The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A mul...Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.展开更多
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im...This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-mark...With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.展开更多
This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the im...This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.展开更多
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ...Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.展开更多
Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)a...Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.展开更多
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic...The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.展开更多
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat...The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.展开更多
The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with...The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.展开更多
The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts...The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.展开更多
With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,un...With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,universities have continuously carried out the construction of software engineering majors.Accreditation Board for Engineering and Technology(ABET)certification,as an internationally recognized higher education quality assurance system,provides important reference and guidance for the construction of software engineering majors.Guided by student learning outcomes and core competencies,combined with the characteristics of software engineering talent cultivation,the innovation of talent cultivation mode takes industry-education integration and school-enterprise cooperation as the main development paths and explores comprehensive reform of the major in terms of professional positioning and goals,curriculum system,teaching conditions,and teachers.This comprehensive reform model has effectively promoted the development of major construction and improved the quality of talent cultivation.展开更多
Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational ...Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.展开更多
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th...Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setti...Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.展开更多
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their...The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.展开更多
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
文摘Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.
基金2021 Tianjin Educational Science Planning Project“Research and Practice of Talent Cultivation Mode for IoT Majors in Higher Vocational Colleges under the Guidance of the‘1+X’Certificate System”(CJE210237)。
文摘This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
基金supported by the National Key R&D Program of China(2017YFB0902200).
文摘With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.
基金Supported by School-level Cultivation Project of Hetian Vocational and Technical College(HZ-2022-14)Science and Technology Research and Development Plan Project in Hetian Area(20220219).
文摘This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.
文摘Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.
基金supported in part by the National Natural Science Foundation of China(No.5197707).
文摘Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.
基金supported by Joint Funds of the National Natural Science Foundation of China and Xinjiang under Project U1603261.
文摘The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
基金supported by the National Natural Science Foundation of China under grant 61972207,U1836208,U1836110,61672290the Major Program of the National Social Science Fund of China under Grant No.17ZDA092+2 种基金by the National Key R&D Program of China under grant 2018YFB1003205by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fundby the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.
基金supported by the National Natural Science Foundation of China(72061147002)the National Social Science Foundation of China(18ZDA074)。
文摘The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.
基金Chongqing Municipal Education Science Planning Project+Educational Reform Special Project+Practice Research on Integrated Teaching Reform of“Post-Course Competition Certificate”for BIM Intelligent Construction Major in Vocational Schools(Project number:K23ZG3250169)。
文摘The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.
基金Digital Twin and Acoustic Perception Research Team(2021XJTD06)。
文摘With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,universities have continuously carried out the construction of software engineering majors.Accreditation Board for Engineering and Technology(ABET)certification,as an internationally recognized higher education quality assurance system,provides important reference and guidance for the construction of software engineering majors.Guided by student learning outcomes and core competencies,combined with the characteristics of software engineering talent cultivation,the innovation of talent cultivation mode takes industry-education integration and school-enterprise cooperation as the main development paths and explores comprehensive reform of the major in terms of professional positioning and goals,curriculum system,teaching conditions,and teachers.This comprehensive reform model has effectively promoted the development of major construction and improved the quality of talent cultivation.
文摘Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.
基金Project(61003140) supported by the National Natural Science Foundation of ChinaProject(013/2010/A) supported by Macao Science and Technology Development FundProject(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
文摘Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
基金Supported by Studies of Rural Policy-favored Petty Loan Forest Property Mortgage Mode,the Youth Fund of MOE(Ministry of Education in China)Project on Humanities and Social Sciences(11YJCZH258)the Fundamental Research Funds for the Central Universities(RW2011-36)
文摘Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.
基金the National Natural Science Foundation of China (60773086)
文摘The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.