In this paper we present the control and synchronization of a coupled Bragg acousto-optic bistable map system using nonlinear feedback technology. This nonlinear feedback technology is useful to control a temporally c...In this paper we present the control and synchronization of a coupled Bragg acousto-optic bistable map system using nonlinear feedback technology. This nonlinear feedback technology is useful to control a temporally chaotic system as well as a spatiotemporally chaotic system. It can be extended to synchronize the spatiotemporal chaos. It can work in a wide range of the controlled and synchronized signals, so it can decrease the sensitivity down to a noise level. The synchronization can be obtained by the analysis of the largest conditional Lyapunov exponent spectrum, and easily implemented in practical systems just by adjusting the coupled strength without any pre-knowledge of the dynamic system required.展开更多
Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network ...Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network security. From a random sequencing viewpoint, both sequences of HC-256 and real DNA data may have intrinsic pseudo-random properties respectively. In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encode thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional visualization tools to organize various complex interactive properties as visual maps. The Variant Map System (VMS) as an emerging scheme is systematically proposed in this paper to apply multiple maps that used four Meta symbols as same as DNA or RNA representations. System architecture of key components and core mechanism on the VMS are described. Key modules, equations and their I/O parameters are discussed. Applying the VM System, two sets of real DNA sequences from both sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with pseudo DNA sequences generated by HC-256 to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under controllable environment. Visual results are briefly analyzed to explore their intrinsic properties on selected genome sequences.展开更多
Digital geological mapping fundamentally broke through the traditional working pattern,successfully carried out the geological mapping digitalization.By using the RGMAP system to field digital geological mapping,the a...Digital geological mapping fundamentally broke through the traditional working pattern,successfully carried out the geological mapping digitalization.By using the RGMAP system to field digital geological mapping,the authors summarized the method of work and the work flow of the RGMAPGIS during the field geological survey.First,we prepared material,set up the PRB gallery,then put the geographic base map under the background maplayer and organizing the field hand map,forming the field factual datum map.At last,the geological space database is formed.展开更多
This paper proposes a web map system for drawing an arbitrary travel route using a mouse-sensitive following path suggestion. The interaction model of the system allows users to intuitively understand the sequence of ...This paper proposes a web map system for drawing an arbitrary travel route using a mouse-sensitive following path suggestion. The interaction model of the system allows users to intuitively understand the sequence of user actions needed to draw a conceived route and reduces the number of user actions required. Moreover, the system allows users to understand at a glance several drawing alternatives (static suggestion) and also consider a particular drawing alternative (dynamic suggestion) without making any commitment. The proposed architecture of the system reduces the influence caused by communication delay between a map server and a web client by delivering in advance road network data from a map server to a web client. Experimental evaluations on a prototype we developed demonstrated that the proposed system enables users to draw arbitrary routes within noticeably less clicks, in less time, and with less stress than previous systems.展开更多
Upland crop-rice cropping systems(UCR)facilitate sustainable agricultural intensification.Accurate UCR cultivation mapping is needed to ensure food security,sustainable water management,and rural revitalization.Howeve...Upland crop-rice cropping systems(UCR)facilitate sustainable agricultural intensification.Accurate UCR cultivation mapping is needed to ensure food security,sustainable water management,and rural revitalization.However,datasets describing cropping systems are limited in spatial coverage and crop types.Mapping UCR is more challenging than crop identification and most existing approaches rely heavily on accurate phenology calendars and representative training samples,which limits its applications over large regions.We describe a novel algorithm(RRSS)for automatic mapping of upland crop-rice cropping systems using Sentinel-1 Synthetic Aperture Radar(SAR)and Sentinel-2 Multispectral Instrument(MSI)data.One indicator,the VV backscatter range,was proposed to discriminate UCR and another two indicators were designed by coupling greenness and pigment indices to further discriminate tobacco or oilseed UCR.The RRSS algorithm was applied to South China characterized by complex smallholder rice cropping systems and diverse topographic conditions.This study developed 10-m UCR maps of a major rice bowl in South China,the Xiang-Gan-Min(XGM)region.The performance of the RRSS algorithm was validated based on 5197 ground-truth reference sites,with an overall accuracy of 91.92%.There were7348 km^(2) areas of UCR,roughly one-half of them located in plains.The UCR was represented mainly by oilseed-UCR and tobacco-UCR,which contributed respectively 69%and 15%of UCR area.UCR patterns accounted for only one-tenth of rice production,which can be tripled by intensification from single rice cropping.Application to complex and fragmented subtropical regions suggested the spatiotemporal robustness of the RRSS algorithm,which could be further applied to generate 10-m UCR datasets for application at national or global scales.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara ci...This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara city was divided into 85 indexes based on 1 × 1 km<sup>2</sup> grid mapping system. The diversity and density of species in the indexes are determined. The influence of anthropogenic factors on the diversity of species in the indexes is determined.展开更多
This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.展开更多
文摘In this paper we present the control and synchronization of a coupled Bragg acousto-optic bistable map system using nonlinear feedback technology. This nonlinear feedback technology is useful to control a temporally chaotic system as well as a spatiotemporally chaotic system. It can be extended to synchronize the spatiotemporal chaos. It can work in a wide range of the controlled and synchronized signals, so it can decrease the sensitivity down to a noise level. The synchronization can be obtained by the analysis of the largest conditional Lyapunov exponent spectrum, and easily implemented in practical systems just by adjusting the coupled strength without any pre-knowledge of the dynamic system required.
文摘Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network security. From a random sequencing viewpoint, both sequences of HC-256 and real DNA data may have intrinsic pseudo-random properties respectively. In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encode thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional visualization tools to organize various complex interactive properties as visual maps. The Variant Map System (VMS) as an emerging scheme is systematically proposed in this paper to apply multiple maps that used four Meta symbols as same as DNA or RNA representations. System architecture of key components and core mechanism on the VMS are described. Key modules, equations and their I/O parameters are discussed. Applying the VM System, two sets of real DNA sequences from both sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with pseudo DNA sequences generated by HC-256 to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under controllable environment. Visual results are briefly analyzed to explore their intrinsic properties on selected genome sequences.
基金Supported by National Oil-gas Project:No XQ-2004-07
文摘Digital geological mapping fundamentally broke through the traditional working pattern,successfully carried out the geological mapping digitalization.By using the RGMAP system to field digital geological mapping,the authors summarized the method of work and the work flow of the RGMAPGIS during the field geological survey.First,we prepared material,set up the PRB gallery,then put the geographic base map under the background maplayer and organizing the field hand map,forming the field factual datum map.At last,the geological space database is formed.
文摘This paper proposes a web map system for drawing an arbitrary travel route using a mouse-sensitive following path suggestion. The interaction model of the system allows users to intuitively understand the sequence of user actions needed to draw a conceived route and reduces the number of user actions required. Moreover, the system allows users to understand at a glance several drawing alternatives (static suggestion) and also consider a particular drawing alternative (dynamic suggestion) without making any commitment. The proposed architecture of the system reduces the influence caused by communication delay between a map server and a web client by delivering in advance road network data from a map server to a web client. Experimental evaluations on a prototype we developed demonstrated that the proposed system enables users to draw arbitrary routes within noticeably less clicks, in less time, and with less stress than previous systems.
基金supported by the National Natural Science Foundation of China(42171325,41771468)the National Key Research and Development Program of China(2022YFD2001101)+1 种基金the Science Bureau of Fujian Province(2023Y0042)the Finance Department and the Digital Economy Alliance of Fujian Province。
文摘Upland crop-rice cropping systems(UCR)facilitate sustainable agricultural intensification.Accurate UCR cultivation mapping is needed to ensure food security,sustainable water management,and rural revitalization.However,datasets describing cropping systems are limited in spatial coverage and crop types.Mapping UCR is more challenging than crop identification and most existing approaches rely heavily on accurate phenology calendars and representative training samples,which limits its applications over large regions.We describe a novel algorithm(RRSS)for automatic mapping of upland crop-rice cropping systems using Sentinel-1 Synthetic Aperture Radar(SAR)and Sentinel-2 Multispectral Instrument(MSI)data.One indicator,the VV backscatter range,was proposed to discriminate UCR and another two indicators were designed by coupling greenness and pigment indices to further discriminate tobacco or oilseed UCR.The RRSS algorithm was applied to South China characterized by complex smallholder rice cropping systems and diverse topographic conditions.This study developed 10-m UCR maps of a major rice bowl in South China,the Xiang-Gan-Min(XGM)region.The performance of the RRSS algorithm was validated based on 5197 ground-truth reference sites,with an overall accuracy of 91.92%.There were7348 km^(2) areas of UCR,roughly one-half of them located in plains.The UCR was represented mainly by oilseed-UCR and tobacco-UCR,which contributed respectively 69%and 15%of UCR area.UCR patterns accounted for only one-tenth of rice production,which can be tripled by intensification from single rice cropping.Application to complex and fragmented subtropical regions suggested the spatiotemporal robustness of the RRSS algorithm,which could be further applied to generate 10-m UCR datasets for application at national or global scales.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘This article presents information on the study of the flora of Uzbekistan based on grid system mapping. The urban flora of the city of Bukhara was researched in it. As a result of research, the territory of Bukhara city was divided into 85 indexes based on 1 × 1 km<sup>2</sup> grid mapping system. The diversity and density of species in the indexes are determined. The influence of anthropogenic factors on the diversity of species in the indexes is determined.
文摘背景:腰椎小关节炎是引起下腰痛的一个主要原因,目前主要依靠MRI进行初步定性诊断,但仍有一定漏诊、误诊的概率发生,因此MR T2^(*)mapping成像技术有望成为定量检查腰椎小关节炎软骨损伤的重要检测手段。目的:探讨MR T2^(*)mapping成像技术在定量分析腰椎小关节炎软骨损伤退变中的应用价值。方法:收集南京医科大学第四附属医院2020年4月至2022年3月门诊或住院合并下腰痛共110例患者,设为病例组;同时招募无症状志愿者80例,设为对照组。对所有纳入对象L1-S1的小关节行3.0 T MR扫描,获取T2^(*)mapping横断位图像和T2WI图像,分别对所有小关节软骨进行Weishaupt分级及T2^(*)值测量,收集数据并行统计学分析。不同小关节Weishaupt分级之间小关节软骨T2^(*)值比较采用单因素方差分析。结果与结论:①经统计分析发现,病例组腰椎小关节软骨T2^(*)值(17.6±1.5)ms明显较对照组(21.4±1.3)ms降低,差异有显著性意义(P<0.05);②在病例组中,随着腰椎小关节Weishaupt分级增加,小关节软骨T2^(*)值也呈逐渐下降趋势,且这种差异有显著性意义(P<0.05);③提示T2^(*)mapping能够较好地显示腰椎小关节软骨损伤的早期病理变化,腰椎小关节软骨的T2^(*)值能够定量评估腰椎小关节的软骨损伤程度;T2^(*)mapping成像技术能为影像学诊断腰椎小关节炎软骨早期损伤提供很好的理论依据,具有重要的临床应用价值。
基金This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
文摘This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.