research findings are closely related to the in-situ information of the sediment.One prerequisite for investigations of deep-sea sediment is providing sampling techniques capable of preventing distortion during recovery.As the fruit of such sampling techniques,samplers designed for obtaining sediment have become indispensable equipment,owing to their low cost,light weight,compactness,easy operation,and high adaptability to sea conditions.This paper introduces the research and application of typical deep-sea sediment samplers.Then,a representative sampler recently developed in China is analyzed.On this basis,a review and analysis is conducted regarding the key techniques of various deep-sea sediment samplers,including sealing,pressure and temperature retaining,low-disturbance sampling,and no-pressure drop transfer.Then,the shortcomings in the key techniques for deep-sea sediment sampling are identified.Finally,prospects for the future development of key techniques for deep-sea sediment sampling are proposed,from the perspectives of structural diversification,functional integration,intelligent operation,and high-fidelity samples.This paper summarizes the existing samplers in the context of the key techniques mentioned above,and can provide reference for the optimized design of samplers and development of key sampling techniques.展开更多
With the rapid development of China economy and critical ecological situation in China,ecological renovation of existing buildings has become a special important topic. Key techniques on ecological renovation design o...With the rapid development of China economy and critical ecological situation in China,ecological renovation of existing buildings has become a special important topic. Key techniques on ecological renovation design of existing buildings in China are explored in this paper. Special attention is paid to specific treatments suitable for China.展开更多
TD-LTE is the evolution system of TD-SCDMA system. Early in 2004 3GPP put forward the "Long Term Evolution" project based on the OFDM/FDMA core physical techniques with high qualities. While China Mobile and...TD-LTE is the evolution system of TD-SCDMA system. Early in 2004 3GPP put forward the "Long Term Evolution" project based on the OFDM/FDMA core physical techniques with high qualities. While China Mobile and several operators and vendors, both domestic and foreign,展开更多
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or...In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.展开更多
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金supported by Healthy China initiative of Traditional Chinese Medicine(No.889042).
文摘Currently,the number of patients with myopia is increasing rapidly across the globe.Traditional Chinese medicine(TCM),with its long history and rich experience,has shown promise in effectively managing and treating this condition.Nevertheless,considering the vast amount of research that is currently being conducted,focusing on the utilization of TCM in the management of myopia,there is an urgent requirement for a thorough and comprehensive review.The review would serve to clarify the practical applications of TCM within this specific field,and it would also aim to elucidate the underlying mechanisms that are at play,providing a deeper understanding of how TCM principles can be effectively integrated into modern medical practices.Here,some modern medical pathogenesis of myopia and appropriate TCM techniques studies are summarized in the prevention and treatment of myopia.Further,we discussed the potential mechanisms and the future research directions of TCM against myopia.Identifying these mechanisms is crucial for understanding how TCM can be effectively utilized in this context.The combination of various TCM methods or the combination of traditional Chinese and Western medicine is of great significance for the prevention and control of myopia in the future.
文摘Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance and scalability,as current trends require the distribution of computation across network nodes/points.In this paper,we survey a large number of mapping and scheduling techniques designed for NoC architectures.This time,we concentrated on 3D systems.We take a systematic literature review approach to analyze existing methods across static,dynamic,hybrid,and machine-learning-based approaches,alongside preliminary AI-based dynamic models in recent works.We classify them into several main aspects covering power-aware mapping,fault tolerance,load-balancing,and adaptive for dynamic workloads.Also,we assess the efficacy of each method against performance parameters,such as latency,throughput,response time,and error rate.Key challenges,including energy efficiency,real-time adaptability,and reinforcement learning integration,are highlighted as well.To the best of our knowledge,this is one of the recent reviews that identifies both traditional and AI-based algorithms for mapping over a modern NoC,and opens research challenges.Finally,we provide directions for future work toward improved adaptability and scalability via lightweight learned models and hierarchical mapping frameworks.
文摘Heat exchangers play a crucial role in thermal energy systems,with their performance directly impacting efficiency,cost,and environmental impact.Apowerful technique for performance improvement can be given by passive enhancement strategies,which are characterized by their dependability and minimal external power requirements.This comprehensive review critically assesses recent advancements in such passive methods to evaluate their heat transfer mechanisms,performance characteristics,and practical implementation challenges.Our methodology involves a systematic and comprehensive analysis of various heat transfer enhancement techniques,including surface modifications,extended surfaces,swirl flow devices,and tube inserts.This approach synthesizes and integrates findings from a broad spectrum of experimental investigations and numerical simulations to establish a cohesive understanding of their performance characteristics and underlyingmechanisms.Based on the findings,passive heat transfer techniques result in significant improvements in thermal performance;for instance,corrugated and roughened surfaces increase the heat transfer coefficient by 50%–200%,and advanced insert geometries,such as modified twisted tapes,can increase it by more than 300%,typically accompanied by significant pressure-drop penalties.However,an important finding is the general trade-off between enhanced heat transfer and higher frictional loss,which requires optimization depending on the applications.Finally,this review also provides recommendations that will document the gaps of various passive techniques in heat exchangers to future address.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS-2023-00235509Development of security monitoring technology based network behavior against encrypted cyber threats in ICT convergence environment).
文摘With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
文摘Ganmai Dazao Decoction,originating from“Jin Gui Yao Lue”(Synopsis of the Golden Chamber),is a classical prescription for treating visceral agitation.Composed of three medicinal and edible substances-licorice(Gancao),wheat(Xiaomai),and jujube(Dazao),it functions to nourish the heart and calm the mind,harmonize the middle burner and regulate Qi,and alleviate urgency and restlessness.As its clinical application has expanded from traditional emotional disorders to neurological,endocrine,and various psychosomatic diseases,establishing a scientifically precise quality control system and deeply elucidating its pharmacodynamic material basis and mechanism of action have become critical tasks.Modern analytical methods,typified by chromatography,spectroscopy,and their hyphenated techniques,with their high sensitivity,high resolution,and powerful substance characterization capabilities,have become the core driving force for standardizing the quality control and modernizing the clinical application research of this formula.This paper systematically reviews the progress of the aforementioned analytical techniques and chemometrics in interpreting the chemical composition,establishing fingerprint profiles,controlling process quality,and researching the pharmacodynamic material basis of Ganmai Dazao Decoction.Furthermore,it discusses integrated approaches combining analytical techniques with pharmacology and clinical medicine to reveal mechanisms of action and explore therapeutic biomarkers.Finally,it provides an outlook on future directions and challenges,including technological integration and innovation,standardization of whole-process quality control systems,and evidence-based research aimed at internationalization.
基金supported by the National Natural Science Foundation of China,No.31760290,82160688the Key Development Areas Project of Ganzhou Science and Technology,No.2022B-SF9554(all to XL)。
文摘Synaptic pruning is a crucial process in synaptic refinement,eliminating unstable synaptic connections in neural circuits.This process is triggered and regulated primarily by spontaneous neural activity and experience-dependent mechanisms.The pruning process involves multiple molecular signals and a series of regulatory activities governing the“eat me”and“don't eat me”states.Under physiological conditions,the interaction between glial cells and neurons results in the clearance of unnecessary synapses,maintaining normal neural circuit functionality via synaptic pruning.Alterations in genetic and environmental factors can lead to imbalanced synaptic pruning,thus promoting the occurrence and development of autism spectrum disorder,schizophrenia,Alzheimer's disease,and other neurological disorders.In this review,we investigated the molecular mechanisms responsible for synaptic pruning during neural development.We focus on how synaptic pruning can regulate neural circuits and its association with neurological disorders.Furthermore,we discuss the application of emerging optical and imaging technologies to observe synaptic structure and function,as well as their potential for clinical translation.Our aim was to enhance our understanding of synaptic pruning during neural development,including the molecular basis underlying the regulation of synaptic function and the dynamic changes in synaptic density,and to investigate the potential role of these mechanisms in the pathophysiology of neurological diseases,thus providing a theoretical foundation for the treatment of neurological disorders.
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
文摘THE Nanjing Yunjin brocade,known for its stunning luster,exquisite patterns,and a wealth of shades,represents the highest level of Chinese brocade craftsmanship.It was the designated textile for the imperial courts of the Yuan(1206-1368),Ming(1368-1644),and Qing(1616-1911)dynasties,and is still highly regarded to this day.
基金supported by the National Science and Technology Major Project of the Ministry of Science and Technology of China(No.2024ZD1700201)the National Natural Science Foundation of China(Nos.U2034206,51974014 and 51574014)+1 种基金the Guangdong Basic and Applied Basic Research Foundation(No.2024A1515011631)the National Key Research and Development Project of China(No.2022YFC3004601)。
文摘In-situ stress is a key parameter for underground mine design and rock stability analysis.The borehole overcoring technique is widely used for in-situ stress measurement,but the rheological recovery deformation of rocks after stress relief introduces errors.To improve accuracy,this study proposes an in-situ stress solution theory that incorporates time-dependent stress relief effects.Triaxial stepwise loadingunloading rheological tests on granite and siltstone established quantitative relationships between instantaneous elastic recovery and viscoelastic recovery under different stress levels,confirming their impact on measurement accuracy.By integrating a dual-class elastic deformation recovery model,an improved in-situ stress solution theory was derived.Additionally,accounting for the nonlinear characteristics of rock masses,a determination method for time-dependent nonlinear mechanical parameters was proposed.Based on the CSIRO hollow inclusion strain cell,time-dependent strain correction equations and long-term confining pressure calibration equations were formulated.Finally,the proposed theory was successfully applied at one iron mine(736 m depth)in Xinjiang,China,and one coal mine(510 m depth)in Ningxia,China.Compared to classical theory,the calculated mean stress values showed accuracy improvements of 6.0%and 9.4%,respectively,validating the applicability and reliability of the proposed theory.
文摘[Objective] The aim of this study was to investigate the efficient technique of artificial insemination for silkworm. [Method] Sperms were extracted from bursa copulatrix of female moths mated for 30 min through extruding and centrifugal method, and then the semen was injected into other virgin moths with trypsinase. [ Result] A high-effective collection technology of spermatids from silkworm was established successfully, 50 μl semen could be collected by only one person in each hour. The survival rate of spermatids was over 80% in vito after collected from bursa copulatrix, while the obtained semen was quite pure and the average fertilization rate of silkworm was 76,5%. [ Conclusion] The establishment of high-effective semen extraction technique of silkworm provides the technical basis for studies on other related techniques for silkworm sperm.
文摘In recent years,U.S.tight oil exploration and development have achieved significant progress,with rapidly increasing production,which has significantly changed the U.S.A.energy supply pattern(Fig.1).Compared with the North American marine to marginal marine-continental transitional facies,China’s tight oil(Fig.1)
基金Supported by National Key Research and Development Program of China(Grant No.2016YFC0300502)Hunan Provincial Innovation Foundation For Postgraduate(Grant No.CX2018B658)+2 种基金National Natural Science Foundation of China(Grant Nos.51705145,517779092)Supported by Scientific Research Fund of Hunan Provincial Education Department(Grant No.18B205)Hunan Province Natural Science Foundation(Grant No.2019 JJ50182).
文摘Deep-sea sediment is extremely important in marine scientific research,such as that concerning marine geology and microbial communities.The research findings are closely related to the in-situ information of the sediment.One prerequisite for investigations of deep-sea sediment is providing sampling techniques capable of preventing distortion during recovery.As the fruit of such sampling techniques,samplers designed for obtaining sediment have become indispensable equipment,owing to their low cost,light weight,compactness,easy operation,and high adaptability to sea conditions.This paper introduces the research and application of typical deep-sea sediment samplers.Then,a representative sampler recently developed in China is analyzed.On this basis,a review and analysis is conducted regarding the key techniques of various deep-sea sediment samplers,including sealing,pressure and temperature retaining,low-disturbance sampling,and no-pressure drop transfer.Then,the shortcomings in the key techniques for deep-sea sediment sampling are identified.Finally,prospects for the future development of key techniques for deep-sea sediment sampling are proposed,from the perspectives of structural diversification,functional integration,intelligent operation,and high-fidelity samples.This paper summarizes the existing samplers in the context of the key techniques mentioned above,and can provide reference for the optimized design of samplers and development of key sampling techniques.
基金the financial support from the Technology Pillar Program during the Eleventh Five-Year Plan Period (project2008BAJ08B11)
文摘With the rapid development of China economy and critical ecological situation in China,ecological renovation of existing buildings has become a special important topic. Key techniques on ecological renovation design of existing buildings in China are explored in this paper. Special attention is paid to specific treatments suitable for China.
文摘TD-LTE is the evolution system of TD-SCDMA system. Early in 2004 3GPP put forward the "Long Term Evolution" project based on the OFDM/FDMA core physical techniques with high qualities. While China Mobile and several operators and vendors, both domestic and foreign,
文摘In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.