Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic ph...Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.展开更多
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
Objective:To determine whether a single dose of gonadotropin-releasing hormone(GnRH)agonist administered subcutaneously in addition to the regular progesterone supplementation could provide a better luteal support in ...Objective:To determine whether a single dose of gonadotropin-releasing hormone(GnRH)agonist administered subcutaneously in addition to the regular progesterone supplementation could provide a better luteal support in antagonist protocol fresh embryo transfer cycles.Methods:This prospective,multicentric,cohort study included total 140 women,70 in each group.Controlled ovarian stimulation was carried out as per fixed GnRH antagonist protocol.The trigger was given with hCG.In vitro fertilization/intracytoplasmic sperm injection(IVF/ICSI)was performed and day-3 embryos were transferred.Patients were divided into groups 1 and 2 based on computer generated randomization sheet.Six days following oocyte retrieval,group 1 received 0.2 mg decapeptyl subcutaneously in addition to regular progesterone support while group 2 received progesterone only.Luteal support was given for 14 days to both groups;if pregnancy was confirmed luteal support was continued till 12 weeks of gestation.The clinical pregnancy rate was the primary outcome.The implantation rate,miscarriage rate,live birth delivery rate,and multiple pregnancy rates were the secondary outcomes.Results:A total of 140 patients were analysed,70 in each group.Clinical pregnancy rates(47.1%vs.35.7%;P=0.17),implantation rates(23.4%vs.18.1%,P=0.24),live birth delivery rates(41.4%vs.27.1%,P=0.08),and multiple pregnancy rates(21.2%vs.16.0%,P=0.74)were higher in group 1 than in group 2.Group 1 had a lower miscarriage rate than group 2(5.7%vs.8.6%;P=0.75).However,these differences were not statistically significant between the two groups.Conclusions:Administration of a single dose of GnRH agonist in addition to regular natural micronized vaginal progesterone as luteal support in GnRH antagonist protocol cycles marginally improves implantation rates,clinical pregnancy rates,and live birth delivery rates.However,more studies with higher sample sizes are needed before any conclusive statements about GnRH agonist as luteal phase support can be made.展开更多
超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与...超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与正常HTTP数据包之间的差别,针对目前HTTP隧道检测方法存在的不足,提出了一种仅需提取小部分流量数据的基于卷积神经网络的HTTP隧道检测方法。实验结果表明,基于卷积神经网络的HTTP隧道检测方法能有效识别网络中的HTTP隧道流量,检测精确率、召回率、F1分数均达到99%以上,且不需要人工选择大量的专家特征,对网络流量监管有重要意义。展开更多
视频流量逐渐在网络中占据主导地位,且视频平台大多对其进行加密传输。虽然加密传输视频可以有效保护用户隐私,但是也增加了监管有害视频传播的难度.现有的加密视频识别方法基于TCP(Transmission Control Protocol)传输协议头部信息和HT...视频流量逐渐在网络中占据主导地位,且视频平台大多对其进行加密传输。虽然加密传输视频可以有效保护用户隐私,但是也增加了监管有害视频传播的难度.现有的加密视频识别方法基于TCP(Transmission Control Protocol)传输协议头部信息和HTTP/1.1(Hypertext Transfer Protocol Version1.1)的传输模式,提取应用层音视频数据单元传输长度序列来实现视频识别.但是随着基于UDP(User Datagram Protocol)的QUIC(Quick UDP Internet Connections)协议及基于QUIC实现的HTTP/3(Hypertext Transfer Protocol Version 3)协议应用于视频传输,已有方法不再适用.HTTP/3协议缺少类似TCP的头部信息,且使用了多路复用机制,并对几乎所有数据进行了加密,此外,视频平台开始使用多片段合并分发技术,这给从网络流量中精准识别加密视频带来了巨大挑战。本文基于HTTP/3协议中的控制信息特征,提出了从HTTP/3加密视频流中提取数据传输特征并进行修正的方法,最大程度复原出应用层音视频长度特征.面向多片段合并分发导致的海量匹配问题,本文基于明文指纹库设计了键值数据库来实现视频的快速识别.实验结果表明,本文提出的基于HTTP/3传输特性的加密视频识别方法能够在包含36万个真实视频指纹的YouTube大规模指纹库中达到接近99%的准确率,100%的精确率以及99.32%的F1得分,对传输过程中加人了填充顿的Facebook平台,在包含28万个真实视频指纹的大规模指纹库中达到95%的准确率、100%的精确率以及96.45%的F1得分,在具有同样特性的Instagram平台中,最高可达到97.57%的F1得分,且本方法在所有指纹库中的平均视频识别时间均低于0.4秒.本文的方法首次解决了使用HTTP/3传输的加密视频在大规模指纹库场景中的识别问题,具有很强的实用性和通用性.展开更多
Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DT...Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.展开更多
在车联网场景中,现有基于位置服务的隐私保护方案存在不支持多种类型K近邻兴趣点的并行查询、难以同时保护车辆用户和位置服务提供商(Location-Based Service Provider,LBSP)两方隐私、无法抵抗恶意攻击等问题。为了解决上述问题,提出...在车联网场景中,现有基于位置服务的隐私保护方案存在不支持多种类型K近邻兴趣点的并行查询、难以同时保护车辆用户和位置服务提供商(Location-Based Service Provider,LBSP)两方隐私、无法抵抗恶意攻击等问题。为了解决上述问题,提出了一种保护两方隐私的多类型的路网K近邻查询方案MTKNN-MPP。将改进的k-out-of-n不经意传输协议应用于K近邻查询方案中,实现了在保护车辆用户的查询内容隐私和LBSP的兴趣点信息隐私的同时,一次查询多种类型K近邻兴趣点。通过增设车载单元缓存机制,降低了计算代价和通信开销。安全性分析表明,MTKNN-MPP方案能够有效地保护车辆用户的位置隐私、查询内容隐私以及LBSP的兴趣点信息隐私,可以保证车辆的匿名性,能够抵抗合谋攻击、重放攻击、推断攻击、中间人攻击等恶意攻击。性能评估表明,与现有典型的K近邻查询方案相比,MTKNN-MPP方案具有更高的安全性,且在单一类型K近邻查询和多种类型K近邻查询中,查询延迟分别降低了43.23%~93.70%,81.07%~93.93%。展开更多
文摘Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
文摘Objective:To determine whether a single dose of gonadotropin-releasing hormone(GnRH)agonist administered subcutaneously in addition to the regular progesterone supplementation could provide a better luteal support in antagonist protocol fresh embryo transfer cycles.Methods:This prospective,multicentric,cohort study included total 140 women,70 in each group.Controlled ovarian stimulation was carried out as per fixed GnRH antagonist protocol.The trigger was given with hCG.In vitro fertilization/intracytoplasmic sperm injection(IVF/ICSI)was performed and day-3 embryos were transferred.Patients were divided into groups 1 and 2 based on computer generated randomization sheet.Six days following oocyte retrieval,group 1 received 0.2 mg decapeptyl subcutaneously in addition to regular progesterone support while group 2 received progesterone only.Luteal support was given for 14 days to both groups;if pregnancy was confirmed luteal support was continued till 12 weeks of gestation.The clinical pregnancy rate was the primary outcome.The implantation rate,miscarriage rate,live birth delivery rate,and multiple pregnancy rates were the secondary outcomes.Results:A total of 140 patients were analysed,70 in each group.Clinical pregnancy rates(47.1%vs.35.7%;P=0.17),implantation rates(23.4%vs.18.1%,P=0.24),live birth delivery rates(41.4%vs.27.1%,P=0.08),and multiple pregnancy rates(21.2%vs.16.0%,P=0.74)were higher in group 1 than in group 2.Group 1 had a lower miscarriage rate than group 2(5.7%vs.8.6%;P=0.75).However,these differences were not statistically significant between the two groups.Conclusions:Administration of a single dose of GnRH agonist in addition to regular natural micronized vaginal progesterone as luteal support in GnRH antagonist protocol cycles marginally improves implantation rates,clinical pregnancy rates,and live birth delivery rates.However,more studies with higher sample sizes are needed before any conclusive statements about GnRH agonist as luteal phase support can be made.
文摘超文本传输协议(Hyper Text Transfer Protocol,HTTP)隧道具有穿越防火墙和规避入侵检测系统识别的能力,给信息安全带来严重威胁。然而现阶段的HTTP隧道检测方法识别能力不足、难以应对特征复杂的HTTP隧道。文中分析了HTTP隧道数据包与正常HTTP数据包之间的差别,针对目前HTTP隧道检测方法存在的不足,提出了一种仅需提取小部分流量数据的基于卷积神经网络的HTTP隧道检测方法。实验结果表明,基于卷积神经网络的HTTP隧道检测方法能有效识别网络中的HTTP隧道流量,检测精确率、召回率、F1分数均达到99%以上,且不需要人工选择大量的专家特征,对网络流量监管有重要意义。
文摘视频流量逐渐在网络中占据主导地位,且视频平台大多对其进行加密传输。虽然加密传输视频可以有效保护用户隐私,但是也增加了监管有害视频传播的难度.现有的加密视频识别方法基于TCP(Transmission Control Protocol)传输协议头部信息和HTTP/1.1(Hypertext Transfer Protocol Version1.1)的传输模式,提取应用层音视频数据单元传输长度序列来实现视频识别.但是随着基于UDP(User Datagram Protocol)的QUIC(Quick UDP Internet Connections)协议及基于QUIC实现的HTTP/3(Hypertext Transfer Protocol Version 3)协议应用于视频传输,已有方法不再适用.HTTP/3协议缺少类似TCP的头部信息,且使用了多路复用机制,并对几乎所有数据进行了加密,此外,视频平台开始使用多片段合并分发技术,这给从网络流量中精准识别加密视频带来了巨大挑战。本文基于HTTP/3协议中的控制信息特征,提出了从HTTP/3加密视频流中提取数据传输特征并进行修正的方法,最大程度复原出应用层音视频长度特征.面向多片段合并分发导致的海量匹配问题,本文基于明文指纹库设计了键值数据库来实现视频的快速识别.实验结果表明,本文提出的基于HTTP/3传输特性的加密视频识别方法能够在包含36万个真实视频指纹的YouTube大规模指纹库中达到接近99%的准确率,100%的精确率以及99.32%的F1得分,对传输过程中加人了填充顿的Facebook平台,在包含28万个真实视频指纹的大规模指纹库中达到95%的准确率、100%的精确率以及96.45%的F1得分,在具有同样特性的Instagram平台中,最高可达到97.57%的F1得分,且本方法在所有指纹库中的平均视频识别时间均低于0.4秒.本文的方法首次解决了使用HTTP/3传输的加密视频在大规模指纹库场景中的识别问题,具有很强的实用性和通用性.
文摘Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.
文摘在车联网场景中,现有基于位置服务的隐私保护方案存在不支持多种类型K近邻兴趣点的并行查询、难以同时保护车辆用户和位置服务提供商(Location-Based Service Provider,LBSP)两方隐私、无法抵抗恶意攻击等问题。为了解决上述问题,提出了一种保护两方隐私的多类型的路网K近邻查询方案MTKNN-MPP。将改进的k-out-of-n不经意传输协议应用于K近邻查询方案中,实现了在保护车辆用户的查询内容隐私和LBSP的兴趣点信息隐私的同时,一次查询多种类型K近邻兴趣点。通过增设车载单元缓存机制,降低了计算代价和通信开销。安全性分析表明,MTKNN-MPP方案能够有效地保护车辆用户的位置隐私、查询内容隐私以及LBSP的兴趣点信息隐私,可以保证车辆的匿名性,能够抵抗合谋攻击、重放攻击、推断攻击、中间人攻击等恶意攻击。性能评估表明,与现有典型的K近邻查询方案相比,MTKNN-MPP方案具有更高的安全性,且在单一类型K近邻查询和多种类型K近邻查询中,查询延迟分别降低了43.23%~93.70%,81.07%~93.93%。