In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identifi...In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identification,evaluation and shared utilization.Simultaneously,the current problems and the suggestions about subsequent development of tea germplasm resources in Yunnan were discussed,including superior and rare germplasm collection,tea genetic diversity research,biotechnology utilization in tea germplasm innovation,super gene exploration and function,the construction of utilization platform,biological base of species and population conservation.展开更多
With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterpris...With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.展开更多
Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge o...Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theor...In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.展开更多
In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance g...In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance gives certain funds subsidy in the project construction period. Embarks highly from strategy during construction plan chosen and operational system management, as while as union digital library to construct a persistent effect mechanism. With the principle of state guidance, enterprise operation and benefit farmers, expand culture industry within the provincial and safeguard Cultural Information Resources Sharing Project sustainable development's, then promotes the rural economy culture full scale development.展开更多
AIM: To assess the capacity and resources of eye care facilities, using the WHO Health Systems Framework, to manage diabetic retinopathy(DR) through task sharing.METHODS: Using purposive sampling, four participants(ad...AIM: To assess the capacity and resources of eye care facilities, using the WHO Health Systems Framework, to manage diabetic retinopathy(DR) through task sharing.METHODS: Using purposive sampling, four participants(administrators) from four selected hospitals in two provinces in Pakistan were recruited for this cross-sectional study. A survey, to assess the capacity and resources of the selected eye care facilities for the feasibility to adopt task sharing in management of DR to prevent vision loss, was emailed to participants who were asked to complete. Responses to open-ended questions were entered into a Microsoft Excel spread sheet and inductive approach was applied for analysis.RESULTS: All the surveyed eye care facilities offer eye care services for people with diabetes and DR. All surveyed eye care facilities have a shortage in the number of human resources across all cadres. Optometrists and mid-level eye care workers did not have active roles in DR screening and management in all four hospitals. All the hospitals surveyed did not have a computerized record management system for patients who visit ophthalmologists for eye examinations. Equipment for detection and management of DR were short in number and main users were ophthalmologists. There was no policy for population-based screening program for detection of DR in any of the surveyed hospitals.CONCLUSION: A system-based approach to manage DR is needed. The capacity of eye care facilities and the potential to improve access of people with diabetes to eyecare services can be enhanced through implementation of task sharing.展开更多
Western China includes 12 provincial divisions (the 7 provinces of Sichuan, Guizhou, Yunnan, Shaanxi, Gansu, Qinghai and; 5 autonomous regions of Tibet, Ningxia, Xinjiang, Inner Mongolia and Guangxi; and one city of C...Western China includes 12 provincial divisions (the 7 provinces of Sichuan, Guizhou, Yunnan, Shaanxi, Gansu, Qinghai and; 5 autonomous regions of Tibet, Ningxia, Xinjiang, Inner Mongolia and Guangxi; and one city of Chongqing), which comprise 71.4% of the national land area, 28.5% of the national population and produce 17.5% of the national GDP in China. There are 17 countries that have riparian relationships with western China, most of which are water-short countries. All are listed by UN ESCAP as countries with potential water crisis. The co-operative development and coordinated management of international rivers in western China is an important step toward the implementation of the national Great Western Development program. Taking into account of the national strategy and object hierarchy, as well as the development demand of the western region, it is necessary to pursue the multi-disciplinary study of the equitable allocation, utilisation, and eco-environment protection of transboundary water resources in the region. Such efforts will undoubtedly provide scientific evidence and support for the decision-making of the environmental protection and ecological construction and management in the western regions, the enforcement of the sub-regional economic co-operation, mitigation of trans-boundary conflicts, and enhancing bio-diversity conservation.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud co...Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.展开更多
Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documen...Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also anal...This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their geneti...Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.展开更多
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m...Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.展开更多
In China,geothermal resource utilization has mainly focused on resources at shallow and medium depths.Yet,the exploration of deep,high-temperature geothermal resources holds significant importance for achieving the“d...In China,geothermal resource utilization has mainly focused on resources at shallow and medium depths.Yet,the exploration of deep,high-temperature geothermal resources holds significant importance for achieving the“dual carbon”goals and the transition of energy structure.The Jiyang Depression in the Bohai Bay Basin has vast potential for deep,high-temperature geothermal resources.By analyzing data from 2187 wells with temperature logs and 270 locations for temperature measurement in deep strata,we mapped the geothermal field of shallow to medium-deep layers in the Jiyang Depression using ArcGIS and predicted the temperatures of deep layers with a burial depth of 4000 m.Through stochastic modeling and numerical simulation,a reservoir attribute parameter database for favorable deep,high-temperature geothermal areas was developed,systematically characterizing the spatial distribution of geothermal resources within a play fairway of 139.5 km2 and estimating the exploitable deep geothermal resource potential by using the heat storage method and Monte Carlo data analysis.The study reveals that the Fan 54 well block in the Boxing-Jijia region is of prime significance to develop deep,high-temperature geothermal resources in the Jiyang Depression.Strata from the Cenozoic to the Upper Paleozoic are identified as effective cap layers for these deep geothermal resources.The Lower Paleozoic capable of effectively storing thermal energy and possessing an exploitable resource volume up to 127 million tons of standard coal,is identified as a target system for the development of deep high-temperature geothermal resources,providing significant insights for the efficient development of geothermal resources in the Jiyang Depression.展开更多
In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright ...In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.展开更多
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am...Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.展开更多
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ...With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.展开更多
基金Supported by Project of National Natural Science Foundation of China (31160175)Project of Tea Research Institute of Yunnan Academy of Agricultural Sciences (2009A0937)National Modern Agriculture Technology System Projects in Tea Industry (nycytx-23)~~
文摘In this paper,the research achievements and progress of Yunnan tea germplasm resource in past sixty years are systematically reviewed from the following aspects:exploration,collecting,conservation,protection,identification,evaluation and shared utilization.Simultaneously,the current problems and the suggestions about subsequent development of tea germplasm resources in Yunnan were discussed,including superior and rare germplasm collection,tea genetic diversity research,biotechnology utilization in tea germplasm innovation,super gene exploration and function,the construction of utilization platform,biological base of species and population conservation.
文摘With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.
文摘Since the electronic resources and Internet Web sites became popular, distance education courses offered via the Internet could play an important role in providing global digital resources and teaching the knowledge of international library and information standards for bibliographic databases with electronic and web resources.This paper uses the example of the author's new online course: ILS 608 Cataloging and Development of a Digital Union Catalog for Ancient Chinese Books to demonstrate the global re...
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金Supported by Soft Science Project of the Ministry of Science and Technology (2011GXS1D003)Soft Science Project of Chongqing Municipality (cstc2011cx-rkxB00008)
文摘In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.
文摘In order to reduce east--west section area of “digital divider” in China, Ministry of Culture laun- ches the National Cultural Information Resources Sharing Project in the mid-west provinces, and the state finance gives certain funds subsidy in the project construction period. Embarks highly from strategy during construction plan chosen and operational system management, as while as union digital library to construct a persistent effect mechanism. With the principle of state guidance, enterprise operation and benefit farmers, expand culture industry within the provincial and safeguard Cultural Information Resources Sharing Project sustainable development's, then promotes the rural economy culture full scale development.
基金Supported by the research from Centre for Eye Research Australia(CERA),Royal Victorian Eye&Ear Hospital,Melbourne,Australia.CERA receives Operational Infrastructure Support from the Victorian Government
文摘AIM: To assess the capacity and resources of eye care facilities, using the WHO Health Systems Framework, to manage diabetic retinopathy(DR) through task sharing.METHODS: Using purposive sampling, four participants(administrators) from four selected hospitals in two provinces in Pakistan were recruited for this cross-sectional study. A survey, to assess the capacity and resources of the selected eye care facilities for the feasibility to adopt task sharing in management of DR to prevent vision loss, was emailed to participants who were asked to complete. Responses to open-ended questions were entered into a Microsoft Excel spread sheet and inductive approach was applied for analysis.RESULTS: All the surveyed eye care facilities offer eye care services for people with diabetes and DR. All surveyed eye care facilities have a shortage in the number of human resources across all cadres. Optometrists and mid-level eye care workers did not have active roles in DR screening and management in all four hospitals. All the hospitals surveyed did not have a computerized record management system for patients who visit ophthalmologists for eye examinations. Equipment for detection and management of DR were short in number and main users were ophthalmologists. There was no policy for population-based screening program for detection of DR in any of the surveyed hospitals.CONCLUSION: A system-based approach to manage DR is needed. The capacity of eye care facilities and the potential to improve access of people with diabetes to eyecare services can be enhanced through implementation of task sharing.
基金National Natural Science Foundation of ChinaNo.49631020+1 种基金The Key Project of "inth Five-Year Plan" of the National Program for Science and TechnologyNo.2000-K01-02-01
文摘Western China includes 12 provincial divisions (the 7 provinces of Sichuan, Guizhou, Yunnan, Shaanxi, Gansu, Qinghai and; 5 autonomous regions of Tibet, Ningxia, Xinjiang, Inner Mongolia and Guangxi; and one city of Chongqing), which comprise 71.4% of the national land area, 28.5% of the national population and produce 17.5% of the national GDP in China. There are 17 countries that have riparian relationships with western China, most of which are water-short countries. All are listed by UN ESCAP as countries with potential water crisis. The co-operative development and coordinated management of international rivers in western China is an important step toward the implementation of the national Great Western Development program. Taking into account of the national strategy and object hierarchy, as well as the development demand of the western region, it is necessary to pursue the multi-disciplinary study of the equitable allocation, utilisation, and eco-environment protection of transboundary water resources in the region. Such efforts will undoubtedly provide scientific evidence and support for the decision-making of the environmental protection and ecological construction and management in the western regions, the enforcement of the sub-regional economic co-operation, mitigation of trans-boundary conflicts, and enhancing bio-diversity conservation.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
文摘Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.
文摘Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘This paper discusses the Project's organization system, technical system, creation of digital resources and service mode. It also summarizes achievements gained since the commencement of the Project, and also analyzes some of the more important issues during implementation stage and gives a few suggestions of the future development during the next stage of the 11thFive-Year Plan.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
文摘Wherever people live together in or near homelands that harbour joint natural resources such as forest, water, minerals, oil etc., they must collaborate, co-exist and share these resources irrespective of their genetic, social, cultural, and political peculiarities. This is not always the case when self-interest, ethnic divisions, elitist politics, economic interest and power tussle set in. The Nso and Oku people who reside in the Ngongbaa Forest area constitute an example of joint management of resources where at one period, their relationship over the management of the Oku Mountain Forest was cordial and at another, the relationship became conflictive. This study was designed to study the influence of the KIFP forest management policies on the Nso indigenous forest Management system in Ngongbaa Forest, and its implications. The data collected for the study was secured through the administration of a questionnaire to residents of 10 villages adjacent to the Ngongbaa Forest, and forest users who carried out livelihood activities there between 1963 and 2015. These forest user groups include beekeepers, rat trappers, grazers, mushroom gatherers, ground honey/tree honey harvesters, carvers, etc. The investigation also extended to the traditional leaders of Nso and Oku who are in charge of the land tenure systems. The findings show that the Oku Mountain Forest is jointly owned by the Nso and Oku people. The Nso own the eastern half of the forest known as Ngongbaa Forest while the Oku own the western half, known as the Kilum Forest. The cordial relationship that existed between these people ensured the conservation of the forest. But the conflicts that later set in, especially due to the creation of the Kilum Mountain Forest Project in 1987 later changed to the Kilum Ijim Forest Project (KIFP) in 1992 sidelined the local communities which was contrary to the dispositions of the new Cameroon forest law enacted in 1994. Thus, the indigenous conservation practices became ignored which the local population never digested well. This seriously jeopardized the wellbeing of the forest in general.
基金supported by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(No.JZNY202114)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX210734).
文摘Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.
基金Research Project(SNKJ2022A06-R23)the Innovation Fund Project for Graduate Student of China University of Petroleum(East China)the Fundamental Research Funds for the Central Uni-versities(No.24CX04021A)。
文摘In China,geothermal resource utilization has mainly focused on resources at shallow and medium depths.Yet,the exploration of deep,high-temperature geothermal resources holds significant importance for achieving the“dual carbon”goals and the transition of energy structure.The Jiyang Depression in the Bohai Bay Basin has vast potential for deep,high-temperature geothermal resources.By analyzing data from 2187 wells with temperature logs and 270 locations for temperature measurement in deep strata,we mapped the geothermal field of shallow to medium-deep layers in the Jiyang Depression using ArcGIS and predicted the temperatures of deep layers with a burial depth of 4000 m.Through stochastic modeling and numerical simulation,a reservoir attribute parameter database for favorable deep,high-temperature geothermal areas was developed,systematically characterizing the spatial distribution of geothermal resources within a play fairway of 139.5 km2 and estimating the exploitable deep geothermal resource potential by using the heat storage method and Monte Carlo data analysis.The study reveals that the Fan 54 well block in the Boxing-Jijia region is of prime significance to develop deep,high-temperature geothermal resources in the Jiyang Depression.Strata from the Cenozoic to the Upper Paleozoic are identified as effective cap layers for these deep geothermal resources.The Lower Paleozoic capable of effectively storing thermal energy and possessing an exploitable resource volume up to 127 million tons of standard coal,is identified as a target system for the development of deep high-temperature geothermal resources,providing significant insights for the efficient development of geothermal resources in the Jiyang Depression.
基金This work is supported by the National Key Research and Development Program(2022YFB2702300)National Natural Science Foundation of China(Grant No.62172115)+2 种基金Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education under Grant Number No.1331005Guangdong Higher Education Innovation Group 2020KCXTD007Guangzhou Fundamental Research Plan of Municipal-School Jointly Funded Projects(No.202102010445).
文摘In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.
文摘Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple.
基金This work was financially supported by the National Key Research and Development Program of China(2022YFB3103200).
文摘With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.