Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
The escalating degradation of urban eco-environments has underscored the significance of ecological security in sustainable urban development.Green infrastructure bridges green spaces in cities and increases ecosystem...The escalating degradation of urban eco-environments has underscored the significance of ecological security in sustainable urban development.Green infrastructure bridges green spaces in cities and increases ecosystem connectivity,thereby optimizing urban ecological security patterns.This study uses Nanjing as a case study and adopts a research paradigm that involves identifying ecological sources,constructing resistance surfaces,and subsequently extracting corridors within the ecological security pattern.This method amalgamates the evaluation of green infrastructure supply and demand,leading to the identification of both ecological corridors and nodes.The findings reveal that while the supply of green infrastructure in Nanjing is low in the city center and high in the suburbs,demand is high in the central area and low in the periphery,indicating a spatial mismatch between supply and demand.Ecological corridors and nodes are categorized into the core,important,and general levels based on their centrality and areas of supply–demand optimization.The connectivity,supply capacity,and supply–demand relationship of green infrastructure in Nanjing have been enhanced to varying degrees through the ecological security pattern optimization.The results of this study can serve as a decision-making reference for optimizing green infrastructure network patterns and enhancing urban ecological security.展开更多
针对采用控制器局域网络(CAN:Controller Area Network)总线的自动操舵系统和采用串口通讯的航海导航设备之间通讯的不匹配问题,设计了一种基于Cortex-M3嵌入式平台的通信转换模块,实现了串口与CAN总线数据的双向转换功能。同时对传统CA...针对采用控制器局域网络(CAN:Controller Area Network)总线的自动操舵系统和采用串口通讯的航海导航设备之间通讯的不匹配问题,设计了一种基于Cortex-M3嵌入式平台的通信转换模块,实现了串口与CAN总线数据的双向转换功能。同时对传统CAN收发器CTM1050存在的信号稳定性不足、波特率精准度低等问题,提出并实现了一种硬件电路的替代方案,提高了数据通讯的时效性和稳定性。基于CAN2.0B扩展帧,设计了自动操舵系统内部CAN总线协议。该协议可根据报文信息优先级分配标识帧,保证了总线数据的有序传输。实验结果表明,该通讯模块功能使用正常且通讯效果良好,具有一定通用性,可在多种需要转换的设备系统上推广使用。展开更多
目的:使用卷积神经网络模型找出一种鉴别冬虫夏草真伪的便捷方法。方法:以真伪冬虫夏草为研究对象,通过人工拍摄构建图片数据库,采用Image Data Generator函数与flow函数协同实现数据增强;基于卷积神经网络对其外观特征进行智能提取,系...目的:使用卷积神经网络模型找出一种鉴别冬虫夏草真伪的便捷方法。方法:以真伪冬虫夏草为研究对象,通过人工拍摄构建图片数据库,采用Image Data Generator函数与flow函数协同实现数据增强;基于卷积神经网络对其外观特征进行智能提取,系统对比训练Le Net-5、Alex Net、Google Net、Res Net50及VGG165种模型,并对最优模型开展性能评估。结果:VGG16模型表现最优,训练集准确度达100%,验证集准确度达96.97%;进一步性能评估显示,其验证集宏平均F1-Score为94%,混淆矩阵结果表明对伪冬虫夏草的召回率达100%,真冬虫夏草召回率为88%。结论:VGG16为冬虫夏草的真伪识别提供了科学、先进、快捷的技术方法,为判断冬虫夏草真伪提供新的研究思路。展开更多
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.
基金supported by the National Natural Science Foundation of China(grant number 42371318)
文摘The escalating degradation of urban eco-environments has underscored the significance of ecological security in sustainable urban development.Green infrastructure bridges green spaces in cities and increases ecosystem connectivity,thereby optimizing urban ecological security patterns.This study uses Nanjing as a case study and adopts a research paradigm that involves identifying ecological sources,constructing resistance surfaces,and subsequently extracting corridors within the ecological security pattern.This method amalgamates the evaluation of green infrastructure supply and demand,leading to the identification of both ecological corridors and nodes.The findings reveal that while the supply of green infrastructure in Nanjing is low in the city center and high in the suburbs,demand is high in the central area and low in the periphery,indicating a spatial mismatch between supply and demand.Ecological corridors and nodes are categorized into the core,important,and general levels based on their centrality and areas of supply–demand optimization.The connectivity,supply capacity,and supply–demand relationship of green infrastructure in Nanjing have been enhanced to varying degrees through the ecological security pattern optimization.The results of this study can serve as a decision-making reference for optimizing green infrastructure network patterns and enhancing urban ecological security.
文摘针对采用控制器局域网络(CAN:Controller Area Network)总线的自动操舵系统和采用串口通讯的航海导航设备之间通讯的不匹配问题,设计了一种基于Cortex-M3嵌入式平台的通信转换模块,实现了串口与CAN总线数据的双向转换功能。同时对传统CAN收发器CTM1050存在的信号稳定性不足、波特率精准度低等问题,提出并实现了一种硬件电路的替代方案,提高了数据通讯的时效性和稳定性。基于CAN2.0B扩展帧,设计了自动操舵系统内部CAN总线协议。该协议可根据报文信息优先级分配标识帧,保证了总线数据的有序传输。实验结果表明,该通讯模块功能使用正常且通讯效果良好,具有一定通用性,可在多种需要转换的设备系统上推广使用。