期刊文献+
共找到4,135篇文章
< 1 2 207 >
每页显示 20 50 100
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
1
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
Research on the Design of Ideological and Political Objective Matrix for Accounting English Course Based on OBE--with Reference to the Competency Framework of Certified Public Accountants
2
作者 Rui Huang 《Proceedings of Business and Economic Studies》 2025年第4期195-201,共7页
In recent years,the field of higher education in China has put forward clear requirements for the construction of ideological and political education in courses.Accounting English,as an important course for cultivatin... In recent years,the field of higher education in China has put forward clear requirements for the construction of ideological and political education in courses.Accounting English,as an important course for cultivating international accounting talents,urgently needs to integrate professional ethics and national consciousness into professional teaching[1].In response to the lack of a professional reference system for ideological and political education in accounting English courses,this paper,guided by the OBE educational concept,constructs a three-dimensional objective matrix model based on the international Certified Public Accountant(CPA)competency framework.By deconstructing the IFAC professional competence standards,a mapping mechanism of“professional competence-language carrier-ideological and political content”is proposed. 展开更多
关键词 OBE education Accounting English Course-based ideological and political education Certified public accountant Competency matrix
在线阅读 下载PDF
An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection
3
作者 Yiming Zhang Wei Zhang Cong Shen 《Computers, Materials & Continua》 2025年第11期3185-3211,共27页
Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protectio... Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protection and has attracted widespread attention.Consequently,research increasingly focuses on developing more secure FL techniques.However,in real-world scenarios involving malicious entities,the accuracy of FL results is often compromised,particularly due to the threat of collusion between two servers.To address this challenge,this paper proposes an efficient and verifiable data aggregation protocol with enhanced privacy protection.After analyzing attack methods against prior schemes,we implement key improvements.Specifically,by incorporating cascaded random numbers and perturbation terms into gradients,we strengthen the privacy protection afforded by polynomial masking,effectively preventing information leakage.Furthermore,our protocol features an enhanced verification mechanism capable of detecting collusive behaviors between two servers.Accuracy testing on the MNIST and CIFAR-10 datasets demonstrates that our protocol maintains accuracy comparable to the Federated Averaging Algorithm.In scheme efficiency comparisons,while incurring only a marginal increase in verification overhead relative to the baseline scheme,our protocol achieves an average improvement of 93.13% in privacy protection and verification overhead compared to the state-of-the-art scheme.This result highlights its optimal balance between overall overhead and functionality.A current limitation is that the verificationmechanismcannot precisely pinpoint the source of anomalies within aggregated results when server-side malicious behavior occurs.Addressing this limitation will be a focus of future research. 展开更多
关键词 Data fusion federated learning privacy protection MASKING verifiability fault tolerance
在线阅读 下载PDF
Research on Efficient Storage Consistency Verification Technology for On-Chain and Off-Chain Data
4
作者 Wei Lin Yi Sun 《Computers, Materials & Continua》 2025年第12期5117-5134,共18页
To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data... To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data structure that is more suitable for streaming data to achieve efficient real-time verifiability for streaming data.Based on the notch gate hash function and vector commitment,an adaptive notch gate hash tree structure is constructed,and an efficient real-time verifiable data structure for on-chain and off-chain stream data is proposed.The structure binds dynamic root nodes sequentially to ordered leaf nodes in its child nodes.Only the vector commitment of the dynamic root node is stored on the chain,and the complete data structure is stored off-chain.This structure ensures tamperproofing against malicious off-chain cloud servers of off-chain cloud servers.Preserves storage scalability space,realizes the immediate verification of stream data upon arrival,and the computational overhead of on-chain and off-chain hybrid storage verification is only related to the current data volume,which is more practical when dealing with stream data with unpredictable data volume.We formalize this as an efficient real-time verification scheme for stream data in on-chain and off-chain hybrid storage.Finally,the technology’s security and performance were empirically validated through rigorous analysis. 展开更多
关键词 On-chain and off-chain hybrid storage verifiable technology slot gate hash function vector commitment
在线阅读 下载PDF
VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server
5
作者 Peizheng Lai Minqing Zhang +2 位作者 Yixin Tang Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第8期2935-2957,共23页
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i... Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension. 展开更多
关键词 Verifiable federated learning PRIVACY-PRESERVING homomorphic encryption reversible data hiding in encrypted domain secret sharing
在线阅读 下载PDF
Improved key exchange protocol for three-party based on verifier authentication 被引量:3
6
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
在线阅读 下载PDF
The Influence of forest certification on forest product trade 被引量:2
7
作者 郑仰南 蒋敏元 《Journal of Forestry Research》 SCIE CAS CSCD 2002年第4期316-318,338,共3页
Forest certification is considered to be complementary to forest management policies and takes a significant effect on forest product trade. In recent decade, it has been followed with interest and approved by governm... Forest certification is considered to be complementary to forest management policies and takes a significant effect on forest product trade. In recent decade, it has been followed with interest and approved by governments and forestry de-partments in the world. This paper analyzes the influence of forest certification on forest product trade in the world, including the interest in certification in exporting countries and importing countries, trade flow and business competition, and the demands for Certified Forest Products (CFPs) and also discusses the influence of forest certification on forest product trade in China. 展开更多
关键词 Forest Certification Certified Forest Products Forest Product Trade
在线阅读 下载PDF
CHOICE APPROACH OF THE OPTIMAL CERTIFICATION METHOD FOR CERTIFIED REFERENCE MATERIALS 被引量:5
8
作者 靳京民 赵华 +2 位作者 张辉 冯典英 李本涛 《化学分析计量》 CAS 2005年第6期1-3,共3页
将田口方法中代表设计研究或生产工艺研究中功能稳定性的信噪比概念用于标准物质定值方法的研究.为标准物质定值方法的优化提供数据处理模式和选择思路。以锌合金标准物质为例,采用原子吸收光谱法和紫外一可见分光光度法对锌合金标准... 将田口方法中代表设计研究或生产工艺研究中功能稳定性的信噪比概念用于标准物质定值方法的研究.为标准物质定值方法的优化提供数据处理模式和选择思路。以锌合金标准物质为例,采用原子吸收光谱法和紫外一可见分光光度法对锌合金标准物质中的铜元素定值,分别计算这两种方法定值数据的信噪比值,通过比较信噪比值的大小来判断两种分析方法的可靠性和分析体系的稳定性。 展开更多
关键词 信噪比 标准物质 原子吸收光谱 紫外-可见分光光度法 分析化学
在线阅读 下载PDF
DNATyper^(TM)21与Verifiler^(TM)Plus试剂盒对常规案件检材检验的比较 被引量:1
9
作者 王剑 马云龙 +4 位作者 余政梁 龚政 高馨玉 杨亮 张丽娜 《刑事技术》 2024年第3期318-322,共5页
本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒... 本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒进行灵敏度测试;应用DNATyper^(TM)21与Verifi ler^(TM)Plus试剂盒分别对1056例常规案件检材DNA进行检验;对同一样本等位基因进行一致性比较。结果表明,两种试剂盒均可以成功检测出模板浓度在0.0625 ng/μL以上的标准DNA。在检验的1056例样本中,DNATyper^(TM)21试剂盒共检出881例,检出率为83.4%;Verifi ler^(TM)Plus试剂盒检出892例,检出率为84.5%。统计学结果表明两种试剂盒检出率无统计学差异,且同一样本相同基因座得到的等位基因分型一致。综上,DNATyper^(TM)21试剂盒对各类常规检材具有良好的检验能力,可应用于日常案件检验。 展开更多
关键词 法医物证学 DNATyper^(TM)21试剂盒 Verifi ler^(TM)Plus试剂盒 比较研究 生物检材
在线阅读 下载PDF
A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key 被引量:3
10
作者 LIJi-guo ZHANGYi-chen ZHUYue-long 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期219-222,共4页
A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the t... A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer. 展开更多
关键词 Key words cryptography proxy signature SELF certified public key non REPUDIATION
在线阅读 下载PDF
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
11
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
在线阅读 下载PDF
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
12
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
在线阅读 下载PDF
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:6
13
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing PRIVACY-PRESERVING Verifiable aggregation Homomorphic cryptosystem
在线阅读 下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
14
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
在线阅读 下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
15
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
在线阅读 下载PDF
Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice 被引量:3
16
作者 Lin Mei Chungen Xu +2 位作者 Lei Xu Xiaoling Yu Cong Zuo 《Computers, Materials & Continua》 SCIE EI 2021年第8期2299-2314,共16页
Internet of Things(IoT),which provides the solution of connecting things and devices,has increasingly developed as vital tools to realize intelligent life.Generally,source-limited IoT sensors outsource their data to t... Internet of Things(IoT),which provides the solution of connecting things and devices,has increasingly developed as vital tools to realize intelligent life.Generally,source-limited IoT sensors outsource their data to the cloud,which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved.Though encryption technology can guarantee the confidentiality of private data,it hinders the usability of data.Searchable encryption(SE)has been proposed to achieve secure data sharing and searching.However,most of existing SE schemes are designed under conventional hardness assumptions and may be vulnerable to the adversary with quantum computers.Moreover,the untrusted cloud server may perform an unfaithful search execution.To address these problems,in this paper,we propose the first verifiable identity-based keyword search(VIBKS)scheme from lattice.In particular,a lattice-based delegation algorithm is adopted to help the data user to verify both the correctness and the integrity of the search results.Besides,in order to reduce the communication overhead,we refer to the identity-based mechanism.We conduct rigorous proof to demonstrate that the proposed VIBKS scheme is ciphertext indistinguishable secure against the semi-honestbut-curious adversary.In addition,we give the detailed computation and communication complexity of our VIBKS and conduct a series of experiments to validate its efficiency performance. 展开更多
关键词 Internet of Things verifiable LATTICE searchable encryption
在线阅读 下载PDF
Verifiable Diversity Ranking Search Over Encrypted Outsourced Data 被引量:3
17
作者 Yuling Liu Hua Peng Jie Wang 《Computers, Materials & Continua》 SCIE EI 2018年第4期37-57,共21页
Data outsourcing has become an important application of cloud computing.Driven by the growing security demands of data outsourcing applications,sensitive data have to be encrypted before outsourcing.Therefore,how to p... Data outsourcing has become an important application of cloud computing.Driven by the growing security demands of data outsourcing applications,sensitive data have to be encrypted before outsourcing.Therefore,how to properly encrypt data in a way that the encrypted and remotely stored data can still be queried has become a challenging issue.Searchable encryption scheme is proposed to allow users to search over encrypted data.However,most searchable encryption schemes do not consider search result diversification,resulting in information redundancy.In this paper,a verifiable diversity ranking search scheme over encrypted outsourced data is proposed while preserving privacy in cloud computing,which also supports search results verification.The goal is that the ranked documents concerning diversification instead of reading relevant documents that only deliver redundant information.Extensive experiments on real-world dataset validate our analysis and show that our proposed solution is effective for the diversification of documents and verification. 展开更多
关键词 Cloud security diversity ranking RELEVANCE searchable encryption verifiable search
在线阅读 下载PDF
Universal Designated Multi Verifier Signature Scheme without Random Oracles 被引量:1
18
作者 MING Yang WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期685-691,共7页
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba... In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption. 展开更多
关键词 universal designated multi verifier signature random oracle bilinear pairing
原文传递
Verifiably Encrypted Signatures Without Random Oracles 被引量:3
19
作者 李祥学 陈克非 +1 位作者 刘胜利 李世群 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期230-235,共6页
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis... Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption. 展开更多
关键词 PAIRINGS verifiably encrypted signatures short signatures tight security reduction
在线阅读 下载PDF
Numerical Simulation for Remediation Planning for 1,4-Dioxane-Contaminated Groundwater at Kuwana Illegal Dumping Site in Japan Based on the Concept of Verified Follow Up 被引量:1
20
作者 Ramrav Hem Toru Furuichi +1 位作者 Kazuei Ishii Yu-Chi Weng 《Journal of Water Resource and Protection》 2013年第7期699-708,共10页
At Kuwana illegal dumping site in Japan, where hazardous waste was illegally dumped, groundwater was severely contaminated by Volatile Organic Compounds (VOCs). Groundwater was already remedied by conducting Pump-and-... At Kuwana illegal dumping site in Japan, where hazardous waste was illegally dumped, groundwater was severely contaminated by Volatile Organic Compounds (VOCs). Groundwater was already remedied by conducting Pump-and-Treat (P&T) after containment of all the waste by vertical slurry walls from 2002 to 2007. However, 1,4-dioxane was detected in both waste and groundwater outside of slurry walls after it was newly added into Japan environmental standards in late 2009, which suggested that the walls did not contain 1,4-dioxane completely. Our previous study developed a model to predict the 1,4-dioxane distribution in groundwater after the previous remediation at the site. In this study, numerical simulation was applied for remediation planning at the site based on the concept of Verified Follow Up (VF-UP) that had been proposed as a new approach to complete remediation effectively with consideration of future risks. The amount of waste to be removed and pumping plans were discussed by numerical simulation to achieve the remedial objective in which 1,4-dioxane in groundwater outside of walls is remedied within 10 years and 1,4-dioxane spreading throughout the walls is prevented in the case where a portion of waste is remained. Firstly, the amount of waste to be removed considering pumping plans for P&T was determined by scenario analysis. As a result, at least two-third of waste should be removed by combining with P&T. However, if the waste is remained, future risks of 1,4-dioxane spreading through the slurry walls may occur. Our simulation suggested that groundwater within the remaining waste must be pumped up at least 20 m3/d for containment of 1,4-dioxane within the remaining waste. In conclusion, our numerical simulation determined the amount of waste to be removed and the pumping plans for P&T to achieve the remedial objective effectively considering future risks based on the concept of VF-UP. 展开更多
关键词 REMEDIATION PLANNING Numerical Simulation Verified FOLLOW Up Pump-and-Treat 1 4-Dioxane-Contaminated Groundwater ILLEGAL DUMPING Site
暂未订购
上一页 1 2 207 下一页 到第
使用帮助 返回顶部