Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A mul...Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im...This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”展开更多
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ...Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.展开更多
With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-mark...With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.展开更多
This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the im...This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.展开更多
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic...The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.展开更多
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat...The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.展开更多
Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)a...Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.展开更多
The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts...The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.展开更多
Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the...Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.展开更多
In order to promote the reform of vocational education,the state has issued the National Vocational Education Reform Implementation Plan,in which the reform of"Teachers,Teaching Materials,and Teaching Methods&quo...In order to promote the reform of vocational education,the state has issued the National Vocational Education Reform Implementation Plan,in which the reform of"Teachers,Teaching Materials,and Teaching Methods"as well as the"1+X"certificate have been the most prominent topics for discussion.Facing new opportunities for vocational education development,popularizing the blend of"1+x"courses and certificates,strengthening the integration of production and education,as well as enhancing professional soft skills are urgent issues to solved.This article combines the"1+X"certificate of civil engineering professional construction drawings and analyzes the necessity of promoting the"1+X"professional skill level as well as the combination of certificate and curriculum construction in deepening the reform of"Teachers,Teaching Materials,and Teaching Methods."Several suggestions have been put forward for the reform of"Teachers,Teaching Materials,and Teaching Methods"which would be helpful for the practical exploration in the reform of"three teaching methods."展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setti...Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.展开更多
In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of Exte...In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of External Audit of the Customs (hereinafterreferred to as Certificate) as of June 5, 1997. The Certificate has ablack leather outer covering and is inlaid inside with a pierced andguilded customs emblem, which consists of the red national em-blem in its upper part, and a key and a truncheon encircled by earsof wheat in its lower part. Put in a leather covering, the Certificateis a card sealed up with plastics, on which there is a bareheadedcolour photo of the holder in the Customs uniform and with a展开更多
Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducte...Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducted. The multi-stage and cluster sampling approach was adopted for the quantitative part of the study. A questionnaire was designed and 996 children and their keepers were interviewed. Principals, doctors or teachers of the primary schools, directors and child care nurses of kindergarten, and staff of immunization agencies were invited to take part in 12 focus group discussions; meanwhile, face-to-face individual in-depth interviews with 16 officials of the Health, Education and Governmental Departments at various levels were conducted. Results The total number of subjects was 996. 16.7% of the children in the study completed all the procedures of the National Immunization Programme. 34.3% of them had immunization certificates while the remainder 44.7% registered in immunization agencies. Factors, including the migrant children, doubt about vaccine efficiency, mother’s occupation and educational background, knowledge of the National Immunization Programme on targeted vaccines, played an important role in obtaining or not immunization certificates. 95% of the keepers interviewed thought the immunization certificates were useful; 94.8% of them considered the check was critical while only 3.6% of them thought it unnecessary. The first reason from those who found it unnecessary was that they feared that repeated immunization might affect their children’s health. The second reason was the cost of immunization, which some of them could not afford to pay. However, the Health Department expressed a favorable attitude to the checking scheme. Though the Education Department agreed that the scheme was essential, they worried that it would affect the enrollment rate.Conclusion In spite of the difficulty in administering immunization certificate check, the effort would be rewarding for raising the immunization coverage rate among the children in Guizhou Province.展开更多
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani...In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.展开更多
ZTE Corporation, a publicly-listed global provider of telecommunications equipment and network solutions, has become the first Chinese telecom company to be issued with a CC (Common Criteria for IT security evaluatio...ZTE Corporation, a publicly-listed global provider of telecommunications equipment and network solutions, has become the first Chinese telecom company to be issued with a CC (Common Criteria for IT security evaluation) security certificate.展开更多
The CQC is an independent and impartial quality certificate organization with third party status established by the State Import and Export Commodity Inspection Administration (SCIA) in accordance with the Law of Comm...The CQC is an independent and impartial quality certificate organization with third party status established by the State Import and Export Commodity Inspection Administration (SCIA) in accordance with the Law of Commodity Inspection and granted its duties and obligations by the State Council.The main aspects of its duties and obligations include: implementing the certification of import commodity safety and quality; the certification of the quality control system and the展开更多
文摘Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
基金2021 Tianjin Educational Science Planning Project“Research and Practice of Talent Cultivation Mode for IoT Majors in Higher Vocational Colleges under the Guidance of the‘1+X’Certificate System”(CJE210237)。
文摘This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”
文摘Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.
基金supported by the National Key R&D Program of China(2017YFB0902200).
文摘With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.
基金Supported by School-level Cultivation Project of Hetian Vocational and Technical College(HZ-2022-14)Science and Technology Research and Development Plan Project in Hetian Area(20220219).
文摘This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.
基金supported by Joint Funds of the National Natural Science Foundation of China and Xinjiang under Project U1603261.
文摘The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
基金supported by the National Natural Science Foundation of China under grant 61972207,U1836208,U1836110,61672290the Major Program of the National Social Science Fund of China under Grant No.17ZDA092+2 种基金by the National Key R&D Program of China under grant 2018YFB1003205by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fundby the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.
基金supported in part by the National Natural Science Foundation of China(No.5197707).
文摘Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.
基金Chongqing Municipal Education Science Planning Project+Educational Reform Special Project+Practice Research on Integrated Teaching Reform of“Post-Course Competition Certificate”for BIM Intelligent Construction Major in Vocational Schools(Project number:K23ZG3250169)。
文摘The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.
基金the High Technoeogy Research and Debelopment Program of China
文摘Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.
文摘In order to promote the reform of vocational education,the state has issued the National Vocational Education Reform Implementation Plan,in which the reform of"Teachers,Teaching Materials,and Teaching Methods"as well as the"1+X"certificate have been the most prominent topics for discussion.Facing new opportunities for vocational education development,popularizing the blend of"1+x"courses and certificates,strengthening the integration of production and education,as well as enhancing professional soft skills are urgent issues to solved.This article combines the"1+X"certificate of civil engineering professional construction drawings and analyzes the necessity of promoting the"1+X"professional skill level as well as the combination of certificate and curriculum construction in deepening the reform of"Teachers,Teaching Materials,and Teaching Methods."Several suggestions have been put forward for the reform of"Teachers,Teaching Materials,and Teaching Methods"which would be helpful for the practical exploration in the reform of"three teaching methods."
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
基金Supported by Studies of Rural Policy-favored Petty Loan Forest Property Mortgage Mode,the Youth Fund of MOE(Ministry of Education in China)Project on Humanities and Social Sciences(11YJCZH258)the Fundamental Research Funds for the Central Universities(RW2011-36)
文摘Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.
文摘In accordance with the regulations as stipulated in the Pro-visions of the Customs of the People’s Republic of China on Ex-ternal Audit, the Customs officers engaged in external audit shalluse the Certificate of External Audit of the Customs (hereinafterreferred to as Certificate) as of June 5, 1997. The Certificate has ablack leather outer covering and is inlaid inside with a pierced andguilded customs emblem, which consists of the red national em-blem in its upper part, and a key and a truncheon encircled by earsof wheat in its lower part. Put in a leather covering, the Certificateis a card sealed up with plastics, on which there is a bareheadedcolour photo of the holder in the Customs uniform and with a
文摘Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducted. The multi-stage and cluster sampling approach was adopted for the quantitative part of the study. A questionnaire was designed and 996 children and their keepers were interviewed. Principals, doctors or teachers of the primary schools, directors and child care nurses of kindergarten, and staff of immunization agencies were invited to take part in 12 focus group discussions; meanwhile, face-to-face individual in-depth interviews with 16 officials of the Health, Education and Governmental Departments at various levels were conducted. Results The total number of subjects was 996. 16.7% of the children in the study completed all the procedures of the National Immunization Programme. 34.3% of them had immunization certificates while the remainder 44.7% registered in immunization agencies. Factors, including the migrant children, doubt about vaccine efficiency, mother’s occupation and educational background, knowledge of the National Immunization Programme on targeted vaccines, played an important role in obtaining or not immunization certificates. 95% of the keepers interviewed thought the immunization certificates were useful; 94.8% of them considered the check was critical while only 3.6% of them thought it unnecessary. The first reason from those who found it unnecessary was that they feared that repeated immunization might affect their children’s health. The second reason was the cost of immunization, which some of them could not afford to pay. However, the Health Department expressed a favorable attitude to the checking scheme. Though the Education Department agreed that the scheme was essential, they worried that it would affect the enrollment rate.Conclusion In spite of the difficulty in administering immunization certificate check, the effort would be rewarding for raising the immunization coverage rate among the children in Guizhou Province.
文摘In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.
文摘ZTE Corporation, a publicly-listed global provider of telecommunications equipment and network solutions, has become the first Chinese telecom company to be issued with a CC (Common Criteria for IT security evaluation) security certificate.
文摘The CQC is an independent and impartial quality certificate organization with third party status established by the State Import and Export Commodity Inspection Administration (SCIA) in accordance with the Law of Commodity Inspection and granted its duties and obligations by the State Council.The main aspects of its duties and obligations include: implementing the certification of import commodity safety and quality; the certification of the quality control system and the