In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p...In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.展开更多
The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this wo...The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this work proposes a novel scheduling method called matching and multi-round allocation(MMA)to optimize the makespan and total cost for all submitted tasks subject to security and reliability constraints.The method is divided into two phases for task scheduling.The first phase is to find the best matching candidate resources for the tasks to meet their preferential demands including performance,security,and reliability in a multi-cloud environment;the second one iteratively performs multiple rounds of re-allocating to optimize tasks execution time and cost by minimizing the variance of the estimated completion time.The proposed algorithm,the modified cuckoo search(MCS),hybrid chaotic particle search(HCPS),modified artificial bee colony(MABC),max-min,and min-min algorithms are implemented in CloudSim to create simulations.The simulations and experimental results show that our proposed method achieves shorter makespan,lower cost,higher resource utilization,and better trade-off between time and economic cost.It is more stable and efficient.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel...Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.展开更多
Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Fai...Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid.展开更多
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr...Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.展开更多
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)...Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.展开更多
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B...Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.展开更多
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser...The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.展开更多
It is well recognized that Structural Health Monitoring(SHM)reliability evaluation is a key aspect that needs to be urgently addressed to promote the wide application of SHM methods.However,the existing studies typica...It is well recognized that Structural Health Monitoring(SHM)reliability evaluation is a key aspect that needs to be urgently addressed to promote the wide application of SHM methods.However,the existing studies typically transfer the Non-Destructive Testing/Evaluation(NDT/E)reliability metrics to SHM without a systematic analysis of where these metrics originated.Seldom attentions are paid to the evaluation conditions which are very important to apply these metrics.Aimed at this issue,a new condition control-based Dual-Reliability Evaluation(Dual-RE)method for SHM is proposed.This new method is proposed based on a systematic analysis of the whole framework of reliability evaluation from instrument to NDT,and emphasis is paid to the evaluation condition control.Based on these analyses,considering the special online application scenario of SHM,the proposed Dual-RE method contains two key components:Integrated Sensor-based SHM-RE(IS-SHM-RE)and Critical Service Condition-based SHM-RE(CSC-SHM-RE).ISSHM-RE evaluates the reliability of integrated SHM sensor and system themselves under approximate repeatability conditions,while CSC-SHM-RE assesses SHM reliability under the dominant uncertainties during service,namely intermediate conditions.To demonstrate the Dual-RE,crack monitoring by using the Guided Wave-based-SHM(GW-SHM)on aircraft lug structures is taken as a case study.Both the crack detection and sizing performance are evaluated from accuracy and uncertainty.展开更多
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch...The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit.展开更多
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ...Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.展开更多
This study examines the reliability and validity of AI-generated scoring for continuation writing tasks.By comparing GPT-4 with eight experienced human raters across 21 student responses,it evaluates AI’s consistency...This study examines the reliability and validity of AI-generated scoring for continuation writing tasks.By comparing GPT-4 with eight experienced human raters across 21 student responses,it evaluates AI’s consistency,severity,and alignment with human scoring criteria.Results show that AI exhibits high self-consistency and adapts effectively to different scoring roles(e.g.,teacher vs.highstakes rater).However,AI scores were more lenient than human raters and demonstrated divergent evaluation focuses—prioritizing narrative coherence and emotional depth,while teachers emphasized linguistic accuracy and richness of detail.The findings suggest AI’s potential as a supplementary assessment tool,offering rapid,holistic feedback,but highlight the need for further calibration to align with educational standards.Implications include exploring hybrid evaluation models that leverage the strengths of both AI and human raters to achieve more equitable,efficient,and pedagogically meaningful writing assessments.展开更多
A stochastic predator-prey system with Markov switching is explored.We have developed a new chasing technique to efficiently solve the Fokker-Planck-Kolmogorov and backward Kolmogorov equations.Dynamic balance and rel...A stochastic predator-prey system with Markov switching is explored.We have developed a new chasing technique to efficiently solve the Fokker-Planck-Kolmogorov and backward Kolmogorov equations.Dynamic balance and reliability of the switching system are evaluated via stationary probability density function and first-passage failure theory,taking into account factors such as switching frequencies,noise intensities,and initial conditions.Results reveal that Markov switching leads to stochastic P-bifurcation,enhancing dynamic balance and reducing white-noise-induced oscillations.But frequent switching can heighten initial value dependence,harming reliability.Further,the influence of the subsystem on the switching system is not proportional to its action probabilities.Monte Carlo simulations validate the findings,offering an in-depth exploration of these dynamics.展开更多
In this work,we demonstrated the InSnO(ITO)TFTs passivated with SiO_(2)via the PECVD process compatible with large-area production for the first time.The passivated ITO TFTs with various channel thicknesses(t_(ch)=4,5...In this work,we demonstrated the InSnO(ITO)TFTs passivated with SiO_(2)via the PECVD process compatible with large-area production for the first time.The passivated ITO TFTs with various channel thicknesses(t_(ch)=4,5,6 nm)exhibit excellent electrical performance and superior uniformity.The reliability properties of ITO TFTs were evaluated in detail under positive bias stress(PBS)conditions before and after passivation.Compared to the devices without passivation,the passivated devices have only 50%threshold voltage degradation(ΔV_(th))and 50%newly generated traps due to excellent isolation of the ambient atmosphere.The negligible performance degradation of ITO TFTs with passivation during negative bias stress(NBS)and negative bias temperature stress(NBTS)verifies the outstanding immunity to the water vapor of the SiO_(2)passivation layer.Overall,the ITO TFT with the t_(ch)of 6 nm and with SiO_(2)passivation exhibits the best performance in terms of electrical properties,uniformity,and reliability,which is promising in large-area production.展开更多
This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for ...This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for identifying critical failure modes and their root causes,while BN introduces flexibility in probabilistic reasoning,enabling dynamic updates based on new evidence.This dual methodology overcomes the limitations of static FTA models,offering a comprehensive framework for system reliability analysis.Critical failures,including External Leakage(ELU),Failure to Start(FTS),and Overheating(OHE),were identified as key risks.By incorporating redundancy into high-risk components such as pumps and batteries,the likelihood of these failures was significantly reduced.For instance,redundant pumps reduced the probability of ELU by 31.88%,while additional batteries decreased the occurrence of FTS by 36.45%.The results underscore the practical benefits of combining FTA and BN for enhancing system reliability,particularly in maritime applications where operational safety and efficiency are critical.This research provides valuable insights for maintenance planning and highlights the importance of redundancy in critical systems,especially as the industry transitions toward more autonomous vessels.展开更多
To study the durability of concrete in harsh environments in Northwest China,concrete was prepared with various durability-improving materials such as concrete anti-erosion inhibitor(SBT-TIA),acrylate polymer(AP),supe...To study the durability of concrete in harsh environments in Northwest China,concrete was prepared with various durability-improving materials such as concrete anti-erosion inhibitor(SBT-TIA),acrylate polymer(AP),super absorbent resin(SAP).The erosion mode and internal deterioration mechanism under salt freeze-thaw cycle and dry-wet cycle were explored.The results show that the addition of enhancing materials can effectively improve the resistance of concrete to salt freezing and sulfate erosion:the relevant indexes of concrete added with X-AP and T-AP are improved after salt freeze-thaw cycles;concrete added with SBTTIA shows optimal sulfate corrosion resistance;and concrete added with AP displays the best resistance to salt freezing.Microanalysis shows that the increase in the number of cycles decreases the generation of internal hydration products and defects in concrete mixed with enhancing materials and improves the related indexes.Based on the Wiener model analysis,the reliability of concrete with different lithologies and enhancing materials is improved,which may provide a reference for the application of manufactured sand concrete and enhancing materials in Northwest China,especially for the study of the improvement effects and mechanism of enhancing materials on the performance of concrete.展开更多
The automatic loading systems of artillery are critical for the accurate,efficient,and reliable delivery of pro-jectiles and propellants into the gun chamber.In modern artillery,the ammunition conveyor serves as the e...The automatic loading systems of artillery are critical for the accurate,efficient,and reliable delivery of pro-jectiles and propellants into the gun chamber.In modern artillery,the ammunition conveyor serves as the end effector of the automatic loading system,and its motion state significantly impacts the accuracy of projectiles.Therefore,it is of immense importance to precisely and effectively evaluate the reliability of the motion accuracy of the ammunition conveyor.This paper aims to propose a practical and efficient analysis method for evaluating the reliability of the motion accuracy of the ammunition conveyor.The proposed approach involves the use of a deep learning network to approximate the physical model and the extremum method to obtain a single cycle sequence decoupling strategy for solving the time-varying reliability issue of complex systems.Employing this strategy,the time-varying reliability of the ammunition conveyor is transformed into a static reliability problem.The proposed method includes the use of a deep feedforward neural network,second-order saddle point ap-proximation(SPA)method,extremum method,and efficient global optimization(EGO)technology.The results reveal that the reliability of the motion accuracy of the ammunition conveyor is 93.42%,with the maximum failure probability occurring at 0.21 s.These results serve as an important reference for the structural optimi-zation design of the ammunition conveyor based on reliability and the maintenance of the operational process.展开更多
Reservoir-induced landslides in China's Three Gorges Reservoir area are prone to tensile cracks due to the influenceof their own weight and fluctuationsin water levels.The presence of cracks indicates that the ten...Reservoir-induced landslides in China's Three Gorges Reservoir area are prone to tensile cracks due to the influenceof their own weight and fluctuationsin water levels.The presence of cracks indicates that the tensile stress in the area has exceeded the tensile strength of the soil,leading to local instability.To explore the impact of tensile failure behavior on the stability and failure modes of reservoir landslides,the Huangtupo Riverside Slump#1 is taken as a case study.By considering local tensile failure,potential tensile cracks are incorporated into the analysis via the limit equilibrium method and reliability theory.The reliability of landslides under different tensile failure scenarios is quantified.Strain-softening characteristics of the soil are combined to further analyze the failure transmission path of the landslide.Finally,these potential failure modes were validated through physical model tests.The results show that cracks developing at rear positions reduce the stability of the slope and increase the probability of instability.During the destruction process,retrogressive failures with multiple sliding surfaces are likely to occur.However,tensile failure at the forefront reduces the likelihood of an individual slide mass descending.Progressive failure results in both regular and skip transmission patterns.Additionally,cracks and water level changes can also lead to shifts in the positions of the most dangerous blocks.Therefore,in practical landslide analysis and prevention,it is necessary to consider local tensile damage and identify potential tensile crack locations in advance to optimize prevention measures and accurately evaluate landslide risk.展开更多
In reliability analyses,the absence of a priori information on the most probable point of failure(MPP)may result in overlooking critical points,thereby leading to biased assessment outcomes.Moreover,second-order relia...In reliability analyses,the absence of a priori information on the most probable point of failure(MPP)may result in overlooking critical points,thereby leading to biased assessment outcomes.Moreover,second-order reliability methods exhibit limited accuracy in highly nonlinear scenarios.To overcome these challenges,a novel reliability analysis strategy based on a multimodal differential evolution algorithm and a hypersphere integration method is proposed.Initially,the penalty function method is employed to reformulate the MPP search problem as a conditionally constrained optimization task.Subsequently,a differential evolution algorithm incorporating a population delineation strategy is utilized to identify all MPPs.Finally,a paraboloid equation is constructed based on the curvature of the limit-state function at the MPPs,and the failure probability of the structure is calculated by using the hypersphere integration method.The localization effectiveness of the MPPs is compared through multiple numerical cases and two engineering examples,with accuracy comparisons of failure probabilities against the first-order reliability method(FORM)and the secondorder reliability method(SORM).The results indicate that the method effectively identifies existing MPPs and achieves higher solution precision.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62271268,Grant 62071253,and Grant 62371252in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project。
文摘In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.
基金supported in part by the National Natural Science Foundation of China(61673123,61603100)in part by the Natural Science Foundation of Guangdong Province,China(2020A151501482)。
文摘The rise of multi-cloud systems has been spurred.For safety-critical missions,it is important to guarantee their security and reliability.To address trust constraints in a heterogeneous multi-cloud environment,this work proposes a novel scheduling method called matching and multi-round allocation(MMA)to optimize the makespan and total cost for all submitted tasks subject to security and reliability constraints.The method is divided into two phases for task scheduling.The first phase is to find the best matching candidate resources for the tasks to meet their preferential demands including performance,security,and reliability in a multi-cloud environment;the second one iteratively performs multiple rounds of re-allocating to optimize tasks execution time and cost by minimizing the variance of the estimated completion time.The proposed algorithm,the modified cuckoo search(MCS),hybrid chaotic particle search(HCPS),modified artificial bee colony(MABC),max-min,and min-min algorithms are implemented in CloudSim to create simulations.The simulations and experimental results show that our proposed method achieves shorter makespan,lower cost,higher resource utilization,and better trade-off between time and economic cost.It is more stable and efficient.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
文摘Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.
基金supported by Science and Technology Project of SGCC“Research on Flat Architecture and Implementation Technology of Security and Stability Control System in Ultra Large Power Grid”(52170221000U).
文摘Security and stability control system(SSCS)in power systems involves collecting information and sending the decision from/to control stations at different layers;the tree structure of the SSCS requires more levels.Failure of a station or channel can cause all the execution stations(EXs)to be out of control.The randomness of the controllable capacity of the EXs increases the difficulty of the reliability evaluation of the SSCS.In this study,the loop designed SSCS and reliability analysis are examined for the interconnected systems.The uncertainty analysis of the controllable capacity based on the evidence theory for the SSCS is proposed.The bidirectional and loop channels are introduced to reduce the layers and stations of the existing SSCS with tree configuration.The reliability evaluation and sensitivity analysis are proposed to quantify the controllability and vulnerable components for the SSCS in different configurations.By aiming at the randomness of the controllable capacity of the EXs,the uncertainty analysis of the controllable capacity of the SSCS based on the evidence theory is proposed to quantify the probability of the SSCS for balancing the active power deficiency of the grid.
基金supported by scientific research projects of China Academy of Railway Sciences Co.,Ltd.(grant no.2024YJ117).
文摘Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.
基金appreciation to the National Natural Science Foundation of China(72071074)Natural Science Foundation of Hunan Province,China(2025JJ30031)for their financial support。
文摘Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.
文摘Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.
文摘The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.
基金the support from National Natural Science Foundation of China(No.52275153)the Frontier Technologies R&D Program of Jiangsu,China(No.BF2024068)+1 种基金The Fund of Prospective Layout of Scientific Research for Nanjing University of Aeronautics and Astronautics,ChinaResearch Fund of State Key Laboratory of Mechanics and Control for Aerospace Structures(Nanjing University of Aeronautics and Astronautics),China(Nos.MCAS-I-0425K01,MCAS-I-0423G01)。
文摘It is well recognized that Structural Health Monitoring(SHM)reliability evaluation is a key aspect that needs to be urgently addressed to promote the wide application of SHM methods.However,the existing studies typically transfer the Non-Destructive Testing/Evaluation(NDT/E)reliability metrics to SHM without a systematic analysis of where these metrics originated.Seldom attentions are paid to the evaluation conditions which are very important to apply these metrics.Aimed at this issue,a new condition control-based Dual-Reliability Evaluation(Dual-RE)method for SHM is proposed.This new method is proposed based on a systematic analysis of the whole framework of reliability evaluation from instrument to NDT,and emphasis is paid to the evaluation condition control.Based on these analyses,considering the special online application scenario of SHM,the proposed Dual-RE method contains two key components:Integrated Sensor-based SHM-RE(IS-SHM-RE)and Critical Service Condition-based SHM-RE(CSC-SHM-RE).ISSHM-RE evaluates the reliability of integrated SHM sensor and system themselves under approximate repeatability conditions,while CSC-SHM-RE assesses SHM reliability under the dominant uncertainties during service,namely intermediate conditions.To demonstrate the Dual-RE,crack monitoring by using the Guided Wave-based-SHM(GW-SHM)on aircraft lug structures is taken as a case study.Both the crack detection and sizing performance are evaluated from accuracy and uncertainty.
文摘The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit.
文摘Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.
文摘This study examines the reliability and validity of AI-generated scoring for continuation writing tasks.By comparing GPT-4 with eight experienced human raters across 21 student responses,it evaluates AI’s consistency,severity,and alignment with human scoring criteria.Results show that AI exhibits high self-consistency and adapts effectively to different scoring roles(e.g.,teacher vs.highstakes rater).However,AI scores were more lenient than human raters and demonstrated divergent evaluation focuses—prioritizing narrative coherence and emotional depth,while teachers emphasized linguistic accuracy and richness of detail.The findings suggest AI’s potential as a supplementary assessment tool,offering rapid,holistic feedback,but highlight the need for further calibration to align with educational standards.Implications include exploring hybrid evaluation models that leverage the strengths of both AI and human raters to achieve more equitable,efficient,and pedagogically meaningful writing assessments.
基金Project supported by the National Natural Science Foundation of China(Grant No.12472033)。
文摘A stochastic predator-prey system with Markov switching is explored.We have developed a new chasing technique to efficiently solve the Fokker-Planck-Kolmogorov and backward Kolmogorov equations.Dynamic balance and reliability of the switching system are evaluated via stationary probability density function and first-passage failure theory,taking into account factors such as switching frequencies,noise intensities,and initial conditions.Results reveal that Markov switching leads to stochastic P-bifurcation,enhancing dynamic balance and reducing white-noise-induced oscillations.But frequent switching can heighten initial value dependence,harming reliability.Further,the influence of the subsystem on the switching system is not proportional to its action probabilities.Monte Carlo simulations validate the findings,offering an in-depth exploration of these dynamics.
基金supported in part by the National Natural Science Foundation of China(62404110,62274033)Natural Science Foundation of Jiangsu Province(BK20221453)+1 种基金Fundamental Research Funds for the Central UniversitiesNatural Science Research Start-up Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications(NY223159)。
文摘In this work,we demonstrated the InSnO(ITO)TFTs passivated with SiO_(2)via the PECVD process compatible with large-area production for the first time.The passivated ITO TFTs with various channel thicknesses(t_(ch)=4,5,6 nm)exhibit excellent electrical performance and superior uniformity.The reliability properties of ITO TFTs were evaluated in detail under positive bias stress(PBS)conditions before and after passivation.Compared to the devices without passivation,the passivated devices have only 50%threshold voltage degradation(ΔV_(th))and 50%newly generated traps due to excellent isolation of the ambient atmosphere.The negligible performance degradation of ITO TFTs with passivation during negative bias stress(NBS)and negative bias temperature stress(NBTS)verifies the outstanding immunity to the water vapor of the SiO_(2)passivation layer.Overall,the ITO TFT with the t_(ch)of 6 nm and with SiO_(2)passivation exhibits the best performance in terms of electrical properties,uniformity,and reliability,which is promising in large-area production.
基金supported by Istanbul Technical University(Project No.45698)supported through the“Young Researchers’Career Development Project-training of doctoral students”of the Croatian Science Foundation.
文摘This paper investigates the reliability of internal marine combustion engines using an integrated approach that combines Fault Tree Analysis(FTA)and Bayesian Networks(BN).FTA provides a structured,top-down method for identifying critical failure modes and their root causes,while BN introduces flexibility in probabilistic reasoning,enabling dynamic updates based on new evidence.This dual methodology overcomes the limitations of static FTA models,offering a comprehensive framework for system reliability analysis.Critical failures,including External Leakage(ELU),Failure to Start(FTS),and Overheating(OHE),were identified as key risks.By incorporating redundancy into high-risk components such as pumps and batteries,the likelihood of these failures was significantly reduced.For instance,redundant pumps reduced the probability of ELU by 31.88%,while additional batteries decreased the occurrence of FTS by 36.45%.The results underscore the practical benefits of combining FTA and BN for enhancing system reliability,particularly in maritime applications where operational safety and efficiency are critical.This research provides valuable insights for maintenance planning and highlights the importance of redundancy in critical systems,especially as the industry transitions toward more autonomous vessels.
基金Funded by the National Natural Science Foundation of China(No.52178216)the Research on the Durability and Application of High-performance Concrete for Highway Engineering in the Cold and Arid Salt Areas of Northwest China(No.2022-24)the Construction Project of the Scientific Research Platform of Provincial Enterprises Supported by the Capital Operating Budget of Gansu Province(No.2023GZ018)。
文摘To study the durability of concrete in harsh environments in Northwest China,concrete was prepared with various durability-improving materials such as concrete anti-erosion inhibitor(SBT-TIA),acrylate polymer(AP),super absorbent resin(SAP).The erosion mode and internal deterioration mechanism under salt freeze-thaw cycle and dry-wet cycle were explored.The results show that the addition of enhancing materials can effectively improve the resistance of concrete to salt freezing and sulfate erosion:the relevant indexes of concrete added with X-AP and T-AP are improved after salt freeze-thaw cycles;concrete added with SBTTIA shows optimal sulfate corrosion resistance;and concrete added with AP displays the best resistance to salt freezing.Microanalysis shows that the increase in the number of cycles decreases the generation of internal hydration products and defects in concrete mixed with enhancing materials and improves the related indexes.Based on the Wiener model analysis,the reliability of concrete with different lithologies and enhancing materials is improved,which may provide a reference for the application of manufactured sand concrete and enhancing materials in Northwest China,especially for the study of the improvement effects and mechanism of enhancing materials on the performance of concrete.
基金Supported by National Natural Science Foundation of China(Grant No.U2141246)Key Laboratory of Artillery Launch and Control Technology of China(Grant No.2021-001)Basic Research of State Administration of Science Technology and Industry for National Defense of China(Grant No.JXJL202208A001).
文摘The automatic loading systems of artillery are critical for the accurate,efficient,and reliable delivery of pro-jectiles and propellants into the gun chamber.In modern artillery,the ammunition conveyor serves as the end effector of the automatic loading system,and its motion state significantly impacts the accuracy of projectiles.Therefore,it is of immense importance to precisely and effectively evaluate the reliability of the motion accuracy of the ammunition conveyor.This paper aims to propose a practical and efficient analysis method for evaluating the reliability of the motion accuracy of the ammunition conveyor.The proposed approach involves the use of a deep learning network to approximate the physical model and the extremum method to obtain a single cycle sequence decoupling strategy for solving the time-varying reliability issue of complex systems.Employing this strategy,the time-varying reliability of the ammunition conveyor is transformed into a static reliability problem.The proposed method includes the use of a deep feedforward neural network,second-order saddle point ap-proximation(SPA)method,extremum method,and efficient global optimization(EGO)technology.The results reveal that the reliability of the motion accuracy of the ammunition conveyor is 93.42%,with the maximum failure probability occurring at 0.21 s.These results serve as an important reference for the structural optimi-zation design of the ammunition conveyor based on reliability and the maintenance of the operational process.
基金supported by the Major Program of National Natural Science Foundation of China(Grant No.42090055)the National Key ScientificInstruments and Equipment Development Projects of China(Grant No.41827808)the National Nature Science Foundation of China(Grant No.42207216).
文摘Reservoir-induced landslides in China's Three Gorges Reservoir area are prone to tensile cracks due to the influenceof their own weight and fluctuationsin water levels.The presence of cracks indicates that the tensile stress in the area has exceeded the tensile strength of the soil,leading to local instability.To explore the impact of tensile failure behavior on the stability and failure modes of reservoir landslides,the Huangtupo Riverside Slump#1 is taken as a case study.By considering local tensile failure,potential tensile cracks are incorporated into the analysis via the limit equilibrium method and reliability theory.The reliability of landslides under different tensile failure scenarios is quantified.Strain-softening characteristics of the soil are combined to further analyze the failure transmission path of the landslide.Finally,these potential failure modes were validated through physical model tests.The results show that cracks developing at rear positions reduce the stability of the slope and increase the probability of instability.During the destruction process,retrogressive failures with multiple sliding surfaces are likely to occur.However,tensile failure at the forefront reduces the likelihood of an individual slide mass descending.Progressive failure results in both regular and skip transmission patterns.Additionally,cracks and water level changes can also lead to shifts in the positions of the most dangerous blocks.Therefore,in practical landslide analysis and prevention,it is necessary to consider local tensile damage and identify potential tensile crack locations in advance to optimize prevention measures and accurately evaluate landslide risk.
基金National Natural Science Foundation of China(No.52375236)Fundamental Research Funds for the Central Universities of China(No.23D110316)。
文摘In reliability analyses,the absence of a priori information on the most probable point of failure(MPP)may result in overlooking critical points,thereby leading to biased assessment outcomes.Moreover,second-order reliability methods exhibit limited accuracy in highly nonlinear scenarios.To overcome these challenges,a novel reliability analysis strategy based on a multimodal differential evolution algorithm and a hypersphere integration method is proposed.Initially,the penalty function method is employed to reformulate the MPP search problem as a conditionally constrained optimization task.Subsequently,a differential evolution algorithm incorporating a population delineation strategy is utilized to identify all MPPs.Finally,a paraboloid equation is constructed based on the curvature of the limit-state function at the MPPs,and the failure probability of the structure is calculated by using the hypersphere integration method.The localization effectiveness of the MPPs is compared through multiple numerical cases and two engineering examples,with accuracy comparisons of failure probabilities against the first-order reliability method(FORM)and the secondorder reliability method(SORM).The results indicate that the method effectively identifies existing MPPs and achieves higher solution precision.