期刊文献+
共找到205篇文章
< 1 2 11 >
每页显示 20 50 100
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
1
作者 Smith Patel Vijay K. Madisetti 《Journal of Information Security》 2024年第4期474-493,共20页
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac... In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates. 展开更多
关键词 Phishing Attacks password Management Phishing Detection AI BERT Algorithm Real-time Protection CYBERSECURITY URL Authentication
下载PDF
Photodissociation Dynamics of 2-1odotoluene Investigated by Femtosecond Time-Resolved Mass Spectrometry 被引量:1
2
作者 刘志明 王艳梅 +2 位作者 胡春龙 龙金友 张冰 《Chinese Journal of Chemical Physics》 SCIE CAS CSCD 2016年第1期53-58,I0001,共7页
The photodissociation dynamics of 2-iodotoluene following excitation at 266 nm have been investigated employing femtosecond time-resolved mass spectrometry. The photofragments are detected by multiphoton ionization us... The photodissociation dynamics of 2-iodotoluene following excitation at 266 nm have been investigated employing femtosecond time-resolved mass spectrometry. The photofragments are detected by multiphoton ionization using an intense laser field centered at 800 nm. A dissociation time of 3804-50 fs was measured from the rising time of the co-fragments of toluene radical (C7H7) and iodine atom (I), which is attributed to the averaged time needed for the C-I bond breaking for the simultaneously excited nσ and ππ* states by 266 nm pump light. In addition, a probe light centered at 298.23 nm corresponding to resonance wavelength of ground-state iodine atom is used to selectively ionize ground-state iodine atoms generated from the dissociation of initially populated hσ* and ππ* states. And a rise time of 4004-50 fs is extracted from the fitting of time-dependent I+ transient, which is in agreement with the dissociation time obtained by multiphoton ionization with 800 nm, suggesting that the main dissociative products are ground-state iodine atoms. 展开更多
关键词 resolved mass 2-1odotoluene PHOTODISSOCIATION Dissociation time Femtosecond timespectrometry
下载PDF
Impact of time lags on diurnal estimates of canopy transpiration and canopy conductance from sap-flow measurements of Populus cathayana in the Qinghai–Tibetan Plateau 被引量:3
3
作者 Hui Wang Kangning He +4 位作者 Runjie Li Zhuping Sheng Yun Tian Jun Wen Bo Chang 《Journal of Forestry Research》 SCIE CAS CSCD 2017年第3期481-490,共10页
Recently, canopy transpiration (Ec) has been often estimated by xylem sap-flow measurements. However, there is a significant time lag between sap flow measured at the base of the stem and canopy transpiration due to... Recently, canopy transpiration (Ec) has been often estimated by xylem sap-flow measurements. However, there is a significant time lag between sap flow measured at the base of the stem and canopy transpiration due to the capacitive exchange between the transpiration stream and stem water storage. Significant errors will be introduced in canopy conductance (gc) and canopy transpiration estimation if the time lag is neglected. In this study, a cross-correlation analysis was used to quantify the time lag, and the sap flowbased transpiration was measured to pararneterize Jarvistype models of gc and thus to simulate Ec of Populus cathayana using the Penman-Monteith equation. The results indicate that solar radiation (Rs) and vapor pressure deficit (VPD) are not fully coincident with sap flow and have an obvious lag effect; the sap flow lags behind Rs and precedes VPD, and there is a 1-h time shift between Eo and sap flow in the 30-min interval data set. A parameterized Jarvis-type gc model is suitable to predict P. cathayana transpiration and explains more than 80% of the variation observed in go, and the relative error was less than 25%, which shows a preferable simulation effect. The root mean square error (RMSEs) between the predicted and measured Ec were 1.91×10^-3 (with the time lag) and 3.12×10^-3cm h^-1 (without the time lag). More importantly, Ec simulation precision that incorporates time lag is improved by 6% compared to the results without the time lag, with the mean relative error (MRE) of only 8.32% and the mean absolute error (MAE) of 1.48 × 10^-3 cm h^-1. 展开更多
关键词 Canopy transpiration Model - Populuscathayana Qinghai-Tibetan Plateau Sap flow time lags
下载PDF
Real-time crash prediction on freeways using data mining and emerging techniques 被引量:4
4
作者 Jinming You Junhua Wang Jingqiu Guo 《Journal of Modern Transportation》 2017年第2期116-123,共8页
Recent advances in intelligent transportation system allow traffic safety studies to extend from historic data-based analyses to real-time applications. The study presents a new method to predict crash likelihood with... Recent advances in intelligent transportation system allow traffic safety studies to extend from historic data-based analyses to real-time applications. The study presents a new method to predict crash likelihood with traffic data collected by discrete loop detectors as well as the web-crawl weather data. Matched case-control method and support vector machines (SVMs) technique were employed to identify the risk status. The adaptive synthetic over-sampling technique was applied to solve the imbalanced dataset issues. Random forest technique was applied to select the contributing factors and avoid the over-fitting issues. The results indicate that the SVMs classifier could successfully classify 76.32% of the crashes on the test dataset and 87.52% of the crashes on the overall dataset, which were relatively satisfactory compared with the results of the previous studies. Compared with the SVMs classifier without the data, the SVMs classifier with the web-crawl weather data increased the crash prediction accuracy by 1.32% and decreased the false alarm rate by 1.72%, showing the potential value of the massive web weather data. Mean impact value method was employed to evaluate the variable effects, and the results are identical with the results of most of previous studies. The emerging technique based on the discrete traffic data and web weather data proves to be more applicable on real- time safety management on freeways. 展开更多
关键词 Crash prediction detectors Web-crawl data Real time - Discrete loop Support vector machines
下载PDF
A Numerical Algorithm Based on Quadratic Finite Element for Two-Dimensional Nonlinear Time Fractional Thermal Diffusion Model 被引量:3
5
作者 Yanlong Zhang Baoli Yin +2 位作者 Yue Cao Yang Liu Hong Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第3期1081-1098,共18页
In this article,a high-order scheme,which is formulated by combining the quadratic finite element method in space with a second-order time discrete scheme,is developed for looking for the numerical solution of a two-d... In this article,a high-order scheme,which is formulated by combining the quadratic finite element method in space with a second-order time discrete scheme,is developed for looking for the numerical solution of a two-dimensional nonlinear time fractional thermal diffusion model.The time Caputo fractional derivative is approximated by using the L2-1formula,the first-order derivative and nonlinear term are discretized by some second-order approximation formulas,and the quadratic finite element is used to approximate the spatial direction.The error accuracy O(h3+t2)is obtained,which is verified by the numerical results. 展开更多
关键词 Quadratic finite element two-dimensional nonlinear time fractional thermal diffusion model L2-1formula.
下载PDF
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
6
作者 Dognery Sinaly Silue Wanggen Wan Muhammad Rizwan 《Open Journal of Applied Sciences》 2016年第13期893-902,共10页
With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has b... With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has become the important challenge, but network information security has become a top priority. In the field of authentication, dynamic password technology has gained users’ trust and favor because of its safety and ease of operation. Dynamic password, SHA (Secure Hash Algorithm) is widely used globally and acts as information security mechanism against potential threat. The cryptographic algorithm is an open research area, and development of these state-owned technology products helps secure encryption product and provides safeguard against threats. Dynamic password authentication technology is based on time synchronization, using the state-owned password algorithm. SM3 hash algorithm can meet the security needs of a variety of cryptographic applications for commercial cryptographic applications and verification of digital signatures, generation and verification of message authentication code. Dynamic password basically generates an unpredictable random numbers based on a combination of specialized algorithms. Each password can only be used once, and help provide high safety. Therefore, the dynamic password technology for network information security issues is of great significance. In our proposed algorithm, dynamic password is generated by SM3 Hash Algorithm using current time and the identity ID and it varies with time and changes randomly. Coupled with the SM3 hash algorithm security, dynamic password security properties can be further improved, thus it effectively improves network authentication security. 展开更多
关键词 Dynamic password Authentication SM3 Hash Algorithm Network Authentication Security One time password
下载PDF
Suppressive Influence of Time- Space White Noise on the Explosion of Solutions of Stochastic Fokker- Planck Delay Differential Equations
7
作者 Augustine O. Atonuje Jonathan Tsetimi 《Journal of Mathematics and System Science》 2016年第7期284-290,共7页
It is generally known that the solutions of deterministic and stochastic differential equations (SDEs) usually grow linearly at such a rate that they may become unbounded after a small lapse of time and may eventual... It is generally known that the solutions of deterministic and stochastic differential equations (SDEs) usually grow linearly at such a rate that they may become unbounded after a small lapse of time and may eventually blow up or explode in finite time. If the drift and diffusion functions are globally Lipschitz, linear growth may still be experienced, as well as a possible blow-up of solutions in finite time. In this paper, a nonlinear scalar delay differential equation with a constant time lag is perturbed by a multiplicative Ito-type time - space white noise to form a stochastic Fokker-Planck delay differential equation. It is established that no explosion is possible in the presence of any intrinsically slow time - space white noise of Ito - type as manifested in the resulting stochastic Fokker- Planck delay differential equation. Time - space white noise has a role to play since the solution of the classical nonlinear equation without it still exhibits explosion. 展开更多
关键词 Explosion non-linear stochastic Fokker Planck delay differential equation time - space white noise finite time.
下载PDF
CP-ABE与数字信封融合技术的云存储安全模型设计与实现 被引量:3
8
作者 张小红 涂平生 《计算机应用与软件》 CSCD 2016年第9期313-319,共7页
为了高效地实现云端数据的存储和传输安全,提出一种结合数字信封技术的改进的密文策略的属性加密机制(CPABE)云存储安全模型。该模型在不影响云服务性能的前提下保护用户的敏感数据,在数据未上传至云端前对数据进行本地加密;加密密钥通... 为了高效地实现云端数据的存储和传输安全,提出一种结合数字信封技术的改进的密文策略的属性加密机制(CPABE)云存储安全模型。该模型在不影响云服务性能的前提下保护用户的敏感数据,在数据未上传至云端前对数据进行本地加密;加密密钥通过CP-ABE机制以保证密钥不会被非法用户获取,并通过数字信封技术确保数据在传输过程中的完整性和保密性。新模型还结合动态口令(OTP)对用户进行登录校验,从而有效阻止非授权用户对数据的访问。仿真实验表明,改进的模型能够安全有效地保护用户的机密数据,阻止恶意用户对云服务器的非法访问。通过和现有云存储安全方案进行时间性能对比,改进的CP-ABE方案加密效率和安全性能有较大幅度提高。 展开更多
关键词 云存储安全 属性加密机制 数字信封 动态口令
下载PDF
人5-羟色胺2c受体基因实时荧光定量PCR方法的建立 被引量:1
9
作者 刀筱芳 何进宇 +5 位作者 伍学英 龚玉来 高利民 徐亚欧 李宁 袁忠 《四川医学》 CAS 2008年第5期503-505,共3页
目的建立5-羟色胺2c受体(5-HTR2c)基因mRNA表达水平的TaqMan real—time PcR检测方法。方法以β-actin为内参基因,根据GenBank中人5-HTR2c及β-actin基因序列,分别设计了2套特异性引物和TaqMan探针,接着对反应的退火温度、引物浓... 目的建立5-羟色胺2c受体(5-HTR2c)基因mRNA表达水平的TaqMan real—time PcR检测方法。方法以β-actin为内参基因,根据GenBank中人5-HTR2c及β-actin基因序列,分别设计了2套特异性引物和TaqMan探针,接着对反应的退火温度、引物浓度、探针浓度、Mg^2+浓度进行优化,然后以优化的条件建立相对定量标准曲线,并对该方法的稳定性进行了分析。结果5-HTR2c及β-actin基因的real—time PCR扩增效率分别为99.9%和100.0%;相对定量标准曲线的CT值线性范围分别为12.2~35.1和11.5~31.5,相关系数分别为0.999及1.000;批内及批问变异系数(8.0%。结论本研究所建立的针对5-HTR2c mRNA表达水平的Taqman real-time PCR检测方法具有扩增效率高、稳定性好等特点,为进一步探索5-HTR2c的功能及其mRNA表达水平的变化和各种疾病发生、发展的相关性提供了有用的方法学基础。 展开更多
关键词 5-羟色胺2c受体 TAQMAN探针 real—time PCR
下载PDF
MALDI-TOF-MS法对重组人内皮抑素蛋白分子质量测定
10
作者 季怡萍 夏敏 王群 《分析测试学报》 CAS CSCD 北大核心 2004年第z1期3-4,共2页
  肿瘤的生长依赖于血管的生成,新生血管不仅为肿瘤生长提供必需的营养物质,而且为肿瘤细胞扩散提供了重要的途径[1].1997年哈佛大学的O'Reilly等[2]发现了一种内源性新血管生成抑制因子内皮抑素(Endostatin),显示出特异抑制激活...   肿瘤的生长依赖于血管的生成,新生血管不仅为肿瘤生长提供必需的营养物质,而且为肿瘤细胞扩散提供了重要的途径[1].1997年哈佛大学的O'Reilly等[2]发现了一种内源性新血管生成抑制因子内皮抑素(Endostatin),显示出特异抑制激活的血管内皮细胞增殖和肿瘤新血管生成的生物学活性,其抗肿瘤作用具有高效、低毒、无耐药性的优点.…… 展开更多
关键词 Matrix assisted laser desorption ionization time - of - flight mass spectrometry (MALDI - TOF - MS) Recombinant human endostatin protein
下载PDF
一种基于Diffie-Hellman密钥交换协议的OTP方案 被引量:1
11
作者 方俊 《计算机时代》 2009年第11期24-26,共3页
分析了常见的几种一次性口令身份认证方案,提出了一种基于Diffie-Hellman密钥交换协议OTP方案。该方案不仅能够有效地保护用户的身份信息,而且安全性好,执行效率高,能提供通信双方的相互认证,能防止假冒攻击、中间人攻击、重放攻击等多... 分析了常见的几种一次性口令身份认证方案,提出了一种基于Diffie-Hellman密钥交换协议OTP方案。该方案不仅能够有效地保护用户的身份信息,而且安全性好,执行效率高,能提供通信双方的相互认证,能防止假冒攻击、中间人攻击、重放攻击等多种攻击方式。最后对该方案的安全性进行了剖析。 展开更多
关键词 身份认证 一次性口令 HASH函数 DIFFIE-HELLMAN
下载PDF
小麦醇溶-谷蛋白盒结合因子基因表达特性的研究 被引量:2
12
作者 牛静勇 陈占宽 贺浩华 《麦类作物学报》 CAS CSCD 北大核心 2009年第6期941-946,共6页
为了给小麦品质改良的基因工程研究提供参考依据,以小麦醇溶-谷蛋白盒结合因子(Wheat Prola-min-Box Binding Factor,WPBF)基因为研究对象,从定性和定量两个方面,利用RT-PCR与Real Time PCR系统地研究了WPBF基因在小麦不同组织器官中以... 为了给小麦品质改良的基因工程研究提供参考依据,以小麦醇溶-谷蛋白盒结合因子(Wheat Prola-min-Box Binding Factor,WPBF)基因为研究对象,从定性和定量两个方面,利用RT-PCR与Real Time PCR系统地研究了WPBF基因在小麦不同组织器官中以及在小麦胚乳整个发育过程中表达的时空特异性。结果表明,WPBF基因的表达是胚乳特异性的,表达跨胚乳的整个发育过程,在其表达的高峰阶段,表达强度为参照基因β-Actin的43%。 展开更多
关键词 小麦 醇溶-谷蛋白盒结合因子 RT-PCR REAL time PCR
下载PDF
基于Diffie-Hellman的一次性口令认证方案 被引量:1
13
作者 唐文武 方勇 潘春兰 《微电子学与计算机》 CSCD 北大核心 2008年第10期182-184,188,共4页
针对目前一次性口令的不足,借鉴质询/响应方案的思想设计了一种基于Diffie-Hellman的一次性口令认证方案.与传统方案相比,该方案不仅能够提供通信双方的相互认证,而且能够抵抗重放攻击、离线口令猜测攻击和假冒攻击,极大地增强了应用系... 针对目前一次性口令的不足,借鉴质询/响应方案的思想设计了一种基于Diffie-Hellman的一次性口令认证方案.与传统方案相比,该方案不仅能够提供通信双方的相互认证,而且能够抵抗重放攻击、离线口令猜测攻击和假冒攻击,极大地增强了应用系统的安全性. 展开更多
关键词 OTP(一次性口令) DIFFIE-HELLMAN Hash运算 质询/响应
下载PDF
Stratigraphical Time——Correlation and Mass Extinction Event Near Permian——Triassic Boundary in South China 被引量:2
14
作者 Xu GuirongChina University of Geosciences , Wuhan 430074 《Journal of Earth Science》 SCIE CAS CSCD 1991年第1期39-49,共11页
Shaw's method used to correlate 40 sections across the Permo-Triassic boundary in South China is applied in the paper. Two steps are adopted to get an Integral Composite Section (ICS) by synthesizing these data : ... Shaw's method used to correlate 40 sections across the Permo-Triassic boundary in South China is applied in the paper. Two steps are adopted to get an Integral Composite Section (ICS) by synthesizing these data : First , South China is divided into five areas and composite section developed for each area . Then the second step . the Changxing composite section is regarded as a composite standard (CSRS) while the ICS is produced by matching the CSRS with composite sections of the other areas. Three biozones in the Changxingian and two biozones in the Griesbachian can be discerned on the basis of computing Z values in the ICS. These biozones are marked by the Z values which quantitatively represent their time ranges ; therefore , they may increase accuracy of stratigraphic time correlation . The mass extinction at the end of the Permian is an abrupt event that is supported by the relative rate of extinction near the P/T boundary . About 90% of invertebrate species died out by the end of the Permian . The duration of the mass extinction is rather short ,approximately 0.018Ma . 展开更多
关键词 South China the Permian - Triassic boundary stratigraphic time - correlation biostratigraphic events biologic events mass extinction .
下载PDF
Characterizing long-term forest disturbance history and its drivers in the Ning-Zhen Mountains, Jiangsu Province of eastern China using yearly Landsat observations (1987–2011) 被引量:2
15
作者 Mingshi Li Chengquan Huang +4 位作者 Wenjuan Shen Xinyu Ren Yingying Lv Jingrui Wang Zhiliang Zhu 《Journal of Forestry Research》 SCIE CAS CSCD 2016年第6期1329-1341,共13页
Forest losses or gains have long been recognized as critical processes modulating the carbon flux between the biosphere and the atmosphere. Timely, accurate and spatially explicit information on forest disturbance and... Forest losses or gains have long been recognized as critical processes modulating the carbon flux between the biosphere and the atmosphere. Timely, accurate and spatially explicit information on forest disturbance and recovery history is required for assessing the effectiveness of existing forest management. The major objectives of our research focused on testing the mapping efficacy of the vegetation change tracker (VCT) model over a forested area in China. We used a new version of VCT algorithm built upon the Landsat time series stacks (LTSS). The LTSS consisted of yearly image acquisitions to map forest disturbance history from 1987 to 2011 over the Ning-Zhen Mountains, Jiangsu Province of east China. The LTSS consisted of TM and ETM+ scenes with different projec- tions due to distinct data sources (Beijing remote sensing ground station and the USGS EROS Center). The valida- tion results of the disturbance year maps showed that most spatial agreement measures ranged from 70 to 86 %, comparable with the VCT accuracies reported for many places in USA. Very low accuracies were identified in 1995 (38.3 %) and 1992 (56.2 %) in the current analysis. These resulted from the insensitivity of the VCT algorithm to detect low intensity disturbances and also from the mis- registration errors of the image pairs. Major forest distur- bance types existing in our study area were identified as agricultural expansion (39.8 %), urbanization (24.9 %), forest management practice (19.3 %), and mining (12.8 %). In general, there was a gradual decreasing trend in forest cover throughout this region, caused principally by China's economic, demographic, environmental and political policies and decisions, as well as some weather events. While VCT has largely been used to assess long term changes and trends in the USA, it has great potential for assessing landscape level change elsewhere throughout the world. 展开更多
关键词 Landsat time series stack LEDAPS - Forest disturbance VCT model
下载PDF
2-(2-Benzofuranyl)-2-imidazoline treatment within 5 hours after cerebral ischemia/reperfusion protects the brain 被引量:1
16
作者 Zheng Zhang Jin-Long Yang +7 位作者 Lin-Lei Zhang Zhen-Zhen Chen Jia-Ou Chen Yun-Gang Cao Man Qu Xin-Da Lin Xun-Ming Ji Zhao Han 《Neural Regeneration Research》 SCIE CAS CSCD 2018年第12期2111-2118,共8页
We previously demonstrated that administering 2-(2-benzofuranyl)-2-imidazolin(2-BFI), an imidazoline I2 receptor agonist, immediately after ischemia onset can protect the brain from ischemic insult. However, immed... We previously demonstrated that administering 2-(2-benzofuranyl)-2-imidazolin(2-BFI), an imidazoline I2 receptor agonist, immediately after ischemia onset can protect the brain from ischemic insult. However, immediate administration after stroke is difficult to realize in the clinic. Thus, the therapeutic time window of 2-BFI should be determined. Sprague-Dawley rats provided by Wenzhou Medical University in China received right middle cerebral artery occlusion for 120 minutes, and were treated with 2-BFI(3 mg/kg) through the caudal vein at 0, 1, 3, 5, 7, and 9 hours after reperfusion. Neurological function was assessed using the Longa's method. Infarct volume was measured by 2,3,5-triphenyltetrazolium chloride assay. Morphological changes in the cortical penumbra were observed by hematoxylin-eosin staining under transmission electron microscopy. The apoptosis levels in the ipsilateral cortex were examined with terminal deoxynucleotidyl transferase-mediated dUTP nick end-labeling(TUNEL) assay. The protein expression of Bcl-2 and BAX was detected using immunohistochemistry. We found the following: Treatment with 2-BFI within 5 hours after reperfusion obviously improved neurological function. Administering 2-BFI within 9 hours after ischemia/reperfusion decreased infarct volume and alleviated apoptosis. 2-BFI administration at different time points after reperfusion alleviated the pathological damage of the ischemic penumbra and reduced the number of apoptotic neurons, but the protective effect was more obvious when administered within 5 hours. Administration of 2-BFI within 5 hours after reperfusion remarkably increased Bcl-2 expression and decreased BAX expression. To conclude, 2-BFI shows potent neuroprotective effects when administered within 5 hours after reperfusion, seemingly by up-regulating Bcl-2 and down-regulating BAX expression. The time window provided clinical potential for ischemic stroke by 2-BFI. 展开更多
关键词 nerve regeneration ISCHEMIA/REPERFUSION 2-(2-benzofuranyl)-2-imidazoline neuroprotection time window apoptosis Bcl-2 BAX neural regeneration
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
17
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
下载PDF
Authentication Key-Exchange Using SMS for Web-Based Platforms
18
作者 Benedicto B. Balilo Jr. Jayvee Christopher N. Vibar 《Journal of Computer and Communications》 2021年第8期1-12,共12页
One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The codes may originate from different entropy attributes and schemes, such as true random and digita... One of the advantages of One Time Password (OTP) is that it’s free from brute force, replay, and shoulder attacks. The codes may originate from different entropy attributes and schemes, such as true random and digital random number generators. Businesses, organizations, and academic institutions have adopted OTP methods for credit card transaction confirmation, recalling forgotten passwords, and validating web portal accounts. This paper proposed a new method in authenticating login credentials using a 3 × 3 matrix and random system key as Two-Factor Authentication (2FA) with an SMS-enabled feature. We used the 6-codes pseudorandom method and a 4-codes validation to allow mobile flexibility and ensure that the user has the required access. The page link and evaluation form are sent to students, IT professionals, and researchers. The results showed respondents are satisfied in terms of functionality, usability, efficiency, and reliability. The developed system could safeguard information, disallow unauthorized access, and impose acceptable data protection measures and minimal system requirements to use the system. 展开更多
关键词 One time password Two-Factor Authentication (2FA) CRYPTOGRAPHY ISO9126
下载PDF
Decentralized Stabilization of Large-scale Uncertain Systems with State-Delays——LMIs Approach
19
作者 程储旺 张美芬 汤兵勇 《Journal of China Textile University(English Edition)》 EI CAS 1999年第4期60-65,共6页
This paper deals with the problem of decentralized robustcontrol for a class of interconnected uncertain systemswith state delays.The parameter uncertainties are un-known but norm-bounded.A new sufficient condition is... This paper deals with the problem of decentralized robustcontrol for a class of interconnected uncertain systemswith state delays.The parameter uncertainties are un-known but norm-bounded.A new sufficient condition isobtained for each subsystem and overall system to be sta-bilizable via linear memoryless state feedback robust de-centralized controllers.The results depend on the size of the delays and are given in terms of linear matrix ine-qualities,so they are less conservative than those of delay-independent.Moreover,matching condition is not a necessary condition.Finally,an example is presented to illustrative the effectiveness of the proposed method. 展开更多
关键词 Decentralized CONTROL robust CONTROL time de-lay uncertain dynamic SYSTEMS large - scale SYSTEMS
下载PDF
Non-stationary Buffeting Response Analysis of Long Span Suspension Bridge Under Strong Wind Loading
20
作者 Wenfeng Huang Kongqing Zou 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2016年第6期9-16,共8页
The non-stationary buffeting response of long span suspension bridge in time domain under strong wind loading is computed. Modeling method for generating non-stationary fluctuating winds with probabilistic model for n... The non-stationary buffeting response of long span suspension bridge in time domain under strong wind loading is computed. Modeling method for generating non-stationary fluctuating winds with probabilistic model for non-stationary strong wind fields is first presented. Non-stationary wind forces induced by strong winds on bridge deck and tower are then given a brief introduction. Finally,Non-stationary buffeting response of Pulite Bridge in China,a long span suspension bridge,is computed by using ANSYS software under four working conditions with different combination of time-varying mean wind and time-varying variance. The case study further confirms that it is necessity of considering non-stationary buffeting response for long span suspension bridge under strong wind loading,rather than only stationary buffeting response. 展开更多
关键词 NON-STATIONARY long span suspension bridge strong wind loading time domain analysisCLC number: TU311.3 Document code: A Article ID: 1005-9113(2016)06-0009-08
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部