期刊文献+
共找到766篇文章
< 1 2 39 >
每页显示 20 50 100
Environmental Friendly Route and Wool Shrink Proofing
1
作者 朱泉 吴婵娟 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期14-17,共4页
The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discus... The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discussed in detail. The varieties of some properties before and after protease treatment were also investigated. 展开更多
关键词 PROTEASE WOOL stabilizer pretreating auxiliary shrink proofing
在线阅读 下载PDF
Glia-to-neuron reprogramming to the rescue?
2
作者 Jack W.Hickmott Cindi M.Morshead 《Neural Regeneration Research》 SCIE CAS 2025年第5期1395-1396,共2页
Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells c... Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells could be generated from adult mouse fibroblasts is powerful proof that cell fate can be changed.An exciting extension of the discovery of cell fate impermanence is the direct cellular reprogram ming hypothesis-that terminally differentiated cells can be reprogrammed into other adult cell fates without first passing through a stem cell state. 展开更多
关键词 programming PASSING proof
暂未订购
Corrigendum: MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons
3
《Neural Regeneration Research》 SCIE CAS 2025年第4期945-945,共1页
There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Ne... There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Neural Regeneration Research(Sharma et al.,2024),because of oversight during final proof checking.The correct description should be“human-GABA receptor A-α1/β2/γ2L human embryonic kidney(HEK)recombinant cell line.”The authors apologize for any inconvenience this correction may cause for readers and editors of Neural Regeneration Research. 展开更多
关键词 FUNCTION PROOF correction
在线阅读 下载PDF
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT) 被引量:1
4
作者 Hariharan Ramachandran Richard Smith +2 位作者 Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya 《Computers, Materials & Continua》 2025年第2期3619-3641,共23页
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f... This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals. 展开更多
关键词 ICS/OT cyber Programmable Logic Controllers(PLC)security detection safety reliability proof testing gas compressor station ICS resilience security architecture ICS
在线阅读 下载PDF
一道竞赛题的推广与证明
5
作者 金磊 《中等数学》 2025年第5期14-15,共2页
如图1,在凸四边形ABCD中,∠ABC=∠ADC=90°,对角线BD上一点P满足∠APB=2CPD,线段AP上两点X、Y满足AXB=2 ADB,∠AYB=2∠ABD.证明:BD=2XY.
关键词 line segment EXTENSION ANGLE PROOF convex quadrilateral
在线阅读 下载PDF
Mathematical Analysis and Simulation of Secure Information Transmission and Processing Model
6
作者 Ren Quan Wu Jiangxing He Lei 《China Communications》 2025年第3期181-201,共21页
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem... The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically demonstrate the security of information transmission and processing under nonrandom noise(or vulnerability backdoor attack)conditions in cyberspace.This paper first proposes a security model for cyberspace information transmission and processing channels based on error correction coding theory.First,we analyze the fault tolerance and non-randomness problem of Dynamic Heterogeneous Redundancy(DHR)structured information transmission and processing channel under the condition of non-random noise or attacks.Secondly,we use a mathematical statistical method to demonstrate that for non-random noise(or attacks)on discrete memory channels,there exists a DHR-structured channel and coding scheme that enables the average system error probability to be arbitrarily small.Finally,to construct suitable coding and heterogeneous channels,we take Turbo code as an example and simulate the effects of different heterogeneity,redundancy,output vector length,verdict algorithm and dynamism on the system,which is an important guidance for theory and engineering practice. 展开更多
关键词 coding theory information systems mod-eling non-random noise security proof
在线阅读 下载PDF
一个多元函数最值问题的推广
7
作者 聂琳峻 《中等数学》 2025年第3期31-32,共2页
题目已知a、b、c∈[1,2].求证:a^(3)+b^(3)+c^(3)≤5abc.证明不妨设a≥b≥c.设f(a,b,c)=a^(3)+b^(3)+c^(3)-5abc.则f(a,b,1)-f(a,b,c)=1-c^(3)+5abc-5ab=(1-c)(1+c+c^(2)-5ab).
关键词 INEQUALITIES OPTIMIZATION multivariate functions proof techniques
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
8
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
T^(2)L:A traceable and trustable consortium blockchain for logistics
9
作者 Ming He Haodi Wang +6 位作者 Yunchuan Sun Rongfang Bie Tian Lan Qi Song Xi Zeng Matevz Pustisĕk Zhenyu Qiu 《Digital Communications and Networks》 2025年第5期1385-1393,共9页
Traceability and trustiness are two critical issues in the logistics sector.Blockchain provides a potential way for logistics tracking systems due to its traits of tamper resistance.However,it is non-trivial to apply ... Traceability and trustiness are two critical issues in the logistics sector.Blockchain provides a potential way for logistics tracking systems due to its traits of tamper resistance.However,it is non-trivial to apply blockchain on logistics because of firstly,the binding relationship between virtue data and physical location cannot be guaranteed so that frauds may exist.Secondly,it is neither practical to upload complete data on the blockchain due to the limited storage resources nor convincing to trust the digest of the data.This paper proposes a traceable and trustable consortium blockchain for logistics T^(2)L to provide an efficient solution to the mentioned problems.Specifically,the authenticated geocoding data from telecom operators’base stations are adopted to ensure the location credibility of the data before being uploaded to the blockchain for the purpose of reliable traceability of the logistics.Moreover,we propose a scheme based on Zero Knowledge Proof of Retrievability(ZK BLS-PoR)to ensure the trustiness of the data digest and the proofs to the blockchain.Any user in the system can check the data completeness by verifying the proofs instead of downloading and examining the whole data based on the proposed ZK BLS-PoR scheme,which can provide solid theoretical verification.In all,the proposed T^(2)L framework is a traceable and trustable logistics system with a high level of security. 展开更多
关键词 Consortium blockchain LOGISTICS Base station Proof of Retrievability
在线阅读 下载PDF
Secure and Privacy-Preserving Cross-Departmental Computation Framework Based on BFV and Blockchain
10
作者 Peng Zhao Yu Du 《Journal of Electronic Research and Application》 2025年第6期207-217,共11页
As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-... As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-preserving computation framework based on BFV homomorphic encryption,threshold decryption,and blockchain technology.The proposed scheme leverages homomorphic encryption to enable secure computations between sales,finance,and taxation departments,ensuring that sensitive data remains encrypted throughout the entire process.A threshold decryption mechanism is employed to prevent single-point data leakage,while blockchain and IPFS are integrated to ensure verifiability and tamper-proof storage of computation results.Experimental results demonstrate that with 5,000 sample data entries,the framework performs efficiently and is highly scalable in key stages such as sales encryption,cost calculation,and tax assessment,thereby validating its practical feasibility and security. 展开更多
关键词 Homomorphic encryption Zero-knowledge proof Blockchain Cross-departmental privacy-preserving computation
在线阅读 下载PDF
A Novel Approach to Estimating Proof Test Coverage for Emergency Shutdown Valves using a Fuzzy Inference System
11
作者 Steve Kriescher Roderick Thomas +2 位作者 Chris Phillips Neil Mac Parthaláin David J.Smith 《Journal of Dynamics, Monitoring and Diagnostics》 2025年第1期44-52,共9页
Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken us... Published proof test coverage(PTC)estimates for emergency shutdown valves(ESDVs)show only moderate agreement and are predominantly opinion-based.A Failure Modes,Effects,and Diagnostics Analysis(FMEDA)was undertaken using component failure rate data to predict PTC for a full stroke test and a partial stroke test.Given the subjective and uncertain aspects of the FMEDA approach,specifically the selection of component failure rates and the determination of the probability of detecting failure modes,a Fuzzy Inference System(FIS)was proposed to manage the data,addressing the inherent uncertainties.Fuzzy inference systems have been used previously for various FMEA type assessments,but this is the first time an FIS has been employed for use with FMEDA.ESDV PTC values were generated from both the standard FMEDA and the fuzzy-FMEDA approaches using data provided by FMEDA experts.This work demonstrates that fuzzy inference systems can address the subjectivity inherent in FMEDA data,enabling reliable estimates of ESDV proof test coverage for both full and partial stroke tests.This facilitates optimized maintenance planning while ensuring safety is not compromised. 展开更多
关键词 emergency shutdown valves failure modes effects diagnostics analysis fuzzy inference systems proof test coverage
在线阅读 下载PDF
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
12
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function Zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
Nature子刊:3类食品让糖尿病风险至少增加11%
13
《糖尿病之友》 2025年第9期7-7,共1页
2025年6月30日,华盛顿大学研究团队在《Nature Medicine》期刊上发表了一篇题为《Health effects associated with consumption of processed meat,sugar-sweetened beverages and trans fatty acids:a Burden of Proof study》的研究... 2025年6月30日,华盛顿大学研究团队在《Nature Medicine》期刊上发表了一篇题为《Health effects associated with consumption of processed meat,sugar-sweetened beverages and trans fatty acids:a Burden of Proof study》的研究论文。研究结果发现,与不摄入加工肉类相比,每天摄入0.6~57克加工肉类,患2型糖尿病的风险平均至少高11%。 展开更多
关键词 Burden of Proof研究 加工肉类 糖甜饮料
原文传递
Polynomial Commitment in a Verkle Tree Based on a Non-Positional Polynomial Notation
14
作者 Kunbolat T.Algazy Kairat S.Sakan +1 位作者 Saule E.Nyssanbayeva Ardabek Khompysh 《Computers, Materials & Continua》 2025年第7期1581-1595,共15页
This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree sig... This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs. 展开更多
关键词 Verkle tree Verkle tree commitment and proof non-positional polynomial notation(NPN) Chinese remainder theorem
在线阅读 下载PDF
Decompesition of Kernel and Maximal Generalized Bochner-Riesz Means 被引量:1
15
作者 陆善镇 《Chinese Quarterly Journal of Mathematics》 CSCD 1989年第1期23+16-22,共8页
设l∈N,δ=k/p-k+1/2,以及<p<1.本文的主要结果是建立广义BochnerRiesz平均的核的某种分解: ((1-|ξ|~l)~σ+)^(x)=sum from f=1 to J(k,l,p) b_f((1-|ξ|~2)ь+ζ)^(x)+T(|x|),其中T满足 T^(n+1)(s)≤cmin{(1+s)_(k-n-2),(1+s)^(... 设l∈N,δ=k/p-k+1/2,以及<p<1.本文的主要结果是建立广义BochnerRiesz平均的核的某种分解: ((1-|ξ|~l)~σ+)^(x)=sum from f=1 to J(k,l,p) b_f((1-|ξ|~2)ь+ζ)^(x)+T(|x|),其中T满足 T^(n+1)(s)≤cmin{(1+s)_(k-n-2),(1+s)^(-k,p)},0<s<∞以及n=[K(1/p-1)]·作为上述分解的一个直接结果,我们得到:临界阶广义Bochner-Riesz平均在H^p(R^k)上的a.e.收敛性。 展开更多
关键词 RIESZ satisfying MAXIMAL 数学季刊 proof ARGUMENT KERNEL implies INEQUALITY uniquely
在线阅读 下载PDF
Boundedness of Solutions of A Class of Certain Integro-Differential Equations 被引量:1
16
作者 孟繁伟 《Chinese Quarterly Journal of Mathematics》 CSCD 1989年第2期102+94-101,共9页
本文研究了积分-微分方程解的有界性质。给出了方程(A)所有解有界的判別准则,同时也研究了方程(A)解的渐近性质。给出了方程(A)所有解当t→∞时趋向于有穷极限的充分条件。
关键词 解的有界性 积分-微分方程 渐近性质 有穷 proof BOUNDEDNESS INEQUALITY 数学季刊 satisfied quasi
在线阅读 下载PDF
The Exceptional Set of Goldbach-Numbers(Ⅲ)
17
作者 陈景润 刘健民 《Chinese Quarterly Journal of Mathematics》 CSCD 1989年第1期15+1-14,共15页
本文把能表成两个奇素数之和的偶数称为Goldbach数,以E(x)记作不超过x的非Goldbach数的数目,并且证明了E(x)=O(x^(0.95)
关键词 奇素数 INTEGER GOLDBACH LEMMA proof 陈景润 数学季刊 letter notes 石西
在线阅读 下载PDF
Future-Proofing the Mind From helping paralyzed patients to powering a strategic industry,BCI technology is moving from lab to life
18
作者 Yuan Yuan 《Beijing Review》 2026年第4期40-41,共2页
During his first year as an entrepreneur,Han Bicheng washed his hair roughly three times a day-more than 800 times in a single year.He and his team had to repeatedly apply conductive gel to their scalps to capture the... During his first year as an entrepreneur,Han Bicheng washed his hair roughly three times a day-more than 800 times in a single year.He and his team had to repeatedly apply conductive gel to their scalps to capture the clean electroencephalogram signals needed for their experiments,a routine that kept them in a near-constant cycle of shampooing. 展开更多
关键词 conductive gel apply conductive gel future proofing brain computer interface paralysis electroencephalogram entrepreneurship
原文传递
A Geometric Property of Vector Fields on R^n
19
作者 韩茂安 《Chinese Quarterly Journal of Mathematics》 CSCD 1989年第1期24-31,共8页
In this paper we prove a geometric property of orbits of ve ctor fields on R^n near hyperbolic singular points. Let f: R^n→R^n be an analytic function with f(O)=O, grad f=O at x=O. Then the grad f of f determines a v... In this paper we prove a geometric property of orbits of ve ctor fields on R^n near hyperbolic singular points. Let f: R^n→R^n be an analytic function with f(O)=O, grad f=O at x=O. Then the grad f of f determines a vector field as follows dx_1/ dt=af/ax_1, dx_2/dt = Of/Ox_2, '',dx_n/dt =af/ax_n. suppose x(t)=(x_1(t)),…x_n(t)) is a solution of the above system with propcrty that limx(t)=O. The following problems were posed by profeSsor T-C.Kuo(University of Sydnoy) Probiem 1. Does x have a unique tangent at 0? That is, the li mit lim x(t)/x(t)=O exist? Problem 2. If the above limit exists, is it true that lim x′(t)/x′(t)=lim x(t)/x(t)? 展开更多
关键词 双曲奇点 几何性质 向量场 微分系统 特征根 singular ANSWER 数学季刊 茂安 proof
在线阅读 下载PDF
An Image Authentication Method by Grouping Most Significant Bits
20
作者 Chi-Shiang Chan Yuan-Yu Tsai Chao-Liang Liu 《Journal of Electronic Science and Technology》 CAS 2013年第1期33-37,共5页
In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered p... In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan's method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. In this paper, we group four most-significant bits into different groups to form a mapping codebook and the mapping codebook is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas. 展开更多
关键词 Image authentication information hiding tamper proofing.
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部