The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shar...On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shared recent developments,key data,and future trends in major markets,offering guidance for industry practitioners to drive progress.展开更多
Postoperative infection is a major global health concern,affecting 5%-10%of surgical patients and nearly doubling mortality in severe cases[1].Transplant recipients are particularly vulnerable,with 30%-80%developing i...Postoperative infection is a major global health concern,affecting 5%-10%of surgical patients and nearly doubling mortality in severe cases[1].Transplant recipients are particularly vulnerable,with 30%-80%developing infections within 30 days,often from opportunistic pathogens[2,3].Key risk factors include epidemiological exposure,net immunosuppression,age,transplant type,and surgical history[4].Despite known infection risks,current evidence remains transplantation type-specific and neglects behavioral modulators[5].Different types of transplantation may share similar risk factors[6].To identify common factors affecting postoperative infection,this study collected standardized clinical data-including diet,psychological response,medication use,and biochemical indicators-from liver and kidney transplant patients across six hospitals using a unified standard operating procedure(SOP).展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser...The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.展开更多
A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malai...A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malaisei group is provided.展开更多
Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This ...Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This study aims to elucidate the response patterns of nitrogen-cycling microorganisms under long-term heavy metal(loids)exposure.The results showed that the diversity and abundance of nitrogen-cyclingmicroorganisms showed negative feedback to heavy metal(loids)concentrations.Denitrifying microorganisms were shown to be the dominant microorganisms with over 60%of relative abundance and a complex community structure including 27 phyla.Further,the key bacterial species in the denitrification process were calculated using a random forest model,where the top three key species(Pseudomonas stutzei,Sphingobium japonicum and Leifsonia rubra)were found to play a prominent role in nitrite reduction.Functional gene analysis and qPCR revealed that nirK,which is involved in nitrite reduction,significantly accumulated in the most metal-rich soil with the increase of absolute abundance of 63.86%.The experimental results confirmed that the activity of nitrite reductase(Nir)encoded by nirK in the soil was increased at high concentrations of heavy metal(loids).Partial least squares-path model identified three potential modes of nitrite reduction processes being stimulated by heavy metal(loids),the most prominent of which contributed to enhanced nirK abundance and soil Nir activity through positive stimulation of key species.The results provide new insights and preliminary evidence on the stimulation of nitrite reduction processes by heavy metal(loids).展开更多
The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology play...The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2, MG-SLAM incorporates a dynamic target detection process that enables the detection of both known and unknown moving objects. In this process, a separate semantic segmentation thread is required to segment dynamic target instances, and the Mask R-CNN algorithm is applied on the Graphics Processing Unit (GPU) to accelerate segmentation. To reduce computational cost, only key frames are segmented to identify known dynamic objects. Additionally, a multi-view geometry method is adopted to detect unknown moving objects. The results demonstrate that MG-SLAM achieves higher precision, with an improvement from 0.2730 m to 0.0135 m in precision. Moreover, the processing time required by MG-SLAM is significantly reduced compared to other dynamic scene SLAM algorithms, which illustrates its efficacy in locating objects in dynamic scenes.展开更多
BACKGROUND Fistula-in-ano is an abnormal tunnel formation linking the anal canal with the perineum and perianal skin.Multiple imagining methods are available to evaluate it,among which magnetic resonance imaging(MRI)i...BACKGROUND Fistula-in-ano is an abnormal tunnel formation linking the anal canal with the perineum and perianal skin.Multiple imagining methods are available to evaluate it,among which magnetic resonance imaging(MRI)is the most advanced nonin-vasive preoperative method.However,it is limited in its visualization function.AIM To investigate the use of intraluminal MRI for perianal fistulas via a novel direct MRI fistulography method.METHODS We mixed 3%hydrogen peroxide(HP)with gadolinium for HPMRI fistulogra-phy,retrospectively analyzing 60 cases of complex/recurrent fistula-in-ano using physical examination,trans-perineal ultrasonography(TPUS),low-spatial-reso-lution MRI,and high-resolution direct HPMRI fistulography.We assessed detec-tion rates of fistula tracks,internal openings,their relationship with anal sphinc-ters,and perianal abscesses using statistical analyses,including interobserver agreement(Kappa statistic),and compared results with intraoperative findings.RESULTS Surgical confirmation in 60 cases showed that high-resolution direct HPMRI fis-tulography provided superior detection rates for internal openings(153)and fistula tracks(162)compared to physical exams,TPUS,and low-spatial-resolution MRI(Z>5.7,P<0.05).The effectiveness of physical examination and TPUS was also inferior to that of our method for detecting perianal abscesses(54)(Z=6.773,3.694,P<0.05),whereas that of low-spatial-resolution MRI was not significantly different(Z=1.851,P=0.06).High-resolution direct HPMRI fistulography also achieved the highest interobserver agreement(Kappa:0.89,0.85,and 0.80),while low-spatial-resolution MRI showed moderate agreement(Kappa:0.78,0.74,and 0.69).TPUS and physical examination had lower agreement(Kappa range:0.33-0.63).CONCLUSION High-resolution direct HPMRI fistulography enhances the visualization of recurrent and complex fistula-in-ano,including branched fistulas,allowing for precise planning and improved surgical outcomes.展开更多
This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to...This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%.展开更多
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee...In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.展开更多
This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolu...This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS).展开更多
Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in speci...Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.展开更多
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘On January 23,2026,the second plenary session of the China Expo Forum for International Cooperation(CEFCO) convened in Wuhan,Hubei Province.Amid significant changes in the global exhibition landscape,participants shared recent developments,key data,and future trends in major markets,offering guidance for industry practitioners to drive progress.
基金the MOST Key Research and Development Program of China(grant number 2022YFC2304703)the Natural Science Foundation of China(grant number 32422004)+5 种基金The Medicine and Engineering Interdisciplinary Research Fund of Shanghai Jiao Tong University(grant number 24X010301328)the Natural Science Foundation of China(grant number 32270202)the Computational Biology Program of Science and Technology Commission of Shanghai Municipality(STCSM)(grant number 25JS2810200)the MOST Key Research and Development Program of China(grant number 2020YFA0907200)Program of Shanghai Academic Research Leader(grant number 23XD1422300)Innovative research team of high-level local universities in Shanghai.All funding sources are attributed to N.N.L.
文摘Postoperative infection is a major global health concern,affecting 5%-10%of surgical patients and nearly doubling mortality in severe cases[1].Transplant recipients are particularly vulnerable,with 30%-80%developing infections within 30 days,often from opportunistic pathogens[2,3].Key risk factors include epidemiological exposure,net immunosuppression,age,transplant type,and surgical history[4].Despite known infection risks,current evidence remains transplantation type-specific and neglects behavioral modulators[5].Different types of transplantation may share similar risk factors[6].To identify common factors affecting postoperative infection,this study collected standardized clinical data-including diet,psychological response,medication use,and biochemical indicators-from liver and kidney transplant patients across six hospitals using a unified standard operating procedure(SOP).
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
文摘The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.
基金supported by the Scientific Research Project of Baishanzu National Park(2023JBGS07)the National Natural Science Foundation of China(31970447,32370500)the Special Funds for Scientific Research of Postdoctoral Work Station Assessment in Zhejiang Province,China(2023).
文摘A new species of the Macrophya malaisei group in the genus Macrophya Dahlbom,1835 from Zhejiang in China is described:M.alboclypea Li,Liu&Wei sp.nov.A revised key to the Chinese and Japanese species of the M.malaisei group is provided.
基金supported by the National Natural Science Foundation of China(No.41977029).
文摘Mining and tailings deposition can cause serious heavy metal(loids)pollution to the surrounding soil environment.Soil microorganisms adapt their metabolism to such conditions,driving alterations in soil function.This study aims to elucidate the response patterns of nitrogen-cycling microorganisms under long-term heavy metal(loids)exposure.The results showed that the diversity and abundance of nitrogen-cyclingmicroorganisms showed negative feedback to heavy metal(loids)concentrations.Denitrifying microorganisms were shown to be the dominant microorganisms with over 60%of relative abundance and a complex community structure including 27 phyla.Further,the key bacterial species in the denitrification process were calculated using a random forest model,where the top three key species(Pseudomonas stutzei,Sphingobium japonicum and Leifsonia rubra)were found to play a prominent role in nitrite reduction.Functional gene analysis and qPCR revealed that nirK,which is involved in nitrite reduction,significantly accumulated in the most metal-rich soil with the increase of absolute abundance of 63.86%.The experimental results confirmed that the activity of nitrite reductase(Nir)encoded by nirK in the soil was increased at high concentrations of heavy metal(loids).Partial least squares-path model identified three potential modes of nitrite reduction processes being stimulated by heavy metal(loids),the most prominent of which contributed to enhanced nirK abundance and soil Nir activity through positive stimulation of key species.The results provide new insights and preliminary evidence on the stimulation of nitrite reduction processes by heavy metal(loids).
基金funded by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(grant number 22KJD440001)Changzhou Science&Technology Program(grant number CJ20220232).
文摘The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2, MG-SLAM incorporates a dynamic target detection process that enables the detection of both known and unknown moving objects. In this process, a separate semantic segmentation thread is required to segment dynamic target instances, and the Mask R-CNN algorithm is applied on the Graphics Processing Unit (GPU) to accelerate segmentation. To reduce computational cost, only key frames are segmented to identify known dynamic objects. Additionally, a multi-view geometry method is adopted to detect unknown moving objects. The results demonstrate that MG-SLAM achieves higher precision, with an improvement from 0.2730 m to 0.0135 m in precision. Moreover, the processing time required by MG-SLAM is significantly reduced compared to other dynamic scene SLAM algorithms, which illustrates its efficacy in locating objects in dynamic scenes.
基金Supported by Bozhou Key Research and Development Project,No.bzzc2020031.
文摘BACKGROUND Fistula-in-ano is an abnormal tunnel formation linking the anal canal with the perineum and perianal skin.Multiple imagining methods are available to evaluate it,among which magnetic resonance imaging(MRI)is the most advanced nonin-vasive preoperative method.However,it is limited in its visualization function.AIM To investigate the use of intraluminal MRI for perianal fistulas via a novel direct MRI fistulography method.METHODS We mixed 3%hydrogen peroxide(HP)with gadolinium for HPMRI fistulogra-phy,retrospectively analyzing 60 cases of complex/recurrent fistula-in-ano using physical examination,trans-perineal ultrasonography(TPUS),low-spatial-reso-lution MRI,and high-resolution direct HPMRI fistulography.We assessed detec-tion rates of fistula tracks,internal openings,their relationship with anal sphinc-ters,and perianal abscesses using statistical analyses,including interobserver agreement(Kappa statistic),and compared results with intraoperative findings.RESULTS Surgical confirmation in 60 cases showed that high-resolution direct HPMRI fis-tulography provided superior detection rates for internal openings(153)and fistula tracks(162)compared to physical exams,TPUS,and low-spatial-resolution MRI(Z>5.7,P<0.05).The effectiveness of physical examination and TPUS was also inferior to that of our method for detecting perianal abscesses(54)(Z=6.773,3.694,P<0.05),whereas that of low-spatial-resolution MRI was not significantly different(Z=1.851,P=0.06).High-resolution direct HPMRI fistulography also achieved the highest interobserver agreement(Kappa:0.89,0.85,and 0.80),while low-spatial-resolution MRI showed moderate agreement(Kappa:0.78,0.74,and 0.69).TPUS and physical examination had lower agreement(Kappa range:0.33-0.63).CONCLUSION High-resolution direct HPMRI fistulography enhances the visualization of recurrent and complex fistula-in-ano,including branched fistulas,allowing for precise planning and improved surgical outcomes.
基金supported by the Major Project of China Railway Co.,Ltd.(Grant No.K2021J004-A).
文摘This study addresses the significant disparity in aerodynamic uplift forces experienced by single-strip high-speed pantographs under different operating directions.A systematic numerical investigation was conducted to evaluate the influence of key geometric parameters on aerodynamic characteristics,culminating in two targeted adjustment strategies.The reliability of the computational methodology was validated through comparative analysis,which revealed less than a 6%deviation in aerodynamic drag between the numerical simulations and wind tunnel tests.Aerodynamic decomposition revealed that the operating direction critically impacts the uplift force,which is governed by two factors:streamwise cross-strip positioning and the angular orientation of the arm hinge.These factors collectively determine the divergent aerodynamic responses of the panhead and frame during directional changes.By establishing a parametric database encompassing four strip-to-crossbar spacing configurations and six arm diameter variations,nonlinear response patterns of the uplift forces under different operating directions to geometric modifications were quantified.Both adjustment approaches,simultaneously reducing both streamwise and vertical strip-to-crossbar spacings to half of the original dimensions or increasing the upper arm spanwise diameter to 1.45 times and decreasing the lower arm spanwise diameter to 0.55 times the baseline values,successfully constrained aerodynamic uplift force deviations between operating directions within 3%.
文摘In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.
基金supported by the Shanxi Agricultural University Science and Technology Innovation Enhancement Project。
文摘This paper proposes a lightweight traffic sign detection system based on you only look once(YOLO).Firstly,the classification to fusion(C2f)structure is integrated into the backbone network,employing deformable convolution and bi-directional feature pyramid network(BiFPN)_Concat to improve the adaptability of the network.Secondly,the simple attention module(SimAm)is embedded to prioritize key features and reduce the complexity of the model after the C2f layer at the end of the backbone network.Next,the focal efficient intersection over union(EloU)is introduced to adjust the weights of challenging samples.Finally,we accomplish the design and deployment for the mobile app.The results demonstrate improvements,with the F1 score of 0.8987,mean average precision(mAP)@0.5 of 98.8%,mAP@0.5:0.95 of 75.6%,and the detection speed of 50 frames per second(FPS).
基金supported by the National Key R&D Program of China(No.2021YFB0301200)National Natural Science Foundation of China(No.62025208).
文摘Large-scale Language Models(LLMs)have achieved significant breakthroughs in Natural Language Processing(NLP),driven by the pre-training and fine-tuning paradigm.While this approach allows models to specialize in specific tasks with reduced training costs,the substantial memory requirements during fine-tuning present a barrier to broader deployment.Parameter-Efficient Fine-Tuning(PEFT)techniques,such as Low-Rank Adaptation(LoRA),and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency.Among these,QLoRA,which combines PEFT and quantization,has demonstrated notable success in reducing memory footprints during fine-tuning,prompting the development of various QLoRA variants.Despite these advancements,the quantitative impact of key variables on the fine-tuning performance of quantized LLMs remains underexplored.This study presents a comprehensive analysis of these key variables,focusing on their influence across different layer types and depths within LLM architectures.Our investigation uncovers several critical findings:(1)Larger layers,such as MLP layers,can maintain performance despite reductions in adapter rank,while smaller layers,like self-attention layers,aremore sensitive to such changes;(2)The effectiveness of balancing factors depends more on specific values rather than layer type or depth;(3)In quantization-aware fine-tuning,larger layers can effectively utilize smaller adapters,whereas smaller layers struggle to do so.These insights suggest that layer type is a more significant determinant of fine-tuning success than layer depth when optimizing quantized LLMs.Moreover,for the same discount of trainable parameters,reducing the trainable parameters in a larger layer is more effective in preserving fine-tuning accuracy than in a smaller one.This study provides valuable guidance for more efficient fine-tuning strategies and opens avenues for further research into optimizing LLM fine-tuning in resource-constrained environments.