期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path
1
作者 Yu-Bin Kim Dong-Hyuk Shin Ieck-Chae Euom 《Computers, Materials & Continua》 2025年第8期2217-2243,共27页
The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this crit... The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem.While ISO 15118 standardizes EV-EVCS communication,its underspecified security guidelines and the variability in manufacturers’implementations frequently result in vulnerabilities that can disrupt charging services,compromise user data,or affect power grid stability.This research introduces a systematic black-box fuzzing methodology,accompanied by an open-source tool,to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118.The proposed approach systematically evaluates EVCS behavior by leveraging the state machine defined in the ISO 15118 standard for test case generation and execution,enabling platform-agnostic testing at the application layer.Message sequences,corresponding to valid andmutated traversals of the protocol’s state machine,are generated to uncover logical errors and improper input handling.Themethodology comprises state-aware initial sequence generation,simulated V2G session establishment,targeted message mutation correlated with defined protocol states,and rigorous response analysis to detect anomalies and system crashes.Experimental validation on an open-source EVCS implementation identified five vulnerabilities.These included session integrity weaknesses allowing unauthorized interruptions,billing manipulation through invalid metering data acceptance,and resource exhaustion vulnerabilities from specific parameter malformations leading to denial-of-service.The findings confirm the proposed method’s capability in pinpointing vulnerabilities often overlooked by standard conformance tests,thus offering a robust and practical solution for enhancing the security and resilience of the rapidly growing EV charging infrastructure. 展开更多
关键词 Internet of Things(IoT)security risk assessment data privacy fuzzing test electric vehicle charger security
在线阅读 下载PDF
Data-Driven Digital Evidence Analysis for the Forensic Investigation of the Electric Vehicle Charging Infrastructure
2
作者 Dong-Hyuk Shin Jae-Jun Ha Ieck-Chae Euom 《Computer Modeling in Engineering & Sciences》 2025年第6期3795-3838,共44页
The accelerated global adoption of electric vehicles(EVs)is driving significant expansion and increasing complexity within the EV charging infrastructure,consequently presenting novel and pressing cybersecurity challe... The accelerated global adoption of electric vehicles(EVs)is driving significant expansion and increasing complexity within the EV charging infrastructure,consequently presenting novel and pressing cybersecurity challenges.While considerable effort has focused on preventative cybersecurity measures,a critical deficiency persists in structured methodologies for digital forensic analysis following security incidents,a gap exacerbated by system heterogeneity,distributed digital evidence,and inconsistent logging practices which hinder effective incident reconstruction and attribution.This paper addresses this critical need by proposing a novel,data-driven forensic framework tailored to the EV charging infrastructure,focusing on the systematic identification,classification,and correlation of diverse digital evidence across its physical,network,and application layers.Our methodology integrates open-source intelligence(OSINT)with advanced system modeling based on a three-layer cyber-physical system architecture to comprehensively map potential evidentiary sources.Key contributions include a comprehensive taxonomy of cybersecurity threats pertinent to EV charging ecosystems,detailed mappings between these threats and the resultant digital evidence to guide targeted investigations,the formulation of adaptable forensic investigation workflows for various incident scenarios,and a critical analysis of significant gaps in digital evidence availability within current EV charging systems,highlighting limitations in forensic readiness.The practical application and utility of this method are demonstrated through illustrative case studies involving both empirically-derived and virtual incident scenarios.The proposed datadriven approach is designed to significantly enhance digital forensic capabilities,support more effective incident response,strengthen compliance with emerging cybersecurity regulations,and ultimately contribute to bolstering the overall security,resilience,and trustworthiness of this increasingly vital critical infrastructure. 展开更多
关键词 Electric vehicle charging infrastructure digital forensics incident investigation charging network vulnerability analysis threat modeling open-source intelligence(OSINT)
在线阅读 下载PDF
Anti-skin-aging effect of fish gelatin from Cynoscion acoupa by maintaining collagen matrix homeostasis on D-galactose induced aging mice
3
作者 Jianxin Tian Jingru Liao +3 位作者 Biluan Zhong Pan Li Xiaoqian Liu Bing Du 《Food Science and Human Wellness》 2025年第8期3213-3224,共12页
Delaying skin-aging through diet is a hot research topic in recent years,but the anti-aging effects of fish gelatin and related mechanisms are not well understood.In this study,we prepared edible fish gelatin from the... Delaying skin-aging through diet is a hot research topic in recent years,but the anti-aging effects of fish gelatin and related mechanisms are not well understood.In this study,we prepared edible fish gelatin from the swim bladder of Cynoscion acoupa using three different processing methods,namely dried(DCM),soaked(SCM)and instanted(ICM),to investigate its anti-aging effects and mechanisms on D-galactose induced skin aging in mice,as well as its effects on the gut microbiota.The results demonstrated that fish gelatin significantly increased water content,collagen,hyaluronic acid(HA)and hydroxyproline(Hyp)content,and skin integrity of mice skin,as well as enhanced the antioxidative ability and anti-inflammatory capacity of the skin.In terms of protein and mRNA expression levels in skin tissue,CMs treated with different treatments can up-regulate the expression of epidermal growth factor receptor(EGFR)and tissue inhibitor of metal protease 1(TIMP1),down-regulating the expression of matrix metalloproteinase 1(MMP1)and matrix metalloproteinase 3(MMP3),and increase the expression of collagen type III alpha 1 chain(COL3A1)and collagen type I alpha 2 chain(COL1A2).CMs attenuated the D-galactose-mediated inhibition collagen expression by stimulating the transforming growth factor beta(TGF-β)/Smad signaling pathway,thereby maintaining collagen matrix homeostasis.In addition,we revealed that CMs reversed gut microbiota by increase the abundance of intestinal flora.In conclusion,we demonstrated that CMs,especially for ICM,as an effective dietary supplement,have potential anti-aging and skin health benefits. 展开更多
关键词 Cynoscion acoupa Fish gelatin Oxidative stress ANTI-AGING Gut microbiota
在线阅读 下载PDF
Multi-sensor missile-borne LiDAR point cloud data augmentation based on Monte Carlo distortion simulation
4
作者 Luda Zhao Yihua Hu +4 位作者 Fei Han Zhenglei Dou Shanshan Li Yan Zhang Qilong Wu 《CAAI Transactions on Intelligence Technology》 2025年第1期300-316,共17页
Large-scale point cloud datasets form the basis for training various deep learning networks and achieving high-quality network processing tasks.Due to the diversity and robustness constraints of the data,data augmenta... Large-scale point cloud datasets form the basis for training various deep learning networks and achieving high-quality network processing tasks.Due to the diversity and robustness constraints of the data,data augmentation(DA)methods are utilised to expand dataset diversity and scale.However,due to the complex and distinct characteristics of LiDAR point cloud data from different platforms(such as missile-borne and vehicular LiDAR data),directly applying traditional 2D visual domain DA methods to 3D data can lead to networks trained using this approach not robustly achieving the corresponding tasks.To address this issue,the present study explores DA for missile-borne LiDAR point cloud using a Monte Carlo(MC)simulation method that closely resembles practical application.Firstly,the model of multi-sensor imaging system is established,taking into account the joint errors arising from the platform itself and the relative motion during the imaging process.A distortion simulation method based on MC simulation for augmenting missile-borne LiDAR point cloud data is proposed,underpinned by an analysis of combined errors between different modal sensors,achieving high-quality augmentation of point cloud data.The effectiveness of the proposed method in addressing imaging system errors and distortion simulation is validated using the imaging scene dataset constructed in this paper.Comparative experiments between the proposed point cloud DA algorithm and the current state-of-the-art algorithms in point cloud detection and single object tracking tasks demonstrate that the proposed method can improve the network performance obtained from unaugmented datasets by over 17.3%and 17.9%,surpassing SOTA performance of current point cloud DA algorithms. 展开更多
关键词 data augmentation LIDAR missile-borne imaging Monte Carlo simulation point cloud
在线阅读 下载PDF
Security Service Technology for Mobile Networks
5
作者 Aiqun Hu Tao Li Mingfu Xue 《ZTE Communications》 2011年第3期49-54,共6页
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes s... As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development. 展开更多
关键词 mobile network security security service trusted computing access control
在线阅读 下载PDF
Research on the Development Strategy of the Small and Medium-sized Agricultural Enterprises
6
作者 Huang Bing Zhang Rongdong 《Journal of Zhouyi Research》 2014年第4期38-40,共3页
关键词 农业企业 农业科技企业 经济社会发展 工业化发展 中型 农业经济发展 城市化进程 中国人
在线阅读 下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID) 被引量:1
7
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
在线阅读 下载PDF
The Machine Learning Ensemble for Analyzing Internet of Things Networks:Botnet Detection and Device Identification
8
作者 Seung-Ju Han Seong-Su Yoon Ieck-Chae Euom 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1495-1518,共24页
The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a re... The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a result,research on network analysis has become vital.Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods.In this paper,we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework.The results indicate that using the proposed ensemble techniques improves accuracy by up to 1.7%compared to single-algorithm approaches.These results also suggest that the proposed framework can flexibly adapt to general IoT network analysis scenarios.Unlike existing frameworks,which only exhibit high performance in specific situations,the proposed framework can serve as a fundamental approach for addressing a wide range of issues. 展开更多
关键词 Internet of Things machine learning traffic analysis botnet detection device identification
在线阅读 下载PDF
人工智能开启新纪元
9
作者 现代院“人工智能与国家安全”识课题组 Li Yan 《Contemporary International Relations》 2024年第2期85-90,共6页
2023 will be the inaugural year of a new artificial intelligence(AI) development round. The rapid advancement and proliferation of AI technologies and applications send shock waves worldwide. However, the risks hidden... 2023 will be the inaugural year of a new artificial intelligence(AI) development round. The rapid advancement and proliferation of AI technologies and applications send shock waves worldwide. However, the risks hidden behind AI's immense energy have sparked heated debate and controversy. Powered by AI technologies and applications, the intelligent era seems to have begun. 展开更多
关键词 人工智能 artificial HEATED
在线阅读 下载PDF
Ex situ echo sounder target strengths of ice krill Euphausia crystallorophias 被引量:4
10
作者 Hyoung Sul LA Hyungbeen LEE +2 位作者 Donhyug KANG SangHoon LEE Hyoung Chul SHIN 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2015年第3期802-808,共7页
Ice krill is the keystone species in the neritic ecosystem in the Southern Ocean, where it replaces the more oceanic Antarctic krill. It is essential to understand the variation of target strength (TS in dB re l m^2... Ice krill is the keystone species in the neritic ecosystem in the Southern Ocean, where it replaces the more oceanic Antarctic krill. It is essential to understand the variation of target strength (TS in dB re l m^2) with the different body size to accurately estimate ice krill stocks. However, there is comparatively little knowledge of the acoustic backscatter of ice krill. The TS of individual, formalin-preserved, tethered ice krill was measured in a freshwater test tank at 38, 120, and 200 kHz with a calibrated split-beam echo sounder system. Mean TS was obtained from 21 individual ice krill with a broad range of body lengths (L: 13-36 iron). The length (L, mm) to wet weight (W; mg) relationship for ice krill was 11/=0.001 21g^103~L35s (R2=0.96). The mean TS-to-length relationship were TS38kHz=-177.4+57log10(L), (R^2=0.86); TS120kHz= -129.9+31.561ogf0(L), (R2=0.87); and TS200kHz=-117.6+24.661ogre(L), (R2=0.84). Empirical estimates of the relationship between the TS and body length of ice krill were established at 38, 120, and 200 kHz and compared with predictions obtained from both the linear regression model of Greene et al. (1991) and the Stochastic Distorted Wave Born Approximation (SDWBA) model. This result might be applied to improve acoustic detection and density estimation of ice krill in the Southern Ocean. Further comparative studies are needed with in situ target strength including various body lengths of ice krill. 展开更多
关键词 ice krill Euphausia crystallorophias ex situ target strength split-beam echo sounder
原文传递
Provable Efficient Certificateless Group Key Exchange Protocol 被引量:8
11
作者 CAO Chunjie MA Jianfeng MOON Sangjae 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期41-45,共5页
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 展开更多
关键词 group key exchange certificateless public key cryptography provable security bilinear pairings
在线阅读 下载PDF
Are body mass index and waist circumference significant predictors of diabetes and prediabetes risk: Results from a population based cohort study 被引量:4
12
作者 Fahimeh Haghighatdoost Masoud Amini +1 位作者 Awat Feizi Bijan Iraj 《World Journal of Diabetes》 SCIE CAS 2017年第7期365-373,共9页
AIM To determine the predictive role of body mass index(BMI) and waist circumference(WC) for diabetes and prediabetes risk in future in total sample as well as in men and women separately. METHODS In a population base... AIM To determine the predictive role of body mass index(BMI) and waist circumference(WC) for diabetes and prediabetes risk in future in total sample as well as in men and women separately. METHODS In a population based cohort study, 1765 with mean ± SD age: 42.32 ± 6.18 healthy participants were followed up from 2003 till 2013(n = 960). Anthropometric and biochemical measures of participants were evaluated regularly during the follow up period. BMI and WC measures at baseline and diabetes and prediabetes status of participants at 2013 were determined. Multivariable logistic regression analysis was used for determining the risk of diabetes and prediabetes considering important potential confounding variables. Receiver operatingcharacteristic curve analysis was conducted to determine the best cut of values of BMI and WC for diabetes and prediabetes. RESULTS At 2013, among participants who had complete data, 45 and 307 people were diabetic and prediabetic, respectively. In final fully adjusted model, BMI value was a significant predictor of diabetes(RR = 1.39, 95%CI: 1.06-1.82 and AUC = 0.68, 95%CI: 0.59-0.75; P < 0.001) however not a significant risk factor for prediabetes. Also, WC was a significant predictor for diabetes(RR = 1.2, 95%CI: 1.05-1.38 and AUC = 0.67, 95%CI: 0.6-0.75) but not significant risk factor for prediabetes. Similar results were observed in both genders.CONCLUSION General and abdominal obesity are significant risk factors for diabetes in future. 展开更多
关键词 DIABETES PREDIABETES Waist circumference Body mass index Anthropometric measure
暂未订购
A Robust Algorithm for Watermarking 2D Vector Maps with Low Shape-Distortions 被引量:4
13
作者 邵承永 王孝通 +1 位作者 金良安 牛夏牧 《Defence Technology(防务技术)》 SCIE EI CAS 2006年第3期233-236,共4页
关键词 GIS 水印 畸变 2D矢量
在线阅读 下载PDF
Optimizing of large-number-patterns string matching algorithms based on definite-state automata 被引量:3
14
作者 陈训逊 方滨兴 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第2期236-239,共4页
Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, w... Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, we cut down the scanning time of those algorithms (i.e. DFA based) by rearranging the states table and shrinking the DFA alphabet size. Both the methods can decrease the probability of large-scale random memory accessing and increase the probability of continuously memory accessing. Then the hitting rate of the CACHE is increased and the searching time of on the DFA is reduced. Shrinking the alphabet size of the DFA also reduces the storage complication. The AC++algorithm, by optimizing the Aho-Corasick (i.e. AC) algorithm using such methods, proves the theoretical analysis. And the experimentation results show that the scanning time of AC++and the storage occupied is better than that of AC in most cases and the result is much attractive when the number of patterns is very large. Because DFA is a widely used base algorithm in may string matching algorithms, such as DAWG, SBOM etc., the optimizing method discussed is significant in practice. 展开更多
关键词 multi-pattern string-matching definite-state automata Aho-Corasick algorithm CACHE
在线阅读 下载PDF
An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification 被引量:2
15
作者 Guozhong Dong Weizhe Zhang +2 位作者 Sichang Xuan Feng Qin Haowen Tan 《Computers, Materials & Continua》 SCIE EI 2020年第11期1855-1868,共14页
Radio frequency identification(RFID)has been widespread used in massive items tagged domains.However,tag collision increases both time and energy consumption of RFID network.Tag collision can seriously affect the succ... Radio frequency identification(RFID)has been widespread used in massive items tagged domains.However,tag collision increases both time and energy consumption of RFID network.Tag collision can seriously affect the success of tag identification.An efficient anti-collision protocol is very crucially in RFID system.In this paper,an improved binary search anti-collision protocol namely BRTP is proposed to cope with the tag collision concern,which introduces a Bi-response mechanism.In Bi-response mechanism,two groups of tags allowed to reply to the reader in the same slot.According to Bi-response mechanism,the BRTP strengthens the tag identification of RFID network by reducing the total number of queries and exchanged messages between the reader and tags.Both theoretical analysis and numerical results verify the effectiveness of the proposed BRTP in various performance metrics including the number of total slots,system efficiency,communication complexity and total identification time.The BRTP is suitable to be applied in passive RFID systems. 展开更多
关键词 RFID ANTI-COLLISION binary search Bi-response mechanism
在线阅读 下载PDF
RFID Based Non-Preemptive Random Sleep Scheduling in WSN 被引量:2
16
作者 Tianle Zhang Lihua Yin +4 位作者 Xiang Cui Abhishek Behl Fuqiang Dong Ziheng Cheng Kuo Ma 《Computers, Materials & Continua》 SCIE EI 2020年第10期835-845,共11页
In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure ... In Wireless Sensor Network(WSN),because battery and energy supply are constraints,sleep scheduling is always needed to save energy while maintaining connectivity for packet delivery.Traditional schemes have to ensure high duty cycling to ensure enough percentage of active nodes and then derogate the energy efficiency.This paper proposes an RFID based non-preemptive random sleep scheduling scheme with stable low duty cycle.It employs delay tolerant network routing protocol to tackle the frequent disconnections.A low-power RFID based non-preemptive wakeup signal is used to confirm the availability of next-hop before sending packet.It eliminates energy consumption of repeated retransmission of the delayed packets.Moreover,the received wakeup signal is postponed to take effect until the sleep period is finished,and the waken node then responds to the sending node to start the packet delivery.The scheme can keep stable duty cycle and then ensure energy saving effect compared with other sleeping scheduling methods. 展开更多
关键词 Sleep scheduling RFID partially connected Delay Tolerant Network(DTN) wakeup non-preemptive
在线阅读 下载PDF
A Novel Collective User Web Behavior Simulation Method 被引量:2
17
作者 Hongri Liu Xu Zhang +1 位作者 Jingjing Li Bailing Wang 《Computers, Materials & Continua》 SCIE EI 2021年第3期2539-2553,共15页
A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and... A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and prediction,which cannot simulate human dynamics that widely exist in large-scale users’behaviors.To address these issues,we propose a novel collective user web behavior simulation method,in which an algorithm for constructing a connected virtual social network is proposed,and then a collective user web behavior simulation algorithm is designed on the virtual social network.In the simulation method,a new epidemic information dissemination algorithm based on the SIR model is proposed to drive the user web behavior with Breadth—First Search algorithm on the connected virtual social network.We specially build an experiment environment with 12 servers by using Docker container technology and then perform a wide range of experiments with different user scales to evaluate the method.The experimental results demonstrate that not only the degrees of the social network but also the time intervals of the collective users’web behavior can be well fitted to a power-law distribution and show that our simulation method can well simulate a collective user web behavior. 展开更多
关键词 Web behavior simulation virtual social network human dynamics power-law distribution
在线阅读 下载PDF
The diel vertical migration of the sound-scattering layer in the Yellow Sea Bottom Cold Water of the southeastern Yellow Sea: focus on its relationship with a temperature structure 被引量:1
18
作者 LEE Hyungbeen CHO Sungho +1 位作者 KIM Woongseo KANG Donhyug 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2013年第9期44-49,共6页
Using the hydroacoustic method with a 200 kHz scientific echo sounding system, the diel vertical migration (DVM) of the sound-scatteringlayer (SSL) in the Yellow Sea Bottom Cold Water (YSBCW) of the southeastern... Using the hydroacoustic method with a 200 kHz scientific echo sounding system, the diel vertical migration (DVM) of the sound-scatteringlayer (SSL) in the Yellow Sea Bottom Cold Water (YSBCW) of the southeastern Yellow Sea was studied in April (spring) and August (summer) of 2010 and 2011. For each survey, 13-27 hours of acoustic data were continuously collected at a stationary station. The acoustic volume scattering strength (Sv) data were analyzed with temperature profile data. In the spring of both 2010 and 2011, the SSL clearly showed the vertical migration throughout the entire water column, moving from the surface layer at night to near the bottom during the day. Conductivity, temperature, and depth data indicated that the entire water column was well mixed with low temperature of about 8℃. However, the SSL showed different patterns in the summers of 2010 and 2011. In the summer of 2010 (≈28℃ at the surface), the SSL migrated to near the bottom during the day, but there were two SSLs above and below the thermocline at depth of 10-30 m at night. In the summer of 2011 (≈20℃ at the surface), the SSL extended throughout the entire water column at night, possibly owing to an abrupt change in sea weather conditions caused by the passage of a Typhoon Muifa over the study area. It was cancluded that the DVM patterns in summer in the YSBCW area may be greatly influenced by a strengthened or weakened thermocline. 展开更多
关键词 diel vertical migration sound-scattering layer temperature structure TYPHOON Yellow Sea Bot- tom Cold Water
在线阅读 下载PDF
Different metabolic/obesity phenotypes are differentially associated with development of prediabetes in adults: Results from a 14-year cohort study 被引量:2
19
作者 Fahimeh Haghighatdoost Masoud Amini +2 位作者 Ashraf Aminorroaya Majid Abyar Awat Feizi 《World Journal of Diabetes》 SCIE CAS 2019年第6期350-361,共12页
BACKGROUND The risk of developing prediabetes based on the metabolic/obesity phenotypes has been poorly investigated. AIM To examine the association of baseline metabolic/obesity phenotypes and their changes over time... BACKGROUND The risk of developing prediabetes based on the metabolic/obesity phenotypes has been poorly investigated. AIM To examine the association of baseline metabolic/obesity phenotypes and their changes over time with the risk of prediabetes development. METHODS In a population-based cohort study, 1741 adults (aged > 19 years) with normal blood glucose were followed for 14 years. Anthropometric and biochemical measures were evaluated regularly during the follow-up period. According to body mass index and metabolic health status, participants were categorized into four groups: Metabolically healthy normal weight (MHNW), metabolically healthy obese (MHO), metabolically unhealthy normal weight (MUNW) and metabolically unhealthy obese (MUO). Multivariable Cox regression analysis was used to measure the risk of prediabetes according to the baseline metabolic/obesity phenotype and their changes during the follow-up. RESULTS In the whole population with a mean (95CCI for mean) follow up duration of 12.7 years (12.6-12.9), all three MUNW, MHO, MUO groups were at higher risk for developing prediabetes compared to the MHNW group (P = 0.022). The MUNW group had the highest risk for developing prediabetes (hazard ratio (HR): 3.84, 95%CI: 1.20, 12.27). In stratified analysis by sex, no significant association was found in men, while women in the MUNW group were at the greatest risk for prediabetes (HR: 6.74, 95%CI: 1.53, 29.66). Transforming from each phenotype to MHNW or MHO was not related to the risk of prediabetes development, whereas transforming from each phenotype to MUO was associated with an increased risk of prediabetes (HR > 1;P < 0.05). CONCLUSION Our findings indicate that MHO is not a high risk, unless it transforms into MUO over time. However, people in the MUNW group have the greatest risk for developing prediabetes, and therefore, they should be screened and treated. 展开更多
关键词 PREDIABETES OBESITY METABOLIC status COHORT study
暂未订购
A Privacy-Preserving Aggregation and Authentication Scheme Towards Mobile Users in Smart Grid 被引量:2
20
作者 GUO Fei CAO Zhenfu +1 位作者 LIU Zhusen CAO Nanyuan 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第1期37-43,共7页
With the enormous developmen t of imformation and communicat ion technology,more concerns are focused to achieve secure and reliable smart grids as the social infrastrueture,especially in the explosion era of mobile d... With the enormous developmen t of imformation and communicat ion technology,more concerns are focused to achieve secure and reliable smart grids as the social infrastrueture,especially in the explosion era of mobile devices.In this paper,we propose an efficient scheme to satis勿the outdoor electrical demand of mobile customers.Our scheme protects the privacy and integrity of users'electricity consumption data.Technically,we encrypt users'electricity consumption data by a chosen-plai nt ext-at tack(CPA)secure public key encryption(PKE)scheme and aggregate ciphertexts by the aggregator(an untrusted third party).In the scheme,internal and external adversaries cannot obtain the electricity consumption data.Additionally,we require users to provide authentication and commitment of consumption data that can track who modifies the data,which protects the integrity of users1 electricity consumption data. 展开更多
关键词 SMART GRID AUTHENTICATION COMMITMENT
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部