An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl...An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.展开更多
Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to ...Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise.展开更多
Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seism...Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance.展开更多
Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It...Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with展开更多
Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a...Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation.展开更多
Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence tha...Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective展开更多
A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is...A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm.展开更多
The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960,...The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years.展开更多
Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection syste...Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure.展开更多
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex...RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.展开更多
This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed mo...This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor).展开更多
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr...Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data.展开更多
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by...The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).展开更多
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation...To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.展开更多
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievingh...In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-value data in plaintext form and/or the associated decryption key.Inthis paper,the author presents a number of simple methods for identifyingand extracting crypfographic keys from memory dumps of softwareapplications that utilize the Microsoft.NET Framework,as well as source-code level countermeasures to protect against same.Given the EXE file ofan application and a basic knowledge of the cryptographic libraries utilizedin the NET Framework,the author shows how to create a memory dumpof a running application and how to extract cryptographic keys from sameusing WinDBG-without any prior knowledgel of the cryptographic keyutilized.Whilst the proof-of-concept application utilized as part of thispaper uses an implementation of the DES cipher,it should be noted that thesteps shown can be utilized against all three generations of symmetric andasymmetric ciphers supported within the NET Framework.展开更多
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th...With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.展开更多
In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relati...In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relative tangential movement and determined numerically by using a refined model of shear keys.The user subroutine of nonlinear spring elements has been implemented into ABAQUS program.The seismic responses of an arch-gravity dam are mainly examined.It is shown by the results that a significant increase of about 17%-30%in joint opening can be observed for the dam with one-way shear keys;the two-way shear keys are beneficial to restrain the sliding displacement along both the radial and vertical directions,whereas the one-way shear keys mainly restrain the displacement along the radial direction;for the dam with shear keys,the maximum arch stress is increased,the cantilever stress is reduced,and the location of the maximum cantilever stress is also moved from the dam heel to the midheight of the cantilever.展开更多
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env...Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.展开更多
文摘An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.
文摘Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise.
基金Project of China International Science and Technology Cooperation under Grant No.2009DFA82480Science and Technology Project of Communications’ Construction in Western China,MOC under Grant No.2009318223094
文摘Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance.
文摘Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with
文摘Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation.
基金financially supported by the Emil Aaltonen Foundation(No.160029)
文摘Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective
文摘A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm.
文摘The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years.
文摘Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure.
基金Supported by National Laboratory for Modern Communications Foundation (No. 5143 6010404DZ0235)
文摘RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
基金supported by the National Natural Science Foundation of China(816 01207)National Basic Research Program of China(973 Program)(2017YFA 0505700)
文摘This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor).
基金supported by the National Natural Science Founds of China (62072368, U20B2050)Key Research and Development Program of Shaanxi Province (2020GY-039, 2021ZDLGY05-09, 2022GY040)
文摘Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data.
基金Supported by the National Natural Science Foun-dation of China (60473029)
文摘The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).
文摘To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.
文摘In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-value data in plaintext form and/or the associated decryption key.Inthis paper,the author presents a number of simple methods for identifyingand extracting crypfographic keys from memory dumps of softwareapplications that utilize the Microsoft.NET Framework,as well as source-code level countermeasures to protect against same.Given the EXE file ofan application and a basic knowledge of the cryptographic libraries utilizedin the NET Framework,the author shows how to create a memory dumpof a running application and how to extract cryptographic keys from sameusing WinDBG-without any prior knowledgel of the cryptographic keyutilized.Whilst the proof-of-concept application utilized as part of thispaper uses an implementation of the DES cipher,it should be noted that thesteps shown can be utilized against all three generations of symmetric andasymmetric ciphers supported within the NET Framework.
文摘With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.
基金supported by the National Natural Science Foundation of China(Grant Nos.50539030,50779011,11132003)the National Basic Research Program of China("973"Project)(Grant No.2007CB714104)the Innovative Project for Graduate Students of Jiangsu Province (Grant No.CX10B_202Z)
文摘In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relative tangential movement and determined numerically by using a refined model of shear keys.The user subroutine of nonlinear spring elements has been implemented into ABAQUS program.The seismic responses of an arch-gravity dam are mainly examined.It is shown by the results that a significant increase of about 17%-30%in joint opening can be observed for the dam with one-way shear keys;the two-way shear keys are beneficial to restrain the sliding displacement along both the radial and vertical directions,whereas the one-way shear keys mainly restrain the displacement along the radial direction;for the dam with shear keys,the maximum arch stress is increased,the cantilever stress is reduced,and the location of the maximum cantilever stress is also moved from the dam heel to the midheight of the cantilever.
基金Project supported by the Natural Science Foundation of Jilin Province of China(Grant No.20210101417JC).
文摘Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.