This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are ...This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.展开更多
Soil plays an important role in desert ecosystem, and is vital in constructing a steady desert ecosystem. The management and restoration of desertified land have been the focus of much discussion. The soil in Shapotou...Soil plays an important role in desert ecosystem, and is vital in constructing a steady desert ecosystem. The management and restoration of desertified land have been the focus of much discussion. The soil in Shapotou desert region has developed remarkably since artificial sand-binding vegetation established in 1946. The longer the period of dune stabilization, the greater the thickness of microbiotic crusts and subsoil. Meanwhile, proportion of silt and clay increased significantly, and soil bulk density declinced. The content of soil organic matter, N, P, and K similarly increased. Therefore, soil has developed from aeolian sand soil to Calcic-Orthic aridisols. This paper discusses the effects brought about by dust, microbiotic soil crust and soil microbes on soil-forming process. Then, we analyzed the relation between soil formation and sand-binding vegetation evolution, in order to provide a baseline for both research on desert ecosystem recovery and ecological environment governance in arid and semi-arid areas.展开更多
[Objective] The research aimed to study key problems of a new environmental dredging based on ecological protection and subsequent ecological restoration. [Method] People paid more attention to sediment pollutant remo...[Objective] The research aimed to study key problems of a new environmental dredging based on ecological protection and subsequent ecological restoration. [Method] People paid more attention to sediment pollutant removal in environmental dredging, without considering coming aquatic eco-restoration work after dredging. Factor affecting aquatic ecosystem existence and growth was screened, and ecological dredging manner was put forward. [Result] On the basis of analyzing dredging objective, effect and influence, started from ecological protection and subsequent ecological restoration, water depth and substrate were screened as priority control factors of the environmental sediment dredging. New manner of combining sediment dredging to reshape underwater terrain was put forward. [Conclusion] The research provided solution for water depth and substrate demands of the subsequent ecological restoration.展开更多
At the present stage, the contaminated site restoration project is one of the important projects in the social development process, and has received people's attention. In order to better realize the application v...At the present stage, the contaminated site restoration project is one of the important projects in the social development process, and has received people's attention. In order to better realize the application value of the project and continuously optimize the project, attention must be paid to the restoration project. This paper mainly analyzes from two aspects of secondary pollution and quality control, hoping to provide reference for the future development and progress of environmental supervision of restoration projects.展开更多
目的观察醒脑开窍针法联合改良强制性运动疗法(modified constraint induced movement therapy,mCIMT)治疗脑梗死的临床疗效以及对血清铁代谢的影响。方法选取2020年7月—2022年10月68例脑梗死患者随机分为综合治疗组(34例)和mCIMT组(34...目的观察醒脑开窍针法联合改良强制性运动疗法(modified constraint induced movement therapy,mCIMT)治疗脑梗死的临床疗效以及对血清铁代谢的影响。方法选取2020年7月—2022年10月68例脑梗死患者随机分为综合治疗组(34例)和mCIMT组(34例)。mCIMT组予强化训练患侧上肢和限制健侧上肢康复技术治疗;综合治疗组在mCIMT组基础上予醒脑开窍针法治疗。比较两组脑梗死患者临床疗效、美国国立卫生研究院卒中量表(National Institutes of Health stroke scale,NIHSS)评分、简化Fugl-Meyer评定法(Fugl-Meyer Assessment,FMA)评分、改良Barthel指数(modified Barthel index,MBI)评分、血清铁蛋白(ferritin,FE)、血清转铁蛋白(transferrin,TRF)、血清总铁结合力(total iron-binding capacity,TIBC)水平。结果治疗后,两组脑梗死患者NIHSS评分、血清FE水平均低于治疗前(P<0.01),FMA评分、MBI评分、血清TRF水平、血清TIBC水平均高于治疗前(P<0.01);综合治疗组NIHSS评分、血清FE水平均低于mCIMT组,FMA评分、MBI评分、血清TRF水平、血清TIBC水平均高于mCIMT组(P<0.01)。综合治疗组临床有效率高于mCIMT组[91.18%(31/34)vs 70.59%(24/34)](P<0.05)。结论醒脑开窍针法联合mCIMT治疗脑梗死患者疗效确切,能够改善神经缺损程度、运动功能、日常生活能力和血清铁代谢水平,值得临床进一步推广应用。展开更多
With an area of 56×104km2, the Tarim Basin is the largest inland basin in China and is also generally acknowledged as one of the most important areas for potential oil and gas exploration. On the basis of data fr...With an area of 56×104km2, the Tarim Basin is the largest inland basin in China and is also generally acknowledged as one of the most important areas for potential oil and gas exploration. On the basis of data from 22 regional seismic profiles and 40 drilling wells, 15 important first-order and second-order regional unconformities were defined.Almost all the main unconformities are superimposed unconfomities. Since the Cambrian, 5 key periods of tectonic change have occurred during the evolution of the Tarim Basin. The total eroded stratal thickness of the above-mentioned unconformities was calculated by using the method of virtual extrapolation of seismic reflection. The results indicate that the total eroded stratal thickness of different periods is quite different in different locations of the basin. Taking the Upper-Middle Ordovician as an example, its thickness restoration of eroded strata was calculated into individual stages i.e. its thickness restoration of eroded strata was calculated to different tectonic periods. Otherwise, as for the specific period of tectonic change, the underlying strata were, respectively eroded and thus the thickness restoration of eroded strata was calculated into individual intervals. Taking the Early Hercynian period as an example, the eroded stratal thickness was calculated into individual intervals to calculate the ratio of intervals of various ages occupying the total eroded thickness. The results show that for the same stratum, its degree of erosion is quite different in different periods and at different locations, due to the varying influence of tectonic movement. The unconformities of some key periods of tectonic change have different controls on the degree of erosion and the eroded range of the individual period of the underlying strata which are the typical characteristics of multi-stage superimposition of unconformities in the Tarim Basin.展开更多
The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led t...The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led to the amazing arrival of cloud services.But data security is a challenging issue for modern civilization.The main issues with cloud computing are cloud security as well as effective cloud distribution over the network.Increasing the privacy of data with encryption methods is the greatest approach,which has highly progressed in recent times.In this aspect,sanitization is also the process of confidentiality of data.The goal of this work is to present a deep learning-assisted data sanitization procedure for data security.The proposed data sanitization process involves the following steps:data preprocessing,optimal key generation,deep learning-assisted key fine-tuning,and Kronecker product.Here,the data preprocessing considers original data as well as the extracted statistical feature.Key generation is the subsequent process,for which,a self-adaptive Namib beetle optimization(SANBO)algorithm is developed in this research.Among the generated keys,appropriate keys are fine-tuned by the improved Deep Maxout classifier.Then,the Kronecker product is done in the sanitization process.Reversing the sanitization procedure will yield the original data during the data restoration phase.The study part notes that the suggested data sanitization technique guarantees cloud data security against malign attacks.Also,the analysis of proposed work in terms of restoration effectiveness and key sensitivity analysis is also done.展开更多
基金Supported by the National Natural Science Foundation of China (No.60472069)
文摘This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.
基金supported by Project in the National Science & Technology Pillar Program (2600BAD26B02-1)
文摘Soil plays an important role in desert ecosystem, and is vital in constructing a steady desert ecosystem. The management and restoration of desertified land have been the focus of much discussion. The soil in Shapotou desert region has developed remarkably since artificial sand-binding vegetation established in 1946. The longer the period of dune stabilization, the greater the thickness of microbiotic crusts and subsoil. Meanwhile, proportion of silt and clay increased significantly, and soil bulk density declinced. The content of soil organic matter, N, P, and K similarly increased. Therefore, soil has developed from aeolian sand soil to Calcic-Orthic aridisols. This paper discusses the effects brought about by dust, microbiotic soil crust and soil microbes on soil-forming process. Then, we analyzed the relation between soil formation and sand-binding vegetation evolution, in order to provide a baseline for both research on desert ecosystem recovery and ecological environment governance in arid and semi-arid areas.
基金Supported by Key Special Item of the National Science and TechnologyWater Body Pollution Control and Treatment(2008ZX07421-001)
文摘[Objective] The research aimed to study key problems of a new environmental dredging based on ecological protection and subsequent ecological restoration. [Method] People paid more attention to sediment pollutant removal in environmental dredging, without considering coming aquatic eco-restoration work after dredging. Factor affecting aquatic ecosystem existence and growth was screened, and ecological dredging manner was put forward. [Result] On the basis of analyzing dredging objective, effect and influence, started from ecological protection and subsequent ecological restoration, water depth and substrate were screened as priority control factors of the environmental sediment dredging. New manner of combining sediment dredging to reshape underwater terrain was put forward. [Conclusion] The research provided solution for water depth and substrate demands of the subsequent ecological restoration.
文摘At the present stage, the contaminated site restoration project is one of the important projects in the social development process, and has received people's attention. In order to better realize the application value of the project and continuously optimize the project, attention must be paid to the restoration project. This paper mainly analyzes from two aspects of secondary pollution and quality control, hoping to provide reference for the future development and progress of environmental supervision of restoration projects.
基金funded by the Key Project of Chinese National Programs for Fundamental Research and Development (973 Program)"Hydrocarbon accumulation and distribution prediction of typical superimposed basin in China" (grant No. G1999043305)+1 种基金the Key Program of National Natural Science Foundation of China "Studies of continental margin dynamics and hydrocarbon resource potential of the South China Sea" (grant No. 40572067)"Palaeotectonic and palaeogeographic evolution and hydrocarbon accumulation in key changing period of the Paleozoic in the Tarim Basin" (grant No. 41130422)
文摘With an area of 56×104km2, the Tarim Basin is the largest inland basin in China and is also generally acknowledged as one of the most important areas for potential oil and gas exploration. On the basis of data from 22 regional seismic profiles and 40 drilling wells, 15 important first-order and second-order regional unconformities were defined.Almost all the main unconformities are superimposed unconfomities. Since the Cambrian, 5 key periods of tectonic change have occurred during the evolution of the Tarim Basin. The total eroded stratal thickness of the above-mentioned unconformities was calculated by using the method of virtual extrapolation of seismic reflection. The results indicate that the total eroded stratal thickness of different periods is quite different in different locations of the basin. Taking the Upper-Middle Ordovician as an example, its thickness restoration of eroded strata was calculated into individual stages i.e. its thickness restoration of eroded strata was calculated to different tectonic periods. Otherwise, as for the specific period of tectonic change, the underlying strata were, respectively eroded and thus the thickness restoration of eroded strata was calculated into individual intervals. Taking the Early Hercynian period as an example, the eroded stratal thickness was calculated into individual intervals to calculate the ratio of intervals of various ages occupying the total eroded thickness. The results show that for the same stratum, its degree of erosion is quite different in different periods and at different locations, due to the varying influence of tectonic movement. The unconformities of some key periods of tectonic change have different controls on the degree of erosion and the eroded range of the individual period of the underlying strata which are the typical characteristics of multi-stage superimposition of unconformities in the Tarim Basin.
文摘The potential of cloud computing,an emerging concept to minimize the costs associated with computing has recently drawn the interest of a number of researchers.The fast advancements in cloud computing techniques led to the amazing arrival of cloud services.But data security is a challenging issue for modern civilization.The main issues with cloud computing are cloud security as well as effective cloud distribution over the network.Increasing the privacy of data with encryption methods is the greatest approach,which has highly progressed in recent times.In this aspect,sanitization is also the process of confidentiality of data.The goal of this work is to present a deep learning-assisted data sanitization procedure for data security.The proposed data sanitization process involves the following steps:data preprocessing,optimal key generation,deep learning-assisted key fine-tuning,and Kronecker product.Here,the data preprocessing considers original data as well as the extracted statistical feature.Key generation is the subsequent process,for which,a self-adaptive Namib beetle optimization(SANBO)algorithm is developed in this research.Among the generated keys,appropriate keys are fine-tuned by the improved Deep Maxout classifier.Then,the Kronecker product is done in the sanitization process.Reversing the sanitization procedure will yield the original data during the data restoration phase.The study part notes that the suggested data sanitization technique guarantees cloud data security against malign attacks.Also,the analysis of proposed work in terms of restoration effectiveness and key sensitivity analysis is also done.