The main technical content of full mechanized corn production in Daiyue District is explained,and the problems of disease and insect pest control in the middle and late growth stage of corn in full mechanized producti...The main technical content of full mechanized corn production in Daiyue District is explained,and the problems of disease and insect pest control in the middle and late growth stage of corn in full mechanized production are analyzed."One prevention double reduction"of corn performed by unmanned aerial vehicle(UAV)and self-propelled sprayer is compared and analyzed,and some suggestions are put forward for further popularization and application of full mechanized corn production.展开更多
In this post-genomic era, more and more susceptibility loci of many possible genetic diseases are published. As our knowledge about these susceptibility loci is limited and partial, we should be very careful and respo...In this post-genomic era, more and more susceptibility loci of many possible genetic diseases are published. As our knowledge about these susceptibility loci is limited and partial, we should be very careful and responsible when patients seek genetic counseling about these possible genetic diseases. We should apply Confucius' s principle about knowledge and information to genetic conseling, and tell the truth to our patients about what we know and what we do not know. Like many other cancers, breast cancer is a very complicated, multifactorial disease; genetic factors, lifestyles and eating habits, environmental factors, and viral infections might be involved in breast cancer; hence, it is difficult to figure out the real etiology of breast cancer. It is not crystal clear that a person who carries mutations of the breast cancer 1, early onset and/or breast cancer 2, early onset genes would eventually get breast cancer in her/his lifetime. No person should undergo a preventive double mastectomy, unless we know the etiology of breast cancer someday.展开更多
Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing the...Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.Since legalized services on large number of various applications and system architectures depend on digital signature techniques,in the context some coerced users who use double authentication preventing signatures to design some novel digital signature techniques,have some convincing dissertations to defuse requests from authorities and big brothers creating some corresponding subverted signatures.As rapid progress in quantum computers,National Security Agency advisory memorandum and announcement of National Institute of Standards and Technology procedures from standardization focus on some cryptographic algorithms which are post quantum secure.Motivated by these issues,we design an algorithm substitution attack against Fiat-Shamir family based on lattices(e.g.,BLISS,BG,Ring-TESLA,PASSSign and GLP)that are proven post-quantum computational secure.We also show an efficient deterable way to eliminate big brother’s threat by leaking signing keys from signatures on two messages to be public.Security proof shows that our schemes satisfy key extraction,undetectability and deterability.Through parameters analysis and performance evaluation,we demonstrate that our deterring subverted Fiat-Shamir signature is practical,which means that it can be applied to privacy and protection in some system architectures.展开更多
文摘The main technical content of full mechanized corn production in Daiyue District is explained,and the problems of disease and insect pest control in the middle and late growth stage of corn in full mechanized production are analyzed."One prevention double reduction"of corn performed by unmanned aerial vehicle(UAV)and self-propelled sprayer is compared and analyzed,and some suggestions are put forward for further popularization and application of full mechanized corn production.
文摘In this post-genomic era, more and more susceptibility loci of many possible genetic diseases are published. As our knowledge about these susceptibility loci is limited and partial, we should be very careful and responsible when patients seek genetic counseling about these possible genetic diseases. We should apply Confucius' s principle about knowledge and information to genetic conseling, and tell the truth to our patients about what we know and what we do not know. Like many other cancers, breast cancer is a very complicated, multifactorial disease; genetic factors, lifestyles and eating habits, environmental factors, and viral infections might be involved in breast cancer; hence, it is difficult to figure out the real etiology of breast cancer. It is not crystal clear that a person who carries mutations of the breast cancer 1, early onset and/or breast cancer 2, early onset genes would eventually get breast cancer in her/his lifetime. No person should undergo a preventive double mastectomy, unless we know the etiology of breast cancer someday.
基金Supported by the National Natural Science Foundation of China(61802239,61872229,62062019,62074131)Key Research and Development Program of Shaanxi Province(2020ZDLGY09-06,2021ZDLGY06-04,2021ZDLGY05-01)+1 种基金Natural Science Basic Research Plan in Shaanxi Province(2019JQ-667,2020JQ-422)Shenzhen Fundamental Research Program(20210317191843003)
文摘Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.Since legalized services on large number of various applications and system architectures depend on digital signature techniques,in the context some coerced users who use double authentication preventing signatures to design some novel digital signature techniques,have some convincing dissertations to defuse requests from authorities and big brothers creating some corresponding subverted signatures.As rapid progress in quantum computers,National Security Agency advisory memorandum and announcement of National Institute of Standards and Technology procedures from standardization focus on some cryptographic algorithms which are post quantum secure.Motivated by these issues,we design an algorithm substitution attack against Fiat-Shamir family based on lattices(e.g.,BLISS,BG,Ring-TESLA,PASSSign and GLP)that are proven post-quantum computational secure.We also show an efficient deterable way to eliminate big brother’s threat by leaking signing keys from signatures on two messages to be public.Security proof shows that our schemes satisfy key extraction,undetectability and deterability.Through parameters analysis and performance evaluation,we demonstrate that our deterring subverted Fiat-Shamir signature is practical,which means that it can be applied to privacy and protection in some system architectures.