Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from...Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%.展开更多
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such...Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.展开更多
Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of exist...Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags.展开更多
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i...This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed.展开更多
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat...In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.展开更多
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e...The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.展开更多
Structured Query Language(SQL)injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.Traditional injection attack detection techniq...Structured Query Language(SQL)injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.Traditional injection attack detection techniques struggle to accurately identify various types of SQL injection attacks.This paper presents an enhanced SQL injection detection method that utilizes content matching technology to improve the accuracy and efficiency of detection.Features are extracted through content matching,effectively avoiding the loss of valid information,and an improved deep learning model is employed to enhance the detection effect of SQL injections.Considering that grammar parsing and word embedding may conceal key features and introduce noise,we propose training the transformed data vectors by preprocessing the data in the dataset and post-processing the word segmentation based on content matching.We optimized and adjusted the traditional Convolutional Neural Network(CNN)model,trained normal data,SQL injection data,and XSS data,and used these three deep learning models for attack detection.The experimental results show that the accuracy rate reaches 98.35%,achieving excellent detection results.展开更多
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s...With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system.展开更多
A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experim...A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established.展开更多
Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the ...Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD).展开更多
China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly...China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries.展开更多
Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative tec...Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries.展开更多
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. T...In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing.展开更多
Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait lo...Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program.展开更多
The expressway traffc incidents have the characteristics of high harmful, strong destructive and refractory.Incident detection can guarantee smooth operation of the expressway, reduce traffc congestion and avoid secon...The expressway traffc incidents have the characteristics of high harmful, strong destructive and refractory.Incident detection can guarantee smooth operation of the expressway, reduce traffc congestion and avoid secondary accident by informing the accident, detection and treatment timely. In this paper, an incident detection method is proposed using the toll station data that takes into account the traffc ratio at the entrances and crossway in the network. The expressway traffc simulation model is improved and a simulation algorithm is established to describe the movement of the vehicles. A numerical example is experimented on the expressway network of Shandong province. The proposed method can effectively detect the expressway incidents, and dynamically estimate the traffc network states so as to provide advice for the highway management department.展开更多
The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random sampling.The RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solut...The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random sampling.The RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solution.However,it has been proven to take an infinite time to do so.An improved Quick-RRT^(*)(Q-RRT^(*))algorithm based on a virtual light source is proposed in this paper to overcome this problem.The virtual light-based Q-RRT^(*)(LQRRT^(*))takes advantage of the heuristic information generated by the virtual light on the map.In this way,the tree can find the initial solution quickly.Next,the LQRRT^(*)algorithm combines the heuristic information with the optimization capability of the Q-RRT^(*)algorithm to find the approximate optimal solution.LQRRT^(*)further optimizes the sampling space compared with the Q-RRT^(*)algorithm and improves the sampling efficiency.The efficiency of the algorithm is verified by comparison experiments in different simulation environments.The results show that the proposed algorithm can converge to the approximate optimal solution in less time and with lower memory consumption.展开更多
In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes pro...In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.展开更多
In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the pr...In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network.展开更多
Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the pro...Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw.展开更多
基金supported by the Major Science and Technology Programs in Henan Province(No.241100210100)Henan Provincial Science and Technology Research Project(No.252102211085,No.252102211105)+3 种基金Endogenous Security Cloud Network Convergence R&D Center(No.602431011PQ1)The Special Project for Research and Development in Key Areas of Guangdong Province(No.2021ZDZX1098)The Stabilization Support Program of Science,Technology and Innovation Commission of Shenzhen Municipality(No.20231128083944001)The Key scientific research projects of Henan higher education institutions(No.24A520042).
文摘Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%.
基金the Higher Education Commission(HEC),Pakistan throughits initiative of National Center for Cyber Security for the affiliated Security Testing-Innovative SecuredSystems Lab(ISSL)established at University of Engineering&Technology(UET)Peshawar,Grant No.2(1078)/HEC/M&E/2018/707.
文摘Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.
基金Supported by the Natural Science Foundation of China(6097011561003268)
文摘Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags.
文摘This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed.
基金supported by Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004).
文摘In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.
文摘The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.
基金supported by Jiangsu Higher Education“Qinglan Project”,an Open Project of Criminal Inspection Laboratory in Key Laboratories of Sichuan Provincial Universities(2023YB03)Major Project of Basic Science(Natural Science)Research in Higher Education Institutions in Jiangsu Province(23KJA520004)+5 种基金Jiangsu Higher Education Philosophy and Social Sciences Research General Project(2023SJYB0467)Action Plan of the National Engineering Research Center for Cybersecurity Level Protection and Security Technology(KJ-24-004)Jiangsu Province Degree and Postgraduate Education and Teaching Reform Project(JGKT24_B036)Digital Forensics Engineering Research Center of the Ministry of Education Open Project(DF20-010)Teaching Practice of Web Development and Security Testing under the Background of Industry University Cooperation(241205403122215)Research on Strategies for Combating and Preventing Virtual Currency Telecommunications Fraud(2024SJYB0344).
文摘Structured Query Language(SQL)injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.Traditional injection attack detection techniques struggle to accurately identify various types of SQL injection attacks.This paper presents an enhanced SQL injection detection method that utilizes content matching technology to improve the accuracy and efficiency of detection.Features are extracted through content matching,effectively avoiding the loss of valid information,and an improved deep learning model is employed to enhance the detection effect of SQL injections.Considering that grammar parsing and word embedding may conceal key features and introduce noise,we propose training the transformed data vectors by preprocessing the data in the dataset and post-processing the word segmentation based on content matching.We optimized and adjusted the traditional Convolutional Neural Network(CNN)model,trained normal data,SQL injection data,and XSS data,and used these three deep learning models for attack detection.The experimental results show that the accuracy rate reaches 98.35%,achieving excellent detection results.
基金supported by Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004)Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),under National Key R&D Program of China(2020YFB1005500)。
文摘With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system.
基金the financial support from the National Natural Science Foundation of China(No.51204195,No.51074171 and No.51274216)
文摘A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established.
基金supported by three programs from the National Natural Science Foundation of China (NSFC) (The experimental study on the effect of trace elements iodine and selenium on the autoimmune thyroid disease (No.30571564)The cross-sectional investigation on hypothyroidism induced by excess iodine intake and the experimental research on pathogenesy (No.30972465)The change of thyroid pathology and the levels of T3,T4 in SePP1,GPX3 knock out mice (No.30810103004)
文摘Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD).
基金supported by the National Basic Research Program of China(973 Program,2015CB150405)the China Postdoctoral Science Foundation Grant(2016M601177)
文摘China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries.
基金supported by the National Basic Research Program of China (2015CB150405)
文摘Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing.
基金supported by the National Basic Research Program of China (2009CB118300 and 2009CB118605)the Innovative Group Grant of NSFC, China (31121062)the Special Fund for Agro-Scientific Research in the Public Interest, China (201103003)
文摘Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program.
基金Supported by the National Natural Science Foundation of China under Grant Nos.71871130,71471104,71771019,71571109the University Science and Technology Program Funding Projects of Shandong Province under Grant No.J17KA211the Project of Public Security Department of Shandong Province under Grant No.GATHT2015-236
文摘The expressway traffc incidents have the characteristics of high harmful, strong destructive and refractory.Incident detection can guarantee smooth operation of the expressway, reduce traffc congestion and avoid secondary accident by informing the accident, detection and treatment timely. In this paper, an incident detection method is proposed using the toll station data that takes into account the traffc ratio at the entrances and crossway in the network. The expressway traffc simulation model is improved and a simulation algorithm is established to describe the movement of the vehicles. A numerical example is experimented on the expressway network of Shandong province. The proposed method can effectively detect the expressway incidents, and dynamically estimate the traffc network states so as to provide advice for the highway management department.
基金This work was supported by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China[grant number 19KJB510022]the Startup Research Foundation for Advanced Talents[grant number JSPIGKZ/2911119220].
文摘The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random sampling.The RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solution.However,it has been proven to take an infinite time to do so.An improved Quick-RRT^(*)(Q-RRT^(*))algorithm based on a virtual light source is proposed in this paper to overcome this problem.The virtual light-based Q-RRT^(*)(LQRRT^(*))takes advantage of the heuristic information generated by the virtual light on the map.In this way,the tree can find the initial solution quickly.Next,the LQRRT^(*)algorithm combines the heuristic information with the optimization capability of the Q-RRT^(*)algorithm to find the approximate optimal solution.LQRRT^(*)further optimizes the sampling space compared with the Q-RRT^(*)algorithm and improves the sampling efficiency.The efficiency of the algorithm is verified by comparison experiments in different simulation environments.The results show that the proposed algorithm can converge to the approximate optimal solution in less time and with lower memory consumption.
文摘In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.
文摘In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network.
基金supported by National Basic Research Program of China (973 Program, 2009CB118605)the National Natural Science Foundation of China (30571106)the Innovative Group Grant of Natural Science Foundation of China (30821003)
文摘Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw.