An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measur...An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.展开更多
According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the num...According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.展开更多
As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectu...As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa...展开更多
The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional p...The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional positioning of China’s recording and review system,whether it involves the specific rights of citizens in individual cases.From the actual situation in China,the development trend of the constitutional review systems in various countries in the world,and the attitudes of the National People’s Congress and the academic circle,the protection of civil rights should be one of the functions of record review.According to the relevant provisions of the Legislative Law and the Law on the Supervision of Standing Committees of People’s Congresses at Various Levels,our courts should construct a dual complementary mechanism for review requests from the Supreme People’s Court and review recommendations from local people’s courts at all levels in the litigation process.Meanwhile,according to the retrospective theory of the law,the filing review filed by the parties after the court ’s lawsuit should be retroactive to the parties themselves,and the law should provide for a system to initiate retrial proceedings in this case to relieve the parties’ rights.展开更多
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.展开更多
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a...Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.展开更多
This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch ...This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch studies were conducted in abiotic and biotic reactors containing fresh and aged SIF under different dissolved oxygen concentrations with NO_(3)^(-)−N and/or PO_(4)^(3−)influent(s)and their nitrate/phosphate removal and by-product formations were studied.Batch reactors were seeded with a homogenized mixed microbial inoculum procured from natural sludges which were enriched over 6 months under denitrifying conditions in the presence of SIF.Results indicated that when influent containing 40 mg/L of NO_(3)^(-)−N was treated with 5 g SIF,79.9%nitrate reduction was observed in 8 days abiotically and 100%removal was accomplished in 20 days when the reactor was seeded.Both abiotic and seeded reactors removed more than 92%PO_(4)^(3−)under high DO conditions in 12 days.Abiotic and biochemical removal of NO_(3)^(-)−N and abiotic removal of PO_(4)^(3−)were higher under independent NO_(3)^(-)−N/PO_(4)^(3−)loading,while 99%PO_(4)^(3−)was removed biochemically under combined NO_(3)^(-)−N and PO_(4)^(3−)loading.This study furthers the understandings of nitrate and phosphate removal in Zero Valent Iron(ZVI)assisted mixed microbial systems to encourage the application of SIF-supported bio-chemical processes in the simultaneous removals of these pollutants.展开更多
Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and reg...Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and regions applied for patents and trademarks in China in 2019.Japan.展开更多
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ...Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.展开更多
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ...File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems.展开更多
In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and ...In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc.展开更多
Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regiona...Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regional stratigraphic unconformities are mainly developed in the Sichuan Basin,from the bottom up which are between pre-Sinian and Sinian,between Sinian and Cambrian,between pre-Permian and Permian,between middle and upper Permian,between middle and upper Triassic,and between Triassic and Jurassic.Especially,16 of 21l conventional(and tight)gas fields discovered are believed to have formed in relation to regional unconformities.Second,regional unconformity mainly controls hydrocarbon accumulation from five aspects:(1)The porosity and permeability of reservoirs under the unconformity are improved through weathering crust karstification to form large-scale karst reservoirs;(2)Good source-reservoir-caprock assemblage can form near the unconformity,which provides a basis for forming large gas field;(3)Regional unconformity may lead to stratigraphic pinch-out and rugged ancient landform,giving rise to a large area of stratigraphic and lithologic trap groups;(4)Regional unconformity provides a dominant channel for lateral migration of oil and gas;and(5)Regional unconformity is conducive to large-scale accumulation of oil and gas.Third,the areas related to regional unconformities are the exploration focus of large gas fields in the Sichuan Basin.The pre-Sinian is found with source rocks,reservoir rocks and other favorable conditions for the formation of large gas fields,and presents a large exploration potential.Thus,it is expected to be an important strategic replacement.展开更多
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun...Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.展开更多
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of m...The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage.展开更多
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it...Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes.展开更多
The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs.This paper has proposed a novel scheduler for enhancement of the perfo...The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs.This paper has proposed a novel scheduler for enhancement of the performance of the Hadoop Yet Another Resource Negotiator(YARN)scheduler,called the Adaptive Node and Container Aware Scheduler(ANACRAC),that aligns cluster resources to the demands of the applications in the real world.The approach performs to leverage the user-provided configurations as a unique design to apportion nodes,or containers within the nodes,to application thresholds.Additionally,it provides the flexibility to the applications for selecting and choosing which node’s resources they want to manage and adds limits to prevent threshold breaches by adding additional jobs as needed.Node or container awareness can be utilized individually or in combination to increase efficiency.On top of this,the resource availability within the node and containers can also be investigated.This paper also focuses on the elasticity of the containers and self-adaptiveness depending on the job type.The results proved that 15%–20%performance improvement was achieved compared with the node and container awareness feature of the ANACRAC.It has been validated that this ANACRAC scheduler demonstrates a 70%–90%performance improvement compared with the default Fair scheduler.Experimental results also demonstrated the success of the enhancement and a performance improvement in the range of 60%to 200%when applications were connected with external interfaces and high workloads.展开更多
文摘An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.
文摘According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.
文摘As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa...
基金a phased result of the Research on the Jurisprudence,Operation and Effectiveness of Constitution Publicity,a research project of humanities and social sciences launched by Chongqing Municipal Education Commission. The project No. is 19SKCH017
文摘The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional positioning of China’s recording and review system,whether it involves the specific rights of citizens in individual cases.From the actual situation in China,the development trend of the constitutional review systems in various countries in the world,and the attitudes of the National People’s Congress and the academic circle,the protection of civil rights should be one of the functions of record review.According to the relevant provisions of the Legislative Law and the Law on the Supervision of Standing Committees of People’s Congresses at Various Levels,our courts should construct a dual complementary mechanism for review requests from the Supreme People’s Court and review recommendations from local people’s courts at all levels in the litigation process.Meanwhile,according to the retrospective theory of the law,the filing review filed by the parties after the court ’s lawsuit should be retroactive to the parties themselves,and the law should provide for a system to initiate retrial proceedings in this case to relieve the parties’ rights.
基金Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
文摘Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
基金This research work was funded by Institutional Fund Projects under Grant No.(IFPIP:211-611-1443).
文摘Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.
基金We are grateful for the project grants supported by the Major Science and Technology Programs for Water Pollution Control and Management of China(Nos.2012ZX07205-001 and 2017ZX7103-007).
文摘This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch studies were conducted in abiotic and biotic reactors containing fresh and aged SIF under different dissolved oxygen concentrations with NO_(3)^(-)−N and/or PO_(4)^(3−)influent(s)and their nitrate/phosphate removal and by-product formations were studied.Batch reactors were seeded with a homogenized mixed microbial inoculum procured from natural sludges which were enriched over 6 months under denitrifying conditions in the presence of SIF.Results indicated that when influent containing 40 mg/L of NO_(3)^(-)−N was treated with 5 g SIF,79.9%nitrate reduction was observed in 8 days abiotically and 100%removal was accomplished in 20 days when the reactor was seeded.Both abiotic and seeded reactors removed more than 92%PO_(4)^(3−)under high DO conditions in 12 days.Abiotic and biochemical removal of NO_(3)^(-)−N and abiotic removal of PO_(4)^(3−)were higher under independent NO_(3)^(-)−N/PO_(4)^(3−)loading,while 99%PO_(4)^(3−)was removed biochemically under combined NO_(3)^(-)−N and PO_(4)^(3−)loading.This study furthers the understandings of nitrate and phosphate removal in Zero Valent Iron(ZVI)assisted mixed microbial systems to encourage the application of SIF-supported bio-chemical processes in the simultaneous removals of these pollutants.
文摘Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and regions applied for patents and trademarks in China in 2019.Japan.
基金National Natural Science Foundation of China(62173066)Open Project of Sichuan Provincial Key Laboratory of Intelligent Terminal Co-built by Province and City(SCITLAB-1014)。
文摘Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.
文摘File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems.
基金This research was supported by the Universiti Sains Malaysia(USM)and the ministry of Higher Education Malaysia through Fundamental Research Grant Scheme(FRGS-Grant No:FRGS/1/2020/TK0/USM/02/1).
文摘In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc.
基金Supported by the National Natural Science Foundation Project of China(U22B6002)Prospective Basic Technology Research Project of PetroChina(2021DJ0605).
文摘Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regional stratigraphic unconformities are mainly developed in the Sichuan Basin,from the bottom up which are between pre-Sinian and Sinian,between Sinian and Cambrian,between pre-Permian and Permian,between middle and upper Permian,between middle and upper Triassic,and between Triassic and Jurassic.Especially,16 of 21l conventional(and tight)gas fields discovered are believed to have formed in relation to regional unconformities.Second,regional unconformity mainly controls hydrocarbon accumulation from five aspects:(1)The porosity and permeability of reservoirs under the unconformity are improved through weathering crust karstification to form large-scale karst reservoirs;(2)Good source-reservoir-caprock assemblage can form near the unconformity,which provides a basis for forming large gas field;(3)Regional unconformity may lead to stratigraphic pinch-out and rugged ancient landform,giving rise to a large area of stratigraphic and lithologic trap groups;(4)Regional unconformity provides a dominant channel for lateral migration of oil and gas;and(5)Regional unconformity is conducive to large-scale accumulation of oil and gas.Third,the areas related to regional unconformities are the exploration focus of large gas fields in the Sichuan Basin.The pre-Sinian is found with source rocks,reservoir rocks and other favorable conditions for the formation of large gas fields,and presents a large exploration potential.Thus,it is expected to be an important strategic replacement.
基金supported in part by Ministry of Science and Technology(MOST),Taiwan under the Grant MOST 109-2221-E-029-017-MY2.
文摘Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.
文摘The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage.
基金supported by the National Natural Science Foundation of China (62072325)Shanxi Scholarship Council of China (HGKY2019081)+1 种基金Fundamental Research Program of Shanxi Province (202103021224272)TYUST SRIF (20212039).
文摘Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes.
文摘The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs.This paper has proposed a novel scheduler for enhancement of the performance of the Hadoop Yet Another Resource Negotiator(YARN)scheduler,called the Adaptive Node and Container Aware Scheduler(ANACRAC),that aligns cluster resources to the demands of the applications in the real world.The approach performs to leverage the user-provided configurations as a unique design to apportion nodes,or containers within the nodes,to application thresholds.Additionally,it provides the flexibility to the applications for selecting and choosing which node’s resources they want to manage and adds limits to prevent threshold breaches by adding additional jobs as needed.Node or container awareness can be utilized individually or in combination to increase efficiency.On top of this,the resource availability within the node and containers can also be investigated.This paper also focuses on the elasticity of the containers and self-adaptiveness depending on the job type.The results proved that 15%–20%performance improvement was achieved compared with the node and container awareness feature of the ANACRAC.It has been validated that this ANACRAC scheduler demonstrates a 70%–90%performance improvement compared with the default Fair scheduler.Experimental results also demonstrated the success of the enhancement and a performance improvement in the range of 60%to 200%when applications were connected with external interfaces and high workloads.