In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat...In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.展开更多
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e...The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.展开更多
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such...Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.展开更多
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i...This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed.展开更多
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experim...A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established.展开更多
Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the ...Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD).展开更多
China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly...China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries.展开更多
Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative tec...Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries.展开更多
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. T...In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing.展开更多
In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes pro...In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.展开更多
Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait lo...Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program.展开更多
In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the pr...In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network.展开更多
Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the pro...Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw.展开更多
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne...In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated.展开更多
Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion Detection.In this paper,as enlightene...Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion Detection.In this paper,as enlightened by the theory of Deep Learning Neural Networks,Hierarchy Distributed-Agents Model for Network Risk Evaluation,a newly developed model,is proposed.The architecture taken on by the distributed-agents model are given,as well as the approach of analyzing network intrusion detection using Deep Learning,the mechanism of sharing hyper-parameters to improve the efficiency of learning is presented,and the hierarchical evaluative framework for Network Risk Evaluation of the proposed model is built.Furthermore,to examine the proposed model,a series of experiments were conducted in terms of NSLKDD datasets.The proposed model was able to differentiate between normal and abnormal network activities with an accuracy of 97.60%on NSL-KDD datasets.As the results acquired from the experiment indicate,the model developed in this paper is characterized by high-speed and high-accuracy processing which shall offer a preferable solution with regard to the Risk Evaluation in Network.展开更多
The output feedback model predictive control(MPC),for a linear parameter varying(LPV) process system including unmeasurable model parameters and disturbance(all lying in known polytopes),is considered.Some previously ...The output feedback model predictive control(MPC),for a linear parameter varying(LPV) process system including unmeasurable model parameters and disturbance(all lying in known polytopes),is considered.Some previously developed tools,including the norm-bounding technique for relaxing the disturbance-related constraint handling,the dynamic output feedback law,the notion of quadratic boundedness for specifying the closed-loop stability,and the ellipsoidal state estimation error bound for guaranteeing the recursive feasibility,are merged in the control design.Some previous approaches are shown to be the special cases.An example of continuous stirred tank reactor(CSTR) is given to show the effectiveness of the proposed approaches.展开更多
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu...To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms.展开更多
Purpose–Under the constraints of given passenger service level and coupling travel demand with train departure time,this study optimizes the train operational plan in an urban rail corridor to minimize the numbers of...Purpose–Under the constraints of given passenger service level and coupling travel demand with train departure time,this study optimizes the train operational plan in an urban rail corridor to minimize the numbers of train trips and rolling stocks considering the time-varying demand of urban rail passenger flow.Design/methodology/approach–The authors optimize the train operational plan in a special network layout,i.e.an urban rail corridor with dead-end terminal yard,by decomposing it into two sub-problems:train timetable optimization and rolling stock circulation optimization.As for train timetable optimization,the authors propose a schedule-based passenger flow assignment method,construct the corresponding timetabling optimization model and design the bi-directional coordinated sequential optimization algorithm.For the optimization of rolling stock circulation,the authors construct the corresponding optimization assignment model and adopt the Hungary algorithm for solving the model.Findings–The case study shows that the train operational plan developed by the study’s approach meets requirements on the passenger service quality and reduces the operational cost to the maximum by minimizing the numbers of train trips and rolling stocks.Originality/value–The example verifies the efficiency of the model and algorithm.展开更多
基金supported by Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004).
文摘In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.
文摘The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.
基金the Higher Education Commission(HEC),Pakistan throughits initiative of National Center for Cyber Security for the affiliated Security Testing-Innovative SecuredSystems Lab(ISSL)established at University of Engineering&Technology(UET)Peshawar,Grant No.2(1078)/HEC/M&E/2018/707.
文摘Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.
文摘This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed.
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金the financial support from the National Natural Science Foundation of China(No.51204195,No.51074171 and No.51274216)
文摘A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established.
基金supported by three programs from the National Natural Science Foundation of China (NSFC) (The experimental study on the effect of trace elements iodine and selenium on the autoimmune thyroid disease (No.30571564)The cross-sectional investigation on hypothyroidism induced by excess iodine intake and the experimental research on pathogenesy (No.30972465)The change of thyroid pathology and the levels of T3,T4 in SePP1,GPX3 knock out mice (No.30810103004)
文摘Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD).
基金supported by the National Basic Research Program of China(973 Program,2015CB150405)the China Postdoctoral Science Foundation Grant(2016M601177)
文摘China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries.
基金supported by the National Basic Research Program of China (2015CB150405)
文摘Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries.
基金Project supported by the National Natural Science Foundation of China (Grant No 60472018).
文摘In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing.
文摘In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated.
基金supported by the National Basic Research Program of China (2009CB118300 and 2009CB118605)the Innovative Group Grant of NSFC, China (31121062)the Special Fund for Agro-Scientific Research in the Public Interest, China (201103003)
文摘Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program.
文摘In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network.
基金supported by National Basic Research Program of China (973 Program, 2009CB118605)the National Natural Science Foundation of China (30571106)the Innovative Group Grant of Natural Science Foundation of China (30821003)
文摘Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 60773085 and 60801051)the NSFC-KOSEF International Collaborative Research Funds (Grant Nos 60811140346 and F01-2008-000-10021-0)
文摘In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated.
基金This work is supported by the National Key Research and Development Program of China under Grant 2016YFB0800600the Natural Science Foundation of China under Grant(No.61872254 and No.U1736212)+2 种基金the Fundamental Research Funds for the central Universities(No.YJ201727,No.A0920502051815-98)Academic and Technical Leaders’Training Support Fund of Sichuan Province(2016)the research projects of the Humanity and Social Science Youth Foundation of Ministry of Education(13YJCZH021).We want to convey our grateful appreciation to the corresponding author of this paper,Gang Liang,who has offered advice with huge values in all stages when writing this essay to us.
文摘Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion Detection.In this paper,as enlightened by the theory of Deep Learning Neural Networks,Hierarchy Distributed-Agents Model for Network Risk Evaluation,a newly developed model,is proposed.The architecture taken on by the distributed-agents model are given,as well as the approach of analyzing network intrusion detection using Deep Learning,the mechanism of sharing hyper-parameters to improve the efficiency of learning is presented,and the hierarchical evaluative framework for Network Risk Evaluation of the proposed model is built.Furthermore,to examine the proposed model,a series of experiments were conducted in terms of NSLKDD datasets.The proposed model was able to differentiate between normal and abnormal network activities with an accuracy of 97.60%on NSL-KDD datasets.As the results acquired from the experiment indicate,the model developed in this paper is characterized by high-speed and high-accuracy processing which shall offer a preferable solution with regard to the Risk Evaluation in Network.
基金Supported by the National High Technology Research and Development Program of China(2014AA041802)the National Natural Science Foundation of China(61573269)
文摘The output feedback model predictive control(MPC),for a linear parameter varying(LPV) process system including unmeasurable model parameters and disturbance(all lying in known polytopes),is considered.Some previously developed tools,including the norm-bounding technique for relaxing the disturbance-related constraint handling,the dynamic output feedback law,the notion of quadratic boundedness for specifying the closed-loop stability,and the ellipsoidal state estimation error bound for guaranteeing the recursive feasibility,are merged in the control design.Some previous approaches are shown to be the special cases.An example of continuous stirred tank reactor(CSTR) is given to show the effectiveness of the proposed approaches.
基金This research is partially supported by the National Natural Science Foundation of China under Grant Nos.61672016the Jiangsu Qing Lan Project,the Six Talent Peaks Project in Jiangsu Province under Grant RJFW-010the Guangxi Key Laboratory of Cryptography and Information Security under Grant GCIS201815.
文摘To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms.
基金funded by the National Natural Science Foundation of China(71701216,71171200).
文摘Purpose–Under the constraints of given passenger service level and coupling travel demand with train departure time,this study optimizes the train operational plan in an urban rail corridor to minimize the numbers of train trips and rolling stocks considering the time-varying demand of urban rail passenger flow.Design/methodology/approach–The authors optimize the train operational plan in a special network layout,i.e.an urban rail corridor with dead-end terminal yard,by decomposing it into two sub-problems:train timetable optimization and rolling stock circulation optimization.As for train timetable optimization,the authors propose a schedule-based passenger flow assignment method,construct the corresponding timetabling optimization model and design the bi-directional coordinated sequential optimization algorithm.For the optimization of rolling stock circulation,the authors construct the corresponding optimization assignment model and adopt the Hungary algorithm for solving the model.Findings–The case study shows that the train operational plan developed by the study’s approach meets requirements on the passenger service quality and reduces the operational cost to the maximum by minimizing the numbers of train trips and rolling stocks.Originality/value–The example verifies the efficiency of the model and algorithm.