A new species of Orgilus Haliday,1833,Orgilus(O.)wuyuanensis Shi&Shi sp.nov.,from Wuyuan County in Inner Mongolia of China,is described and illustrated.This new species is characterized by head and mesosoma black,...A new species of Orgilus Haliday,1833,Orgilus(O.)wuyuanensis Shi&Shi sp.nov.,from Wuyuan County in Inner Mongolia of China,is described and illustrated.This new species is characterized by head and mesosoma black,legs and metasoma yellowish brown;mesopleuron with a narrow horizontal smooth area under anterior subalar depression,and a sculptured area with shallow notches at the anterior corner below it;precoxal sulcus deeply impressed,a large smooth area above precoxal sulcus and punctate and densely setose under precoxal sulcus;ovipositor sheath 0.8 times as long as length of fore wing.A checklist and a key to the twenty-one species of the genus Orgilus Haliday,1833 from China is provided.展开更多
The genus Cricotopus,belonging to the subfamily Orthocladinae of the family Chironomidae,is one of the species-rich groups in this subfamily.In this study,we conducted the identification,description,and revision of do...The genus Cricotopus,belonging to the subfamily Orthocladinae of the family Chironomidae,is one of the species-rich groups in this subfamily.In this study,we conducted the identification,description,and revision of domestic specimens of the genus Cricotopus collected from various regions across the country over 20 years(19762005),comb through 11 species of 4 subgenera of Cricotopus in China,including 6 species in subgenus Cricotopus,3 species in Isocladius,1 species in Nostococladius,and 1 species in Pseudocricotopus.A key that supplements important basic data for the taxonomic research of this genus is provided.展开更多
This paper describes two new species in the genus Cneorella Medvedev&Dang,1981 from China:C.flava sp.nov.and C.hainanensis sp.nov.External morphological photographs and illustrations of the male genitalia of these...This paper describes two new species in the genus Cneorella Medvedev&Dang,1981 from China:C.flava sp.nov.and C.hainanensis sp.nov.External morphological photographs and illustrations of the male genitalia of these new species are provided.A key to the Chinese known species in this genus is given.展开更多
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
Locust plagues result in significant agricultural and ecological damage,and the current dependence on broadspectrum chemical pesticides raises serious concerns regarding environmental sustainability and public health....Locust plagues result in significant agricultural and ecological damage,and the current dependence on broadspectrum chemical pesticides raises serious concerns regarding environmental sustainability and public health.In this study,we elucidated the biosynthetic pathway of the locust aggregation pheromone 4-vinylanisole(4VA).Through analysis of the crystal structure of the 4VPMT2-4VA-SAM complex,it was determined that 4-nitrophenol acts as a substrate analogue,effectively inhibiting 4VPMT enzyme activity and thereby preventing the formation of 4VA.This study revealed key enzymatic targets and lead inhibitors for intervention,establishing a molecular foundation for pheromone-based,environmentally sustainable locust control strategies and offering a viable alternative to reduce reliance on conventional chemical pesticides.展开更多
The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and ...The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and 19 bioclimatic variables were selected,and the environmental factors required for modeling were screened out by pearson correlation analysis and variance inflation factor(VIF)analysis.The potential suitable areas of Orchidaceae plants were predictat present and under different climate scenarios in 2090s by using geographic information system(GIS)and Maximum Entropy Model(MaxEnt).And then evaluated the prediction accuracy of the MaxEnt model using the AUC value,the TSS value and the Kappa value.The results showed that:1)The area under curve(AUC)values,true skill statistics(TSS)values and KAPPA values predicted by MaxEnt model were separately above 0.9,0.85 and 0.75.2)Under the climate scenario at present,the total suitable area of Orchidaceae plants was about 9.61×10^(6)km^(2),which was mainly distributed in Heilongjiang province.Among them,the high-suitable area of Cypripedium shanxiense S.C.Chen was the largest,the non-suitable area of Cypripedium guttatum Sw was the largest.3)Under different climate scenarios in 2090s,the total suitable area was slightly increasing(9.62×10^(6)km^(2)).Among them,Cypripedium shanxiense S.C.Chen and Gastrodiae Rhizoma both showed the trend of expansion to the southwest,China,and the suitable areas expanded significantly.Comprehensive factor analysis showed that temperature and precipitation were the main bioclimatic variables of suitable areas distribution,and the low emission scenario(SSP 2-4.5)will be more conducive to the survival of Orchidaceae plants.展开更多
Carbon Capture,Utilization,and Storage(CCUS)technology has gained widespread attention in recent years as a critical strategy to combat global climate change,particularly in achieving carbon neutrality goals.The Guang...Carbon Capture,Utilization,and Storage(CCUS)technology has gained widespread attention in recent years as a critical strategy to combat global climate change,particularly in achieving carbon neutrality goals.The Guangdong-Hong Kong-Macao Greater Bay Area(GBA),as one of China's most economically active regions,serves as a key engine for economic growth while also facing considerable carbon emission challenges.This study analyzes the industrial emission volume and geographical distribution of key emitting enterprises in the GBA,summarizes their technological processes and main carbonemitting equipment,and provides scientific support for precise mitigation policies and low-carbon development.Based on data from 176 key emitting enterprises,the study reveals that Guangzhou and Dongguan host the largest number of such enterprises.Carbon emissions are primarily concentrated in the power sector,dominated by coal-and gas-fired power units,characterized by significant spatial dispersion and uneven distribution.Beyond the power sector,the paper industry has a high number of enterprises but lower emissions.Key facilities such as boilers,cogeneration systems,and production lines are predominantly located near tributaries rivers in Dongguan and Jiangmen.The building materials sector,primarily cement production,ranks as the second-largest emitter,with hightemperature kilns and grinding equipment,particularly rotary kilns and glass furnaces,as the main sources.The petrochemical and chemical sectors have fewer enterprises and lower emissions in the GBA,mainly located in suburban industrial clusters.Carbon emissions in the GBA exhibit distinct industry concentration and geographical distribution disparities.This study provides crucial data and theoretical insights for the development of targeted emission reduction strategies,optimization of source-sink matching,and the advancement of CCUS technologies in the region,particularly from the GBA to the northern South China Sea.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shar...On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shared recent developments,key data,and future trends in major markets,offering guidance for industry practitioners to drive progress.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and conti...Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and continuous innovation are indispensable for sustaining a competitive advantage in technological development,thereby securing national scientific capacity and long-term strategic growth.At present,however,China faces substantial risks of technological"stranglehold"in the high-end scientific instrument domain.The underlying causes are multifaceted,arising not only from insufficient accumulation of core technologies but also from entrenched systemic and ecosystem-level barriers that impede the application,scaling,and promotion of domestic instruments.This paper provides a systematic analysis of the challenges hindering the widespread adoption of domestically developed scientific instruments and proposes practical pathways to build a new,integrated"R&D-application-promotion"ecosystem.This ecosystem is anchored in trust,driven by user demand,and shaped through collaborative innovation.Key initiatives include organizing user visits to instrument manufacturers,convening seminars on domestic alternatives to imported equipment,establishing demonstration centers for application and promotion,and involving end-users directly in the R&D and iterative upgrading of domestic instruments.Together,these efforts aim to close the final critical gap,advancing domestic instruments from merely"functional"to genuinely"user-friendly",and ultimately to"widely implemented".By doing so,this framework offers both theoretical grounding and practical guidance for achieving high-level scientific and technological self-reliance and sustained innovation capacity.展开更多
THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-...THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-cloud collaborative design.However,the large-scale integration ofdistributed renewable energy resources,coupled with the extensivedeployment of sensing and communication devices,has resulted inthe new-type power system characterized by dynamic complexityand high uncertainty[1]-[4].展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighte...The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighted key value(RWKV)architecture has garnered widespread attention due to its linear computational complexity and its capability of parallel computation during training.Despite the RWKV model's proficiency in addressing long-range modeling tasks with linear computational complexity,most current RWKV-based approaches employ static scanning patterns.These patterns may inadvertently incorporate biased prior knowledge into the model's predictions.To address this challenge,we propose a multi-head scan strategy combined with padding methods to effectively simulate spatial continuity in 2D images.Within the Feature Aggregation Attention(FAA)module,asymmetric convolutions are designed to aggregate 1D sequence features along a single dimension,thereby expanding effective receptive fields while preserving structural sparsity.Additionally,panoramic token shift(P-Shift)effectively models local dependency relationships by moving tokens from a wide receptive field.Extensive experiments conducted on the ISIC17/18 and ACDC datasets demonstrate that our method exhibits superior performance in dense medical image prediction tasks.展开更多
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser...The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.展开更多
基金supported by the Scientific and Technological Plan Project of Inner Mongolia Autonomous Region(2021GG0027)the Natural Science Foundation Project of Inner Mongolia Autonomous Region(2024LHMS03045).
文摘A new species of Orgilus Haliday,1833,Orgilus(O.)wuyuanensis Shi&Shi sp.nov.,from Wuyuan County in Inner Mongolia of China,is described and illustrated.This new species is characterized by head and mesosoma black,legs and metasoma yellowish brown;mesopleuron with a narrow horizontal smooth area under anterior subalar depression,and a sculptured area with shallow notches at the anterior corner below it;precoxal sulcus deeply impressed,a large smooth area above precoxal sulcus and punctate and densely setose under precoxal sulcus;ovipositor sheath 0.8 times as long as length of fore wing.A checklist and a key to the twenty-one species of the genus Orgilus Haliday,1833 from China is provided.
文摘The genus Cricotopus,belonging to the subfamily Orthocladinae of the family Chironomidae,is one of the species-rich groups in this subfamily.In this study,we conducted the identification,description,and revision of domestic specimens of the genus Cricotopus collected from various regions across the country over 20 years(19762005),comb through 11 species of 4 subgenera of Cricotopus in China,including 6 species in subgenus Cricotopus,3 species in Isocladius,1 species in Nostococladius,and 1 species in Pseudocricotopus.A key that supplements important basic data for the taxonomic research of this genus is provided.
基金Funding was provided by the Science&Technology Fundamental Resources Investigation Program(2022FY202100)Shaanxi Institute of Zoology Program(Y2412093J18)Shaanxi Academy of Sciences Program(2024P-08,2025k-24).
文摘This paper describes two new species in the genus Cneorella Medvedev&Dang,1981 from China:C.flava sp.nov.and C.hainanensis sp.nov.External morphological photographs and illustrations of the male genitalia of these new species are provided.A key to the Chinese known species in this genus is given.
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金support of the National Natural Science Foundation of China(32472594).
文摘Locust plagues result in significant agricultural and ecological damage,and the current dependence on broadspectrum chemical pesticides raises serious concerns regarding environmental sustainability and public health.In this study,we elucidated the biosynthetic pathway of the locust aggregation pheromone 4-vinylanisole(4VA).Through analysis of the crystal structure of the 4VPMT2-4VA-SAM complex,it was determined that 4-nitrophenol acts as a substrate analogue,effectively inhibiting 4VPMT enzyme activity and thereby preventing the formation of 4VA.This study revealed key enzymatic targets and lead inhibitors for intervention,establishing a molecular foundation for pheromone-based,environmentally sustainable locust control strategies and offering a viable alternative to reduce reliance on conventional chemical pesticides.
基金funded by Project of Scientific Research Business Expenses of Provincial Scientific Research Institutes in Heilongjiang Province(No.CZKYF2023-1-B024)Heilongjiang Academy of Sciences Dean Fund Project(No.YZ2022ZR02)+1 种基金the Science and Technology Basic Resources Investigation Program of China(No.2019FY100500)the Fundamental Research Funds for the Central Universities(No.2572023CT11).
文摘The study aimed at predicting potential suitable areas with national key reserve Orchidaceae plants in Heilongjiang province and conducive to plant protection.The distribution point data of six Orchidaceae plants and 19 bioclimatic variables were selected,and the environmental factors required for modeling were screened out by pearson correlation analysis and variance inflation factor(VIF)analysis.The potential suitable areas of Orchidaceae plants were predictat present and under different climate scenarios in 2090s by using geographic information system(GIS)and Maximum Entropy Model(MaxEnt).And then evaluated the prediction accuracy of the MaxEnt model using the AUC value,the TSS value and the Kappa value.The results showed that:1)The area under curve(AUC)values,true skill statistics(TSS)values and KAPPA values predicted by MaxEnt model were separately above 0.9,0.85 and 0.75.2)Under the climate scenario at present,the total suitable area of Orchidaceae plants was about 9.61×10^(6)km^(2),which was mainly distributed in Heilongjiang province.Among them,the high-suitable area of Cypripedium shanxiense S.C.Chen was the largest,the non-suitable area of Cypripedium guttatum Sw was the largest.3)Under different climate scenarios in 2090s,the total suitable area was slightly increasing(9.62×10^(6)km^(2)).Among them,Cypripedium shanxiense S.C.Chen and Gastrodiae Rhizoma both showed the trend of expansion to the southwest,China,and the suitable areas expanded significantly.Comprehensive factor analysis showed that temperature and precipitation were the main bioclimatic variables of suitable areas distribution,and the low emission scenario(SSP 2-4.5)will be more conducive to the survival of Orchidaceae plants.
基金supported by the National Natural Science Foundation of China(52304098,52106092,42376215,52474105)Shenzhen Science and Technology Program(JCYJ20220818095605012,JCYJ20220530113011027)+5 种基金Guangdong Basic and Applied Basic Research Foundation(2022A1515110338,2023A1515012316,2023A1515012761,2025A1515010748)Research Team Cultivation Program of Shenzhen University(2023QNT004)Shenzhen Key Laboratory of Natural Gas Hydrates(ZDSYS20200421111201738)the General Research Fund(No.12616222)Early Career Scheme(No.22611624)of Hong Kong Research Grants CouncilMajor Science and Technology Infrastructure Project of Material Genome Big–science Facilities Platform supported by the Municipal Development and Reform Commission of Shenzhen。
文摘Carbon Capture,Utilization,and Storage(CCUS)technology has gained widespread attention in recent years as a critical strategy to combat global climate change,particularly in achieving carbon neutrality goals.The Guangdong-Hong Kong-Macao Greater Bay Area(GBA),as one of China's most economically active regions,serves as a key engine for economic growth while also facing considerable carbon emission challenges.This study analyzes the industrial emission volume and geographical distribution of key emitting enterprises in the GBA,summarizes their technological processes and main carbonemitting equipment,and provides scientific support for precise mitigation policies and low-carbon development.Based on data from 176 key emitting enterprises,the study reveals that Guangzhou and Dongguan host the largest number of such enterprises.Carbon emissions are primarily concentrated in the power sector,dominated by coal-and gas-fired power units,characterized by significant spatial dispersion and uneven distribution.Beyond the power sector,the paper industry has a high number of enterprises but lower emissions.Key facilities such as boilers,cogeneration systems,and production lines are predominantly located near tributaries rivers in Dongguan and Jiangmen.The building materials sector,primarily cement production,ranks as the second-largest emitter,with hightemperature kilns and grinding equipment,particularly rotary kilns and glass furnaces,as the main sources.The petrochemical and chemical sectors have fewer enterprises and lower emissions in the GBA,mainly located in suburban industrial clusters.Carbon emissions in the GBA exhibit distinct industry concentration and geographical distribution disparities.This study provides crucial data and theoretical insights for the development of targeted emission reduction strategies,optimization of source-sink matching,and the advancement of CCUS technologies in the region,particularly from the GBA to the northern South China Sea.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shared recent developments,key data,and future trends in major markets,offering guidance for industry practitioners to drive progress.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金Management Research Project on the Transformation of Scientific and Technological Achievements at Peking University Health Science Center(Grant No.KT202501)Peking University Health Science Center 2025 Party Building Research Project(General Category,No.2)。
文摘Scientific instruments serve as foundational pillars for both scientific progress and industrial innovation,enabling deep exploration and driving technological breakthroughs.Their independent controllability and continuous innovation are indispensable for sustaining a competitive advantage in technological development,thereby securing national scientific capacity and long-term strategic growth.At present,however,China faces substantial risks of technological"stranglehold"in the high-end scientific instrument domain.The underlying causes are multifaceted,arising not only from insufficient accumulation of core technologies but also from entrenched systemic and ecosystem-level barriers that impede the application,scaling,and promotion of domestic instruments.This paper provides a systematic analysis of the challenges hindering the widespread adoption of domestically developed scientific instruments and proposes practical pathways to build a new,integrated"R&D-application-promotion"ecosystem.This ecosystem is anchored in trust,driven by user demand,and shaped through collaborative innovation.Key initiatives include organizing user visits to instrument manufacturers,convening seminars on domestic alternatives to imported equipment,establishing demonstration centers for application and promotion,and involving end-users directly in the R&D and iterative upgrading of domestic instruments.Together,these efforts aim to close the final critical gap,advancing domestic instruments from merely"functional"to genuinely"user-friendly",and ultimately to"widely implemented".By doing so,this framework offers both theoretical grounding and practical guidance for achieving high-level scientific and technological self-reliance and sustained innovation capacity.
基金partially supported by the National Natural Science Foundation of China(62293500,62293505,62233010,62503240)Natural Science Foundation of Jiangsu Province(BK20250679)。
文摘THE power industrial control system(power ICS)is thecore infrastructure that ensures the safe,stable,and efficient operation of power systems.Its architecture typi-cally adopts a hierarchical and partitioned end-edge-cloud collaborative design.However,the large-scale integration ofdistributed renewable energy resources,coupled with the extensivedeployment of sensing and communication devices,has resulted inthe new-type power system characterized by dynamic complexityand high uncertainty[1]-[4].
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
基金Supported by Zhejiang Provincial Natural Science Foundation of China(LY22F020025)the National Natural Science Foundation of China(62072126)。
文摘The Transformer has achieved great success in the field of medical image segmentation,but its quadratic computational complexity limits its application in dense medical image prediction.Recently,the receptance weighted key value(RWKV)architecture has garnered widespread attention due to its linear computational complexity and its capability of parallel computation during training.Despite the RWKV model's proficiency in addressing long-range modeling tasks with linear computational complexity,most current RWKV-based approaches employ static scanning patterns.These patterns may inadvertently incorporate biased prior knowledge into the model's predictions.To address this challenge,we propose a multi-head scan strategy combined with padding methods to effectively simulate spatial continuity in 2D images.Within the Feature Aggregation Attention(FAA)module,asymmetric convolutions are designed to aggregate 1D sequence features along a single dimension,thereby expanding effective receptive fields while preserving structural sparsity.Additionally,panoramic token shift(P-Shift)effectively models local dependency relationships by moving tokens from a wide receptive field.Extensive experiments conducted on the ISIC17/18 and ACDC datasets demonstrate that our method exhibits superior performance in dense medical image prediction tasks.
文摘The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.