This study examined the relationship between inclusive leadership and authenticity at work in racial minority groups of South Africa,taking into account the mediating role of psychological safety and the moderator rol...This study examined the relationship between inclusive leadership and authenticity at work in racial minority groups of South Africa,taking into account the mediating role of psychological safety and the moderator role of gender,in that relationship.The sample was composed of 94 employees predominantly working in the professional services sector from South Africa(41.5%females;mean age=37.1),who self-identified as racial minority groups(coloured/black/Indian).Results indicate that inclusive leadership has no direct effect on authenticity at work;however,psychological safety fully mediates this relationship.Regarding the moderation effect of gender,results showed that males are more likely to diminish their self-alienation(a specific component of authenticity at work)when levels of psychological safety are higher.These results are consistent with Social Identity Theory,which posits that individuals derive part of their self-concept from their membership in social groups.In contexts where inclusive leadership fosters psychological safety,individuals(particularly men in traditionally male-dominated work environments)may feel a stronger sense of belonging and group identity,which in turn enhances their willingness to express their authentic selves and reduces self-alienation.Practical implications for companies include the need to improve leadership styles to foster more of an inclusive and psychologically safe culture,where minority groups can be authentic and flourish.展开更多
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri...The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi...This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.展开更多
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ...Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy.展开更多
[Objective]The aim was to optimize SSR reaction system applied in the identification of authenticity of maize variety.[Method]The technical parameters of SSR including PCR reaction system,annealing temperature and ele...[Objective]The aim was to optimize SSR reaction system applied in the identification of authenticity of maize variety.[Method]The technical parameters of SSR including PCR reaction system,annealing temperature and electrophoresis time were optimized to identify 10 major maize varieties in Liaoning Province.[Result]The optimum PCR reaction system was:14.60 μl sterile ultrapure water,2.00 μl 10 × Buffer(Mg2+),1.20 μl dNTPs,0.20 μl Taq enzyme,0.50 μl each of the forward and reverse primers and1.00 μl DNA stock solution.Annealing temperature and electrophoresis time could greatly influence the results of PCR amplification.The optimal annealing temperature and electrophoresis time required for the ideal electrophoresis bands under the same conditions were different when different primers were used.[Conclusion]The system was feasible to be applied in rapid identification of authenticity of hybrid maize varieties.展开更多
On the basis of tourism authenticity theory and field investigation and analysis of Lijiang ancient city, the paper had explored tourists' tourism authenticity, and further revealed the inner relation between tour...On the basis of tourism authenticity theory and field investigation and analysis of Lijiang ancient city, the paper had explored tourists' tourism authenticity, and further revealed the inner relation between tourism authenticity and tourism motivation of ancient cultural cities. It was found that ancient cultural cities generally had the highest objective authenticity, followed by existential, constructive and post-modern authenticity. As for tourism motivation, motivation of knowledge function, of reward maximization, of punishment minimization, of self-esteem and of self-fulfillment presented to diminish progressively. Relationships between four types of tourism authenticity and five types of tourism motivations also varied from each other. It had enriched empirical quantitative research results of domestic tourism authenticity in theory, and provided application value for the research on realistic tourism market and planning activity based on tourists in practice.展开更多
As to language testing researches,authenticity has always been the main concern.Based on the theories and previous researches of authenticity in language testing,this article studies the authenticity of listening modu...As to language testing researches,authenticity has always been the main concern.Based on the theories and previous researches of authenticity in language testing,this article studies the authenticity of listening module of IELTS from three perspectives-testing materials,testing tasks and testing situations.It is indicated that the materials in IELTS listening module cover a wide range of academic life,employing different English accents and natural pauses and hesitation;the testing tasks are authentic to satisfy test-takers' need in the future;the testing situations are close to the real life.From the implication of IELTS,some suggestions are put forward for CET from those three aspects mentioned.展开更多
Based on an analysis of the deficiency of the traditional ELT in authenticity, this paper puts forward some sug-gestions about how to make our ELT classroom more authentic.
The methods for designing listening comprehension tests appeared in recent years will be also reviewed.For each kind of testing method,no matter what its scale and how its importance,can influence teaching and learnin...The methods for designing listening comprehension tests appeared in recent years will be also reviewed.For each kind of testing method,no matter what its scale and how its importance,can influence teaching and learning in varied range.Therefore,to discuss how to use the principle of authenticity to improve and ensure the reliability and validity of test can create a positive effect on teaching and learning.展开更多
With the rapid development of the economy, people’s living standards have been improved constantly. As people’s material life has been gradually improved, people pay more attention to the pursuit of high-quality spi...With the rapid development of the economy, people’s living standards have been improved constantly. As people’s material life has been gradually improved, people pay more attention to the pursuit of high-quality spiritual life, and the flourishing development of rural tourism just meets people’s pursuit about returning to nature that is far away from the hustle and bustle of the city, and about experiencing funny and quiet life in the countryside. The development of rural tourism relies on agricultural landscape resources, and the correct understanding and protection of the original value of agricultural landscape resources can effectively ensure the sustainable use of agricultural landscape resources. If land for agricultural landscape resource is occupied for developing blindly without reasonable planning and construction, it will lead to the distortion of the authentic value of agricultural landscape, which in turn affects the sustainable development of rural tourism.展开更多
Authentication of pasta is currently determined using molecular biology-based techniques focusing on DNA as the target analyte. Whilst proven to be effective, these approaches can be criticised as being destructive, t...Authentication of pasta is currently determined using molecular biology-based techniques focusing on DNA as the target analyte. Whilst proven to be effective, these approaches can be criticised as being destructive, time consuming, and requiring specialist instrument training. Advances in the field of multispectral imaging (MSI) and hyperspectral imaging (HSI) have facilitated the development of compact imaging platforms with the capability to rapidly differentiate a range of materials (inclusive of grains and seeds) based on surface colour, texture and chemical composition. This preliminary investigation evaluated the applicability of spectral imaging for identification and quantitation of durum wheat grain samples in relation to pasta authenticity. MSI and HSI were capable of rapidly distinguishing between durum wheat and adulterant common wheat cultivars and assigning percentage adulteration levels characterised by low biases and good repeatability estimates. The results demonstrated the potential for spectral imaging based seed/grain adulteration testing to augment existing standard molecular approaches for food authenticity testing.展开更多
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ...In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization.展开更多
Place attachment has been a research focus in the fields of park and recreation management.Place attachment plays an important role in promoting sustainable development of parks and mountain tourism destination,howeve...Place attachment has been a research focus in the fields of park and recreation management.Place attachment plays an important role in promoting sustainable development of parks and mountain tourism destination,however,there are limited studies that identified the spatial patterns of place attachment,especially in the context of mountain tourism destinations in China.Also,the geospatial spectrum of visitors is usually broad,examining the multivariate relationships among spatial proximity,perceived authenticity,and place attachment are essential for mountain tourism destinations to promote destination image and strengthen emotional bonding with targeted visitor groups.In this study,we selected an iconic and highly visited park,Jiuzhai Valley National Park in China,as our study site and conducted an on-site visitor survey to collect 557 samples.Study uses factor analysis and the structure equation model to analyze the relationship among spatial proximity,perceived authenticity,and place attachment.Results validate the two-dimension structure of place attachment and perceived authenticity.Study findings suggest that spatial proximity has significant impacts on existential authenticity and place identity,but has no significant impacts on place dependence.Perceived authenticity has a positive impact on place attachment.Study results advance the theories of place attachment and provide effective strategies to enhance emotional attachment between visitors and mountain tourism destinations.展开更多
Mentha haplocalyx(mint)is a significant traditional Chinese medicine(TCM)listed in the Catalogue of’Medicinal and Food Homology’,therefore,its geographical origins(GOs)are critical to the medicinal and food value.La...Mentha haplocalyx(mint)is a significant traditional Chinese medicine(TCM)listed in the Catalogue of’Medicinal and Food Homology’,therefore,its geographical origins(GOs)are critical to the medicinal and food value.Laser-induced breakdown spectroscopy(LIBS)is an advanced analytical technique for GOs certification,due to the fast multi-elemental analysis requiring minimal sample pretreatment.In this study,LIBS data of sampled mint from five GOs were investigated by LIBS coupled with multivariate statistical analyzes.The spectral data was analyzed by two chemometric algorithms,i.e.principal component analysis(PCA)and least squares support vector machines(LS-SVM).Specifically,the performance of LS-SVM with least kernel and radial basis function(RBF)kernel was explored in sensitivity and robustness tests.Both LS-SVM algorithms exhibited excellent performance of classification in sensitive test and good performance(a little inferior)in robustness test.Generally,LS-SVM with linear kernel equally outperformed LS-SVM based on RBF kernel.The result indicated the potential for future applications in herbs and food,especially for in situ GOs applications of TCM authenticity rapidly.展开更多
Authenticity is an important issue in language testing. Business English (BE) assessment should focus more on authenticity in order to reflect the characteristics and changing teaching methods of BE. This paper expl...Authenticity is an important issue in language testing. Business English (BE) assessment should focus more on authenticity in order to reflect the characteristics and changing teaching methods of BE. This paper explores the idea of authenticity and uses real examples to show how to set criteria, and how to design authentic tasks to achieve authentic BE assessment.展开更多
文摘This study examined the relationship between inclusive leadership and authenticity at work in racial minority groups of South Africa,taking into account the mediating role of psychological safety and the moderator role of gender,in that relationship.The sample was composed of 94 employees predominantly working in the professional services sector from South Africa(41.5%females;mean age=37.1),who self-identified as racial minority groups(coloured/black/Indian).Results indicate that inclusive leadership has no direct effect on authenticity at work;however,psychological safety fully mediates this relationship.Regarding the moderation effect of gender,results showed that males are more likely to diminish their self-alienation(a specific component of authenticity at work)when levels of psychological safety are higher.These results are consistent with Social Identity Theory,which posits that individuals derive part of their self-concept from their membership in social groups.In contexts where inclusive leadership fosters psychological safety,individuals(particularly men in traditionally male-dominated work environments)may feel a stronger sense of belonging and group identity,which in turn enhances their willingness to express their authentic selves and reduces self-alienation.Practical implications for companies include the need to improve leadership styles to foster more of an inclusive and psychologically safe culture,where minority groups can be authentic and flourish.
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金supported by National Natural Science Foundation of China:Space-based occultation detection with ground-based GNSS atmospheric horizontal gradient model(41904033).
文摘The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金This work is part of the‘Intelligent and Cyber-Secure Platform for Adaptive Optimization in the Simultaneous Operation of Heterogeneous Autonomous Robots(PICRAH4.0)’with reference MIG-20232082,funded by MCIN/AEI/10.13039/501100011033supported by the Universidad Internacional de La Rioja(UNIR)through the Precompetitive Research Project entitled“Nuevos Horizontes en Internet de las Cosas y NewSpace(NEWIOT)”,reference PP-2024-13,funded under the 2024 Call for Research Projects.
文摘This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
基金Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy.
文摘[Objective]The aim was to optimize SSR reaction system applied in the identification of authenticity of maize variety.[Method]The technical parameters of SSR including PCR reaction system,annealing temperature and electrophoresis time were optimized to identify 10 major maize varieties in Liaoning Province.[Result]The optimum PCR reaction system was:14.60 μl sterile ultrapure water,2.00 μl 10 × Buffer(Mg2+),1.20 μl dNTPs,0.20 μl Taq enzyme,0.50 μl each of the forward and reverse primers and1.00 μl DNA stock solution.Annealing temperature and electrophoresis time could greatly influence the results of PCR amplification.The optimal annealing temperature and electrophoresis time required for the ideal electrophoresis bands under the same conditions were different when different primers were used.[Conclusion]The system was feasible to be applied in rapid identification of authenticity of hybrid maize varieties.
文摘On the basis of tourism authenticity theory and field investigation and analysis of Lijiang ancient city, the paper had explored tourists' tourism authenticity, and further revealed the inner relation between tourism authenticity and tourism motivation of ancient cultural cities. It was found that ancient cultural cities generally had the highest objective authenticity, followed by existential, constructive and post-modern authenticity. As for tourism motivation, motivation of knowledge function, of reward maximization, of punishment minimization, of self-esteem and of self-fulfillment presented to diminish progressively. Relationships between four types of tourism authenticity and five types of tourism motivations also varied from each other. It had enriched empirical quantitative research results of domestic tourism authenticity in theory, and provided application value for the research on realistic tourism market and planning activity based on tourists in practice.
文摘As to language testing researches,authenticity has always been the main concern.Based on the theories and previous researches of authenticity in language testing,this article studies the authenticity of listening module of IELTS from three perspectives-testing materials,testing tasks and testing situations.It is indicated that the materials in IELTS listening module cover a wide range of academic life,employing different English accents and natural pauses and hesitation;the testing tasks are authentic to satisfy test-takers' need in the future;the testing situations are close to the real life.From the implication of IELTS,some suggestions are put forward for CET from those three aspects mentioned.
文摘Based on an analysis of the deficiency of the traditional ELT in authenticity, this paper puts forward some sug-gestions about how to make our ELT classroom more authentic.
文摘The methods for designing listening comprehension tests appeared in recent years will be also reviewed.For each kind of testing method,no matter what its scale and how its importance,can influence teaching and learning in varied range.Therefore,to discuss how to use the principle of authenticity to improve and ensure the reliability and validity of test can create a positive effect on teaching and learning.
基金Sponsored by Youth Fund Project of Humanities and Social Sciences Research of the Ministry of Education(15YJCZH145)Guangxi Philosophy and Social Science Planning Project(18FJY007)
文摘With the rapid development of the economy, people’s living standards have been improved constantly. As people’s material life has been gradually improved, people pay more attention to the pursuit of high-quality spiritual life, and the flourishing development of rural tourism just meets people’s pursuit about returning to nature that is far away from the hustle and bustle of the city, and about experiencing funny and quiet life in the countryside. The development of rural tourism relies on agricultural landscape resources, and the correct understanding and protection of the original value of agricultural landscape resources can effectively ensure the sustainable use of agricultural landscape resources. If land for agricultural landscape resource is occupied for developing blindly without reasonable planning and construction, it will lead to the distortion of the authentic value of agricultural landscape, which in turn affects the sustainable development of rural tourism.
文摘Authentication of pasta is currently determined using molecular biology-based techniques focusing on DNA as the target analyte. Whilst proven to be effective, these approaches can be criticised as being destructive, time consuming, and requiring specialist instrument training. Advances in the field of multispectral imaging (MSI) and hyperspectral imaging (HSI) have facilitated the development of compact imaging platforms with the capability to rapidly differentiate a range of materials (inclusive of grains and seeds) based on surface colour, texture and chemical composition. This preliminary investigation evaluated the applicability of spectral imaging for identification and quantitation of durum wheat grain samples in relation to pasta authenticity. MSI and HSI were capable of rapidly distinguishing between durum wheat and adulterant common wheat cultivars and assigning percentage adulteration levels characterised by low biases and good repeatability estimates. The results demonstrated the potential for spectral imaging based seed/grain adulteration testing to augment existing standard molecular approaches for food authenticity testing.
文摘In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization.
基金funded by Hainan University Social Science Innovative Researchgrant(HDSKTD202013)Hainan Provincial Natural Science Foundation of China(420QN218)。
文摘Place attachment has been a research focus in the fields of park and recreation management.Place attachment plays an important role in promoting sustainable development of parks and mountain tourism destination,however,there are limited studies that identified the spatial patterns of place attachment,especially in the context of mountain tourism destinations in China.Also,the geospatial spectrum of visitors is usually broad,examining the multivariate relationships among spatial proximity,perceived authenticity,and place attachment are essential for mountain tourism destinations to promote destination image and strengthen emotional bonding with targeted visitor groups.In this study,we selected an iconic and highly visited park,Jiuzhai Valley National Park in China,as our study site and conducted an on-site visitor survey to collect 557 samples.Study uses factor analysis and the structure equation model to analyze the relationship among spatial proximity,perceived authenticity,and place attachment.Results validate the two-dimension structure of place attachment and perceived authenticity.Study findings suggest that spatial proximity has significant impacts on existential authenticity and place identity,but has no significant impacts on place dependence.Perceived authenticity has a positive impact on place attachment.Study results advance the theories of place attachment and provide effective strategies to enhance emotional attachment between visitors and mountain tourism destinations.
基金supported by National Natural Science Foundation of China(Nos.81903796,81603396 and 31870338)the National Key Research and Development Program of China(No.2019YFC1711200)+2 种基金Major new drug innovation project of the ministry of science and technology(2018ZX09201011)Scientific and Technological Planning Projects of Colleges and Universities of Shandong Province(No.J18KA287)Binzhou Medical University Research Startup Fund Project(No.BY2016KYQD02)。
文摘Mentha haplocalyx(mint)is a significant traditional Chinese medicine(TCM)listed in the Catalogue of’Medicinal and Food Homology’,therefore,its geographical origins(GOs)are critical to the medicinal and food value.Laser-induced breakdown spectroscopy(LIBS)is an advanced analytical technique for GOs certification,due to the fast multi-elemental analysis requiring minimal sample pretreatment.In this study,LIBS data of sampled mint from five GOs were investigated by LIBS coupled with multivariate statistical analyzes.The spectral data was analyzed by two chemometric algorithms,i.e.principal component analysis(PCA)and least squares support vector machines(LS-SVM).Specifically,the performance of LS-SVM with least kernel and radial basis function(RBF)kernel was explored in sensitivity and robustness tests.Both LS-SVM algorithms exhibited excellent performance of classification in sensitive test and good performance(a little inferior)in robustness test.Generally,LS-SVM with linear kernel equally outperformed LS-SVM based on RBF kernel.The result indicated the potential for future applications in herbs and food,especially for in situ GOs applications of TCM authenticity rapidly.
文摘Authenticity is an important issue in language testing. Business English (BE) assessment should focus more on authenticity in order to reflect the characteristics and changing teaching methods of BE. This paper explores the idea of authenticity and uses real examples to show how to set criteria, and how to design authentic tasks to achieve authentic BE assessment.