Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic storage.As a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than...Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic storage.As a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other approaches such as reducing the recording volume and multiplexing technology.However,the architecture of current MRLs is identical to that of recording data into physical layers with rigid space,which leads to either severe interlayer crosstalk or finite recording layers constrained by the short working distances of the objectives.Here,we propose the concept of hybrid-layer ODS,which can record optical information into a physical layer and multiple virtual layers by using high-orthogonality random meta-channels.In the virtual layer,32 images are experimentally reconstructed through holog-raphy,where their holographic phases are encoded into 16 printed images and complementary images in the physical layer,yielding a capacity of 2.5 Tbit cm^(-3).A higher capacity is achievable with more virtual layers,suggesting hybrid-layer ODS as a possible candidate for next-generation ODS.展开更多
Clarifying the mechanisms through which coal mining affects groundwater storage(GWS)variations is crucial for water resource conservation and sustainable development.The Ordos Mining Region in China,a key energy base ...Clarifying the mechanisms through which coal mining affects groundwater storage(GWS)variations is crucial for water resource conservation and sustainable development.The Ordos Mining Region in China,a key energy base in China with significant strategic importance,has undergone intensive coal mining activities that have substantially disrupted regional groundwater circulation.This study integrated data from the Gravity Recovery and Climate Experiment Satellite(GRACE)and Famine Early Warning Systems Network(FEWS NET)Land Data Assimilation System(FLDAS)models,combined with weighted downscaling methodology and water balance principles,to reconstruct high-resolution(0.01°)terrestrial water storage(TWS)and GWS changes in the Ordos Mining Region,China from April 2002 to December 2021.The accuracy of GWS variations were validated through pumping test measurements.Subsequently,Geodetector analysis was implemented to quantify the contributions of natural and anthropogenic factors to groundwater storage dynamics.Key findings include:1)TWS in the study area showed a fluctuating but overall decreasing trend,with a total reduction of 8901.11 mm during study period.The most significant annual decrease occurred in 2021,reaching 1696.77 mm.2)GWS exhibited an accelerated decline,with an average annual change rate of 44.35 mm/yr,totaling a decrease of 887.05 mm.The lowest annual groundwater storage level was recorded in 2020,reaching 185.69 mm.3)Precipitation(PRE)contributed the most to GWS variation(q=0.52),followed by coal mining water consumption(MWS)(q=0.41).The interaction between PRE and MWS exhibited a nonlinear enhancement effect on GWS changes(0.54).The synergistic effect of natural hydrological factors has a great influence on the change of GWS,but coal mining water consumption will continue to reduce GWS.These findings provide critical references for the management and regulation of groundwater resource in mining regions.展开更多
Recent years, optically controlled phase-change memory draws intensive attention owing to some advanced applications including integrated all-optical nonvolatile memory, in-memory computing, and neuromorphic computing...Recent years, optically controlled phase-change memory draws intensive attention owing to some advanced applications including integrated all-optical nonvolatile memory, in-memory computing, and neuromorphic computing. The light-induced phase transition is the key for this technology. Traditional understanding on the role of light is the heating effect. Generally, the RESET operation of phase-change memory is believed to be a melt-quenching-amorphization process. However, some recent experimental and theoretical investigations have revealed that ultrafast laser can manipulate the structures of phase-change materials by non-thermal effects and induces unconventional phase transitions including solid-to-solid amorphization and order-to-order phase transitions. Compared with the conventional thermal amorphization,these transitions have potential superiors such as faster speed, better endurance, and low power consumption. This article summarizes some recent progress of experimental observations and theoretical analyses on these unconventional phase transitions. The discussions mainly focus on the physical mechanism at atomic scale to provide guidance to control the phase transitions for optical storage. Outlook on some possible applications of the non-thermal phase transition is also presented to develop new types of devices.展开更多
In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecomm...In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecommunications networks,the need for high-end security and efficient management of these large data files is a great challenge for network designers.The proposed model provides the efficient real-time virtual data storage of UE data files(light and heavy)using an object storage system MinIO having inbuilt Software Development Kits(SDKs)that are compatible with Amazon(S3)Application Program Interface(API)making operations like file uploading,and data retrieval extremely efficient as compared to legacy virtual storage system requiring low-level HTTP requests for data management.To provide integrity,authenticity,and confidentiality(integrity checking via an authentication tag)to the data files of UE,the encrypted algorithm 256-bit oriented-Advanced Encryption Standard(256-AES)in Galois/Counter Mode(GCM)is utilized in combination with MinIO.The AES-based MinIO signifies in more secure and faster approach than older models like Cipher Block Chaining(CBC).The performance of the proposed model is analyzed using the Iperf utility to perform the Teletraffic parametric(bandwidth,throughput,latency,and transmission delay)analysis for three different cases namely:(a)light UE traffic(uploading and retrieval)(b)heavy UE traffic(uploading and retrieval)and(c)comparison of Teletraffic parameters namely:bandwidth(Bava),throughput(Tput),data transfer(D_(Trans)),latency(L_(ms)),and transmission delay(TDelay)obtained from proposed method with legacy virtual storage methods.The results show that the suggested MinIO-based system outperforms conventional systems in terms of latency,encryption efficiency,and performance under varying data load conditions.展开更多
Encoding information in light polarization is of great importance in facilitating optical data storage(ODS)for information security and data storage capacity escalation.However,despite recent advances in nanophotonic ...Encoding information in light polarization is of great importance in facilitating optical data storage(ODS)for information security and data storage capacity escalation.However,despite recent advances in nanophotonic techniques vastly en-hancing the feasibility of applying polarization channels,the data fidelity in reconstructed bits has been constrained by severe crosstalks occurring between varied polarization angles during data recording and reading process,which gravely hindered the utilization of this technique in practice.In this paper,we demonstrate an ultra-low crosstalk polarization-en-coding multilayer ODS technique for high-fidelity data recording and retrieving by utilizing a nanofibre-based nanocom-posite film involving highly aligned gold nanorods(GNRs).With parallelizing the gold nanorods in the recording medium,the information carrier configuration minimizes miswriting and misreading possibilities for information input and output,respectively,compared with its randomly self-assembled counterparts.The enhanced data accuracy has significantly im-proved the bit recall fidelity that is quantified by a correlation coefficient higher than 0.99.It is anticipated that the demon-strated technique can facilitate the development of multiplexing ODS for a greener future.展开更多
DNA molecules are green materials with great potential for high-density and long-term data storage.However,the current data-writing process of DNA data storage via DNA synthesis suffers from high costs and the product...DNA molecules are green materials with great potential for high-density and long-term data storage.However,the current data-writing process of DNA data storage via DNA synthesis suffers from high costs and the production of hazards,limiting its practical applications.Here,we developed a DNA movable-type storage system that can utilize DNA fragments pre-produced by cell factories for data writing.In this system,these pre-generated DNA fragments,referred to herein as“DNA movable types,”are used as basic writing units in a repetitive way.The process of data writing is achieved by the rapid assembly of these DNA movable types,thereby avoiding the costly and environmentally hazardous process of de novo DNA synthesis.With this system,we successfully encoded 24 bytes of digital information in DNA and read it back accurately by means of high-throughput sequencing and decoding,thereby demonstrating the feasibility of this system.Through its repetitive usage and biological assembly of DNA movable-type fragments,this system exhibits excellent potential for writing cost reduction,opening up a novel route toward an economical and sustainable digital data-storage technology.展开更多
Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server a...Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient.展开更多
Tailoring 1D nanotubes with refined interfacial interactions and optimized adsorption sites presents a highly promising yet challenging strategy for advancing Na/Li-ion batteries(SIBs/LIBs).Herein,the intertwined yard...Tailoring 1D nanotubes with refined interfacial interactions and optimized adsorption sites presents a highly promising yet challenging strategy for advancing Na/Li-ion batteries(SIBs/LIBs).Herein,the intertwined yardlong bean-like Fe_(9)Ni_(9)S_(16)/FeS heterostructures with sulfur vacancies encapsulated in N-doped carbon nanotubes(3 N-Fe_(9)Ni_(9)S_(16)/FeS-3@CNTs)are controllably synthesized through Fe/Ni-catalyzed pyrolysis of dicyandiamide followed by sulfidation strategies.1D nanotubes with robust outer walls and internal cavity structures shorten the diffusion paths of ions/electrons and buffer volume expansion and aggregation of active materials.The Fe_(9)Ni_(9)S_(16)/FeS heterostructure provides a powerful driving force for charge transfer by forming built-in electric fields,optimizing ion adsorption,while the Fe_(9)Ni_(9)S_(16)features a wider interlayer spacing that allows for frequent Na+/Li+insertion and extraction,thereby enhancing the reaction kinetics within the electrode.Driven by these synergistic factors,the 3 N-Fe_(9)Ni_(9)S_(16)/FeS-3@CNTs demonstrates remarkable electrochemical performance,achieving a substantial reversible capacity of up to 682.1mA h g^(−1)for SIBs at 0.1 A g^(−1)and 782.7 mA h g^(−1)for LIBs at 0.5 A g−1,alongside exceptional cycling stability in SIBs,maintaining 78.7%of its capacity after 1500 cycles at 1 A g^(−1)coupling with the ether-based electrolyte.Employing various electrochemical analyses in conjunction with ex-situ characterization techniques and Density Functional Theory(DFT)calculations,the storage mechanisms and phase transition processes are investigated,elucidating the structure-composition-performance relationships.This work paves the way for a new strategy in designing advanced materials with engineered heterostructures and controllable defects for energy conversion and storage devices.展开更多
Sodium-ion batteries (SIBs) have attracted increasing attention in the past decades, because of high over-all abundance of precursors, their even geographical distribution, and low cost. Na3V2(PO4)3 (NVP), atypi...Sodium-ion batteries (SIBs) have attracted increasing attention in the past decades, because of high over-all abundance of precursors, their even geographical distribution, and low cost. Na3V2(PO4)3 (NVP), atypical sodium super ion conductor (NASlCON)-based electrode material, exhibits pronounced structuralstability, exceptionally high ion conductivity, rendering it a most promising electrode for sodium storage.However. the comparatively low electronic conductivity makes the theoretical capacity of NVP cannot befully accessible even at comparatively low rates, presenting a major drawback for further practical ap-plications, especially when high rate capability is especially important. Thus, many endeavors have beenconformed to increase the surface and intrinsic electrical conductivity of NVP by coating the active mate-rials with a conductive carbon layer, downsizing the NVP particles, combining the NVP particle with vari-ous carbon materials and ion doping strategy. In this review, to get a better understanding on the sodiumstorage in NVP, we firstly present 4 distinct crystal structures in the temperature range of-30℃-225℃ namely α-NVP, β-NVP, β′-NVP and γ-NVP. Moreover, we give an overview of recent approaches to en-hance the surface electrical conductivity and intrinsic electrical conductivity of NVP. Finally, some poten-tial applications of NVP such as in all-climate environment and PHEV, EV fields have been prospected.展开更多
Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which ...Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which claimed that NC-Audit can effectively realize privacy-preserving data auditing for distributed storage systems.However,our analysis shows that NC-Audit is not secure for that the adversarial cloud can forge some illegal blocks to cheat the auditor successfully with a high probability even without storing the user’s whole data,when the coding field is large enough.展开更多
An attempt of applying a novel genetic programming(GP) technique,a new member of evolution algorithms,has been made to predict the water storage of Wolonghu wetland response to the climate change in northeastern part ...An attempt of applying a novel genetic programming(GP) technique,a new member of evolution algorithms,has been made to predict the water storage of Wolonghu wetland response to the climate change in northeastern part of China with little data set.Fourteen years(1993-2006) of annual water storage and climatic data set of the wetland were taken for model training and testing.The results of simulations and predictions illustrated a good fit between calculated water storage and observed values(MAPE=9.47,r=0.99).By comparison,a multilayer perceptron(MLP)(a popular artificial neural network model) method and a grey model(GM) with the same data set were applied for performances estimation.It was found that GP technique had better performances than the other two methods both in the simulation step and predicting phase and the results were analyzed and discussed.The case study confirmed that GP method is a promising way for wetland managers to make a quick estimation of fluctuations of water storage in some wetlands under condition of little data set.展开更多
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can b...The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of DNA.Vector quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency.This article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage Systems.The proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data storage.Besides,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded form.In addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably minimized.In order to generate optimal codebook for LBG,the WSA is applied to it.The performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several measures.The comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.展开更多
With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve...With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve the above-mentioned issues,a NAS-based storage network(for short NASSN)has been designed.Firstly,the NASSN integrates multi-NAS,iNAS(an iSCSI-based NAS)and enterprise SAN with the help of storage virtualization,which can provide a greater capacity and better scalability.Secondly,the NASSN can provide high availability with the help of server and storage subsystem redundancy technologies.Thirdly,the NASSN simultaneously serves for both the file I/O and the block I/O with the help of an iSCSI module,which has the advantages of NAS and SAN.Finally,the NASSN can provide higher I/O speed by a high network-attached channel which implements the direct data transfer between the storage device and client.In the experiments,the NASSN has ultra-high-throughput for both of the file I/O requests and the block I/O requests.展开更多
A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). ...A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). The MUVFS offers a storage volume view for each authorized user who can access only the data in his own storage volume, the security scheme enables all users to encrypt and decrypt the data of their own storage view at client-side, and the USN server needs only to check the users’ identities and the data’s integrity. Experiments were performed to compare the sequential read, write and read/write rates of NFS+MUVFS+secure_module with those of NFS. The results indicate that the security of the USN is improved greatly with little influence on the system performance when the MUVFS and the security scheme are integrated into it.展开更多
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac...This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.展开更多
Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the...Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery.展开更多
China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches ...China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches the magnitude of PB,and the amount of data is still increasing.The safe management of these marine data storage is the basis of building a Smart Ocean.This paper discusses the current situation of security management of marine data storage in China,analyzes the problems of security management in domestic marine data storage,and puts forward suggestions.展开更多
Based on the experience and achievement of the"China Digital Ocean", the classification plan for Marine data elements is made, which can be classified into five, including marine point elements, marine line elements...Based on the experience and achievement of the"China Digital Ocean", the classification plan for Marine data elements is made, which can be classified into five, including marine point elements, marine line elements, marine polygon elements, marine grid elements and marine dynamic elements. In this paper, the technology of features and object-oriented method, a spatial-temporal data model is proposed, which can be applied in the large information system engineering like the "Digital Ocean", and this paper discusses the application of spatial data model, marine three-dimensional raster data model and relation data model in the building of Data Warehouse in "China Digital Ocean", and concludes the merits of these models.展开更多
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy...In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.展开更多
基金the National Key Research and Development Program of China(2022YFB3607300)the National Natural Science Foundation of China(62322512 and 12134013)+3 种基金the Chinese Acad-emy of Sciences Project for Young Scientists in Basic Research(YSBR-049)support from the University of Science and Technology of China’s Center for Micro and Nanoscale Research and Fabricationsupported by the China Postdoctoral Science Foundation(2023M743364)supercomputing system in Hefei Advanced Computing Center and the Supercomputing Center of University of Science and Technology of China.
文摘Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic storage.As a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other approaches such as reducing the recording volume and multiplexing technology.However,the architecture of current MRLs is identical to that of recording data into physical layers with rigid space,which leads to either severe interlayer crosstalk or finite recording layers constrained by the short working distances of the objectives.Here,we propose the concept of hybrid-layer ODS,which can record optical information into a physical layer and multiple virtual layers by using high-orthogonality random meta-channels.In the virtual layer,32 images are experimentally reconstructed through holog-raphy,where their holographic phases are encoded into 16 printed images and complementary images in the physical layer,yielding a capacity of 2.5 Tbit cm^(-3).A higher capacity is achievable with more virtual layers,suggesting hybrid-layer ODS as a possible candidate for next-generation ODS.
基金Under the National Key R&D Program Key Project(No.2021YFC3201201)National Natural Science Foundation of China(No.52360032)+2 种基金Basic Scientific Research Business Fee Project of Colleges And Universities Directly Under the Inner Mongolia Autonomous Region(No.JBYYWF2022001)Development Plan of Innovation Team of Colleges And Universities in Inner Mongolia Autonomous Region(No.NMGIRT2313)the Innovation Team of‘Grassland Talents’。
文摘Clarifying the mechanisms through which coal mining affects groundwater storage(GWS)variations is crucial for water resource conservation and sustainable development.The Ordos Mining Region in China,a key energy base in China with significant strategic importance,has undergone intensive coal mining activities that have substantially disrupted regional groundwater circulation.This study integrated data from the Gravity Recovery and Climate Experiment Satellite(GRACE)and Famine Early Warning Systems Network(FEWS NET)Land Data Assimilation System(FLDAS)models,combined with weighted downscaling methodology and water balance principles,to reconstruct high-resolution(0.01°)terrestrial water storage(TWS)and GWS changes in the Ordos Mining Region,China from April 2002 to December 2021.The accuracy of GWS variations were validated through pumping test measurements.Subsequently,Geodetector analysis was implemented to quantify the contributions of natural and anthropogenic factors to groundwater storage dynamics.Key findings include:1)TWS in the study area showed a fluctuating but overall decreasing trend,with a total reduction of 8901.11 mm during study period.The most significant annual decrease occurred in 2021,reaching 1696.77 mm.2)GWS exhibited an accelerated decline,with an average annual change rate of 44.35 mm/yr,totaling a decrease of 887.05 mm.The lowest annual groundwater storage level was recorded in 2020,reaching 185.69 mm.3)Precipitation(PRE)contributed the most to GWS variation(q=0.52),followed by coal mining water consumption(MWS)(q=0.41).The interaction between PRE and MWS exhibited a nonlinear enhancement effect on GWS changes(0.54).The synergistic effect of natural hydrological factors has a great influence on the change of GWS,but coal mining water consumption will continue to reduce GWS.These findings provide critical references for the management and regulation of groundwater resource in mining regions.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61922035 and 11904118)
文摘Recent years, optically controlled phase-change memory draws intensive attention owing to some advanced applications including integrated all-optical nonvolatile memory, in-memory computing, and neuromorphic computing. The light-induced phase transition is the key for this technology. Traditional understanding on the role of light is the heating effect. Generally, the RESET operation of phase-change memory is believed to be a melt-quenching-amorphization process. However, some recent experimental and theoretical investigations have revealed that ultrafast laser can manipulate the structures of phase-change materials by non-thermal effects and induces unconventional phase transitions including solid-to-solid amorphization and order-to-order phase transitions. Compared with the conventional thermal amorphization,these transitions have potential superiors such as faster speed, better endurance, and low power consumption. This article summarizes some recent progress of experimental observations and theoretical analyses on these unconventional phase transitions. The discussions mainly focus on the physical mechanism at atomic scale to provide guidance to control the phase transitions for optical storage. Outlook on some possible applications of the non-thermal phase transition is also presented to develop new types of devices.
文摘In the modern era of 5th generation(5G)networks,the data generated by User Equipments(UE)has increased significantly,with data file sizes varying from modest sensor logs to enormous multimedia files.In modern telecommunications networks,the need for high-end security and efficient management of these large data files is a great challenge for network designers.The proposed model provides the efficient real-time virtual data storage of UE data files(light and heavy)using an object storage system MinIO having inbuilt Software Development Kits(SDKs)that are compatible with Amazon(S3)Application Program Interface(API)making operations like file uploading,and data retrieval extremely efficient as compared to legacy virtual storage system requiring low-level HTTP requests for data management.To provide integrity,authenticity,and confidentiality(integrity checking via an authentication tag)to the data files of UE,the encrypted algorithm 256-bit oriented-Advanced Encryption Standard(256-AES)in Galois/Counter Mode(GCM)is utilized in combination with MinIO.The AES-based MinIO signifies in more secure and faster approach than older models like Cipher Block Chaining(CBC).The performance of the proposed model is analyzed using the Iperf utility to perform the Teletraffic parametric(bandwidth,throughput,latency,and transmission delay)analysis for three different cases namely:(a)light UE traffic(uploading and retrieval)(b)heavy UE traffic(uploading and retrieval)and(c)comparison of Teletraffic parameters namely:bandwidth(Bava),throughput(Tput),data transfer(D_(Trans)),latency(L_(ms)),and transmission delay(TDelay)obtained from proposed method with legacy virtual storage methods.The results show that the suggested MinIO-based system outperforms conventional systems in terms of latency,encryption efficiency,and performance under varying data load conditions.
基金financial supports from the National Natural Science Foundation of China(Grant Nos.62174073,61875073,11674130,91750110 and 61522504)the National Key R&D Program of China(Grant No.2018YFB1107200)+3 种基金the Guangdong Provincial Innovation and Entrepren-eurship Project(Grant No.2016ZT06D081)the Natural Science Founda-tion of Guangdong Province,China(Grant Nos.2016A030306016 and 2016TQ03X981)the Pearl River Nova Program of Guangzhou(Grant No.201806010040)the Technology Innovation and Development Plan of Yantai(Grant No.2020XDRH095).
文摘Encoding information in light polarization is of great importance in facilitating optical data storage(ODS)for information security and data storage capacity escalation.However,despite recent advances in nanophotonic techniques vastly en-hancing the feasibility of applying polarization channels,the data fidelity in reconstructed bits has been constrained by severe crosstalks occurring between varied polarization angles during data recording and reading process,which gravely hindered the utilization of this technique in practice.In this paper,we demonstrate an ultra-low crosstalk polarization-en-coding multilayer ODS technique for high-fidelity data recording and retrieving by utilizing a nanofibre-based nanocom-posite film involving highly aligned gold nanorods(GNRs).With parallelizing the gold nanorods in the recording medium,the information carrier configuration minimizes miswriting and misreading possibilities for information input and output,respectively,compared with its randomly self-assembled counterparts.The enhanced data accuracy has significantly im-proved the bit recall fidelity that is quantified by a correlation coefficient higher than 0.99.It is anticipated that the demon-strated technique can facilitate the development of multiplexing ODS for a greener future.
基金supported by the National Key Research and Development Program of China(2018YFA0900100)the Natural Science Foundation of Tianjin,China(19JCJQJC63300)Tianjin University。
文摘DNA molecules are green materials with great potential for high-density and long-term data storage.However,the current data-writing process of DNA data storage via DNA synthesis suffers from high costs and the production of hazards,limiting its practical applications.Here,we developed a DNA movable-type storage system that can utilize DNA fragments pre-produced by cell factories for data writing.In this system,these pre-generated DNA fragments,referred to herein as“DNA movable types,”are used as basic writing units in a repetitive way.The process of data writing is achieved by the rapid assembly of these DNA movable types,thereby avoiding the costly and environmentally hazardous process of de novo DNA synthesis.With this system,we successfully encoded 24 bytes of digital information in DNA and read it back accurately by means of high-throughput sequencing and decoding,thereby demonstrating the feasibility of this system.Through its repetitive usage and biological assembly of DNA movable-type fragments,this system exhibits excellent potential for writing cost reduction,opening up a novel route toward an economical and sustainable digital data-storage technology.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work is supported by National Natural Science Foundation of China (No: 61379144), Foundation of Science and Technology on Information Assurance Laboratory (No: KJ-13-002) and the Graduate Innovation Fund of the National University of Defense Technology.
文摘Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient.
基金supported by the program of National Research Foundation of Korea(NRF)funded by the Ministry of Science,ICT and Future planning(grant number 2022R1A4A1034312,2023R1A2C1007413)by the Commercialization Promotion Agency for R&D Outcomes(COMPA)grant funded by the Korean Government(Ministery of Science and ICT)(RS-2023-00304764)。
文摘Tailoring 1D nanotubes with refined interfacial interactions and optimized adsorption sites presents a highly promising yet challenging strategy for advancing Na/Li-ion batteries(SIBs/LIBs).Herein,the intertwined yardlong bean-like Fe_(9)Ni_(9)S_(16)/FeS heterostructures with sulfur vacancies encapsulated in N-doped carbon nanotubes(3 N-Fe_(9)Ni_(9)S_(16)/FeS-3@CNTs)are controllably synthesized through Fe/Ni-catalyzed pyrolysis of dicyandiamide followed by sulfidation strategies.1D nanotubes with robust outer walls and internal cavity structures shorten the diffusion paths of ions/electrons and buffer volume expansion and aggregation of active materials.The Fe_(9)Ni_(9)S_(16)/FeS heterostructure provides a powerful driving force for charge transfer by forming built-in electric fields,optimizing ion adsorption,while the Fe_(9)Ni_(9)S_(16)features a wider interlayer spacing that allows for frequent Na+/Li+insertion and extraction,thereby enhancing the reaction kinetics within the electrode.Driven by these synergistic factors,the 3 N-Fe_(9)Ni_(9)S_(16)/FeS-3@CNTs demonstrates remarkable electrochemical performance,achieving a substantial reversible capacity of up to 682.1mA h g^(−1)for SIBs at 0.1 A g^(−1)and 782.7 mA h g^(−1)for LIBs at 0.5 A g−1,alongside exceptional cycling stability in SIBs,maintaining 78.7%of its capacity after 1500 cycles at 1 A g^(−1)coupling with the ether-based electrolyte.Employing various electrochemical analyses in conjunction with ex-situ characterization techniques and Density Functional Theory(DFT)calculations,the storage mechanisms and phase transition processes are investigated,elucidating the structure-composition-performance relationships.This work paves the way for a new strategy in designing advanced materials with engineered heterostructures and controllable defects for energy conversion and storage devices.
基金financial support from the National Natural Science Foundation of China (No.21501171,51403209,21406221,51177156/E0712)
文摘Sodium-ion batteries (SIBs) have attracted increasing attention in the past decades, because of high over-all abundance of precursors, their even geographical distribution, and low cost. Na3V2(PO4)3 (NVP), atypical sodium super ion conductor (NASlCON)-based electrode material, exhibits pronounced structuralstability, exceptionally high ion conductivity, rendering it a most promising electrode for sodium storage.However. the comparatively low electronic conductivity makes the theoretical capacity of NVP cannot befully accessible even at comparatively low rates, presenting a major drawback for further practical ap-plications, especially when high rate capability is especially important. Thus, many endeavors have beenconformed to increase the surface and intrinsic electrical conductivity of NVP by coating the active mate-rials with a conductive carbon layer, downsizing the NVP particles, combining the NVP particle with vari-ous carbon materials and ion doping strategy. In this review, to get a better understanding on the sodiumstorage in NVP, we firstly present 4 distinct crystal structures in the temperature range of-30℃-225℃ namely α-NVP, β-NVP, β′-NVP and γ-NVP. Moreover, we give an overview of recent approaches to en-hance the surface electrical conductivity and intrinsic electrical conductivity of NVP. Finally, some poten-tial applications of NVP such as in all-climate environment and PHEV, EV fields have been prospected.
基金Supported by the National Natural Science Foundation of China(61872088)the Science and Technology Plan Project of Xi’an(2020KJWL02,2017CGWL35)the China National Study Abroad Fund。
文摘Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which claimed that NC-Audit can effectively realize privacy-preserving data auditing for distributed storage systems.However,our analysis shows that NC-Audit is not secure for that the adversarial cloud can forge some illegal blocks to cheat the auditor successfully with a high probability even without storing the user’s whole data,when the coding field is large enough.
基金Sponsored by the National Basic Research Program of China(Grant No. 2006CB403302)the National Education Ministry foundation of China(Grant No.705011)the National Special Science and Technology Program Water Pollution Control and Treatment (Grant No.2009ZX07526-006,2008AX07208-001)
文摘An attempt of applying a novel genetic programming(GP) technique,a new member of evolution algorithms,has been made to predict the water storage of Wolonghu wetland response to the climate change in northeastern part of China with little data set.Fourteen years(1993-2006) of annual water storage and climatic data set of the wetland were taken for model training and testing.The results of simulations and predictions illustrated a good fit between calculated water storage and observed values(MAPE=9.47,r=0.99).By comparison,a multilayer perceptron(MLP)(a popular artificial neural network model) method and a grey model(GM) with the same data set were applied for performances estimation.It was found that GP technique had better performances than the other two methods both in the simulation step and predicting phase and the results were analyzed and discussed.The case study confirmed that GP method is a promising way for wetland managers to make a quick estimation of fluctuations of water storage in some wetlands under condition of little data set.
基金This research was supported in part by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493)in part by the NRF grant funded by the Korea government(MSIT)(NRF-2022R1A2C1004401)in part by the 2022 Yeungnam University Research Grant.
文摘The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of data.To accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of DNA.Vector quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency.This article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage Systems.The proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data storage.Besides,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded form.In addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably minimized.In order to generate optimal codebook for LBG,the WSA is applied to it.The performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several measures.The comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60673191and90304011)Science Innovation Term Foundation of Guang-dong University of Foreign Studies(Grant No.GW2006-AT-005)Science Innovation Term Foundation of School of Informatics Guangdong University of Foreign Studies.
文摘With the digital information and application requirement on the Internet increasing fleetly nowadays,it is urgent to work out a network storage system with a large capacity,a high availability and scalability.To solve the above-mentioned issues,a NAS-based storage network(for short NASSN)has been designed.Firstly,the NASSN integrates multi-NAS,iNAS(an iSCSI-based NAS)and enterprise SAN with the help of storage virtualization,which can provide a greater capacity and better scalability.Secondly,the NASSN can provide high availability with the help of server and storage subsystem redundancy technologies.Thirdly,the NASSN simultaneously serves for both the file I/O and the block I/O with the help of an iSCSI module,which has the advantages of NAS and SAN.Finally,the NASSN can provide higher I/O speed by a high network-attached channel which implements the direct data transfer between the storage device and client.In the experiments,the NASSN has ultra-high-throughput for both of the file I/O requests and the block I/O requests.
文摘A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). The MUVFS offers a storage volume view for each authorized user who can access only the data in his own storage volume, the security scheme enables all users to encrypt and decrypt the data of their own storage view at client-side, and the USN server needs only to check the users’ identities and the data’s integrity. Experiments were performed to compare the sequential read, write and read/write rates of NFS+MUVFS+secure_module with those of NFS. The results indicate that the security of the USN is improved greatly with little influence on the system performance when the MUVFS and the security scheme are integrated into it.
文摘This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.
文摘Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery.
文摘China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches the magnitude of PB,and the amount of data is still increasing.The safe management of these marine data storage is the basis of building a Smart Ocean.This paper discusses the current situation of security management of marine data storage in China,analyzes the problems of security management in domestic marine data storage,and puts forward suggestions.
文摘Based on the experience and achievement of the"China Digital Ocean", the classification plan for Marine data elements is made, which can be classified into five, including marine point elements, marine line elements, marine polygon elements, marine grid elements and marine dynamic elements. In this paper, the technology of features and object-oriented method, a spatial-temporal data model is proposed, which can be applied in the large information system engineering like the "Digital Ocean", and this paper discusses the application of spatial data model, marine three-dimensional raster data model and relation data model in the building of Data Warehouse in "China Digital Ocean", and concludes the merits of these models.
基金supported by the National Key Basic Research Program of China(973 program) under Grant No.2012CB315901
文摘In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.