期刊文献+
共找到3,708篇文章
< 1 2 186 >
每页显示 20 50 100
Formation and ecological response of sand patches in the protection system of Shapotou section of the Baotou-Lanzhou railway,China
1
作者 DUN Yaoquan QU Jianjun +4 位作者 KANG Wenyan LI Minlan LIU Bin WANG Tao SHAO Mei 《Journal of Arid Land》 SCIE CSCD 2024年第2期298-313,共16页
The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses ... The development of bare patches typically signifies a process of ecosystem degradation.Within the protection system of Shapotou section of the Baotou-Lanzhou railway,the extensive emergence of bare sand patches poses a threat to both stability and sustainability.However,there is limited knowledge regarding the morphology,dynamic changes,and ecological responses associated with these sand patches.Therefore,we analyzed the formation and development process of sand patches within the protection system and its effects on herbaceous vegetation growth and soil nutrients through field observation,survey,and indoor analysis methods.The results showed that sand patch development can be divided into three stages,i.e.,formation,expansion,and stabilization,which correspond to the initial,actively developing,and semi-fixed sand patches,respectively.The average dimensions of all sand patch erosional areas were found to be 7.72 m in length,3.91 m in width,and 0.32 m in depth.The actively developing sand patches were the largest,and the initial sand patches were the smallest.Throughout the stage of formation and expansion,the herbaceous community composition changed,and the plant density decreased by more than 50.95%.Moreover,the coverage and height of herbaceous plants decreased in the erosional area and slightly increased in the depositional lobe;and the fine particles and nutrients of soils in the erosional area and depositional lobe showed a decreasing trend.In the stabilization phases of sand patches,the area from the inlet to the bottom of sand patches becomes initially covered with crusts.Vegetation and 0-2 cm surface soil condition improved in the erosional area,but this improvement was not yet evident in the depositional lobe.Factors such as disturbance,climate change,and surface resistance to erosion exert notable influences on the formation and dynamics of sand patches.The results can provide evidence for the future treatment of sand patches and the management of the protection system of Shapotou section of the Baotou-Lanzhou railway. 展开更多
关键词 railway protection system sand patch MORPHOLOGY vegetation characteristic soil property
下载PDF
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
2
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
Enhancing Identity Protection in Metaverse-Based Psychological Counseling System
3
作者 Jun Lee Hanna Lee +1 位作者 Seong Chan Lee Hyun Kwon 《Computers, Materials & Continua》 SCIE EI 2024年第1期617-632,共16页
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt... Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse. 展开更多
关键词 Metaverse counseling system face tracking identity protection
下载PDF
Antibodies elicited by Newcastle disease virus-vectored H7N9 avian influenza vaccine are functional in activating the complement system
4
作者 Zenglei Hu Ya Huang +3 位作者 Jiao Hu Xiaoquan Wang Shunlin Hu Xiufan Liu 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第6期2052-2064,共13页
H7N9 subtype avian influenza virus poses a great challenge for poultry industry.Newcastle disease virus(NDV)-vectored H7N9 avian influenza vaccines(NDV_(vec)H7N9)are effective in disease control because they are prote... H7N9 subtype avian influenza virus poses a great challenge for poultry industry.Newcastle disease virus(NDV)-vectored H7N9 avian influenza vaccines(NDV_(vec)H7N9)are effective in disease control because they are protective and allow mass administration.Of note,these vaccines elicit undetectable H7N9-specific hemagglutination-inhibition(HI)but high IgG antibodies in chickens.However,the molecular basis and protective mechanism underlying this particular antibody immunity remain unclear.Herein,immunization with an NDV_(vec)H7N9 induced low anti-H7N9 HI and virus neutralization titers but high levels of hemagglutinin(HA)-binding IgG antibodies in chickens.Three residues(S150,G151 and S152)in HA of H7N9 virus were identified as the dominant epitopes recognized by the NDV_(vec)H7N9 immune serum.Passively transferred NDV_(vec)H7N9 immune serum conferred complete protection against H7N9 virus infection in chickens.The NDV_(vec)H7N9 immune serum can mediate a potent lysis of HA-expressing and H7N9 virus-infected cells and significantly suppress H7N9 virus infectivity.These activities of the serum were significantly impaired after heat-inactivation or treatment with complement inhibitor,suggesting the engagement of the complement system.Moreover,mutations in the 150-SGS-152 sites in HA resulted in significant reductions in cell lysis and virus neutralization mediated by the NDV_(vec)H7N9 immune serum,indicating the requirement of antibody-antigen binding for complement activity.Therefore,antibodies induced by the NDV_(vec)H7N9 can activate antibody-dependent complement-mediated lysis of H7N9 virus-infected cells and complement-mediated neutralization of H7N9 virus.Our findings unveiled a novel role of the complement in protection conferred by the NDV_(vec)H7N9,highlighting a potential benefit of engaging the complement system in H7N9 vaccine design. 展开更多
关键词 H7N9 subtype avian influenza virus NDV vector vaccine antibody immunity COMPLEMENT protection
下载PDF
Research on the longitudinal protection of a through-type cophase traction direct power supply system based on the empirical wavelet transform
5
作者 Lu Li Zeduan Zhang +5 位作者 Wang Cai Qikang Zhuang Guihong Bi Jian Deng Shilong Chen Xiaorui Kan 《Global Energy Interconnection》 EI CSCD 2024年第2期206-216,共11页
This paper proposes a longitudinal protection scheme utilizing empirical wavelet transform(EWT)for a through-type cophase traction direct power supply system,where both sides of a traction network line exhibit a disti... This paper proposes a longitudinal protection scheme utilizing empirical wavelet transform(EWT)for a through-type cophase traction direct power supply system,where both sides of a traction network line exhibit a distinctive boundary structure.This approach capitalizes on the boundary’s capacity to attenuate the high-frequency component of fault signals,resulting in a variation in the high-frequency transient energy ratio when faults occur inside or outside the line.During internal line faults,the high-frequency transient energy at the checkpoints located at both ends surpasses that of its neighboring lines.Conversely,for faults external to the line,the energy is lower compared to adjacent lines.EWT is employed to decompose the collected fault current signals,allowing access to the high-frequency transient energy.The longitudinal protection for the traction network line is established based on disparities between both ends of the traction network line and the high-frequency transient energy on either side of the boundary.Moreover,simulation verification through experimental results demonstrates the effectiveness of the proposed protection scheme across various initial fault angles,distances to faults,and fault transition resistances. 展开更多
关键词 Through-type Cophase traction direct power supply system Traction network Empirical wavelet transform(EWT) Longitudinal protection
下载PDF
Comprehensive Overview and Analytical Study on Automatic Bird Repellent Laser System for Crop Protection
6
作者 Sireesha Abotula Srinivas Gorla +1 位作者 Prasad Reddy PVGD Mohankrishna S 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第1期38-53,共16页
Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This... Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This study presents a comprehensive overview of current bird repellant approaches used in agricultural contexts,as well as potential new ways. The bird repellent techniques include Internet of Things technology,Deep Learning,Convolutional Neural Network,Unmanned Aerial Vehicles,Wireless Sensor Networks and Laser biotechnology. This study’s goal is to find and review about previous approach towards repellent of birds in the crop fields using various technologies. 展开更多
关键词 Bird repellent crop protection IoT UAV Deep Learning
下载PDF
Effects of Inoculation with Phosphate Solubilizing Bacteria on the Physiology,Biochemistry,and Expression of Genes Related to the Protective Enzyme System of Fritillaria taipaiensis P.Y.Li
7
作者 Zhifen Shi Fumei Pan +6 位作者 Xiaotian Kong Jiaqi Lang Mingyan Ye Qian Wu Guangzhi Wang Liang Han Nong Zhou 《Phyton-International Journal of Experimental Botany》 SCIE 2024年第2期247-260,共14页
Fritillaria taipaiensis P.Y.Li is a widely used medicinal herb in treating pulmonary diseases.In recent years,its wild resources have become scarce,and the demand for efficient artificial cultivation has significantly... Fritillaria taipaiensis P.Y.Li is a widely used medicinal herb in treating pulmonary diseases.In recent years,its wild resources have become scarce,and the demand for efficient artificial cultivation has significantly increased.This article is the first to apply phosphate solubilizing bacteria isolated from the rhizosphere soil of F.taipaiensis P.Y.Li to the cultivation process of F.taipaiensis P.Y.Li.The aim is to identify suitable reference strains for the artificial cultivation and industrial development of F.taipaiensis P.Y.Li by examining the effects of various phosphate solubilizing bacteria and their combinations on photosynthesis,physiological and biochemical properties,and gene expression related to the protective enzyme system in F.taipaiensis P.Y.Li.The experiment,conducted in pots at room temperature,included a control group(CK)and groups inoculated with inorganic phosphorussolubilizing bacteria:W1(Bacillus cereus),W2(Serratia plymuthica),W12(Bacillus cereus and Serratia plymuthica),and groups inoculated with organophosphorus-solubilizing bacteria:Y1(Bacillus cereus),Y2(Bacillus cereus),Y12(Bacillus cereus and Bacillus cereus),totaling seven groups.Compared to CK,most growth indices in the bacterial addition groups showed significant differences,with W12 achieving the highest values in all indices except the leaf area index.The content of photosynthetic pigments,photosynthetic parameters,and osmoregulatory substances increased variably in each bacterial treatment group.W12 exhibited the highest content of chlorophyll a and soluble protein,while W1 had the highest free proline content.The activities of peroxidase(POD),superoxide dismutase(SOD),and catalase(CAT)in all inoculated groups were higher than in CK,with significant changes in SOD and CAT activities.The malondialdehyde(MDA)content in all inoculated groups was lower than in CK,with Y12 being the lowest,at approximately 30%of CK.Gene expression corresponding to these three enzymes also increased variably,with POD expression in Y2 being the highest at 2.73 times that of CK.SOD and CAT expression in Y12 were the highest,at 1.84 and 4.39 times that of CK,respectively.These results indicate that inoculating phosphate solubilizing bacteria can enhance the growth of F.taipaiensis P.Y.Li,with the mixed inoculation groups W12 and Y12 demonstrating superior effects.This lays a theoretical foundation for selecting bacterial fertilizers in the cultivation process of F.taipaiensis P.Y.Li. 展开更多
关键词 Fritillaria taipaiensis P.Y.Li phosphate solubiliozing bacteria photosynthesis physiology and biochemistry protective enzymes
下载PDF
An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship 被引量:1
8
作者 K.Meenakshi K.Sashi Rekha 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期111-128,共18页
Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve ... Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve confidentiality all thefiles contained cannot be changed.Blockchain technology is the fundamental software behind digital currencies like Bitcoin,which is common in the marketplace.Cloud computing is a method of using a network of external machines to store,monitor,and process information,rather than using the local computer or a local personal computer.The software is currently facing multiple problems including lack of data protection,data instability,and reliability.This paper aims to give the highest security for multiple user environments in cloud for storing and accessing the data in blocks.The users who are legitimate are only allowed for storing and accessing the data as like a secured block chain approach.As like the Blockchain which does not require a centralized system for transactions,the proposed system is also independent on centralized network interface.The decentralized system is developed in such a way to avoid counterfeiting.The system enables the fabricator to spend less or null resources to perform the validations for its direct operated stores.This ensures the product fabricator to avoid the circulation of its duplicate products.The customer as an end-user is also ensured to have only the genuine products from the fabricator.The Fabricator(F),Merchant(M)and consumer(C)forms an interconnected triangular structure without allowing any counterfeiting agents in their secured cloud chain.The pro-posed approach provides the stability in the security system of the cloud using the chaining mechanism within different blocks at each node.It takes roughly 4.7,6.2,and 7.5 ms,respectively,to register each node in the proposed system for 5,10,and 15 nodes.The overall registration time for each scenario is 11.9,26.2,and 53.1 ms,despite the fact that each node’s registration time was greatest for 10 nodes.By looking at the data,it’s clear that the number of nodes is a func-tion of time. 展开更多
关键词 Blockchain bitcoin CUSTOMER MERCHANT data protection digital currencies TRANSACTION
下载PDF
The personal protective equipment(PPE)based on individual combat:A systematic review and trend analysis 被引量:1
9
作者 Qian-ran Hu Xing-yu Shen +2 位作者 Xin-ming Qian Guang-yan Huang Meng-qi Yuan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期195-221,共27页
With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce ... With the development of ordnance technology,the survival and safety of individual combatants in hightech warfare are under serious threat,and the Personal Protective Equipment(PPE),as an important guarantee to reduce casualties and maintain military combat effectiveness,is widely developed.This paper systematically reviewed various PPE based on individual combat through literature research and comprehensive discussion,and introduced in detail the latest application progress of PPE in terms of material and technology from three aspects:individual integrated protection system,traditional protection equipment,and intelligent protection equipment,respectively,and discussed in depth the functional improvement and optimization status brought by advanced technology for PPE,focusing on the achievements of individual equipment technology application.Finally,the problems and technical bottlenecks in the development of PPE were analyzed and summarized,and the development trend of PPE were pointed out.The results of the review will provide a forward-looking reference for the current development of individual PPE,and are important guidance for the design and technological innovation of advanced equipment based on the future technological battlefield. 展开更多
关键词 Personal protective equipment(PPE) Individual combat Material and structure Equipment application Intelligent devices Wearable technology
下载PDF
ESTABLISHMENT OF TAI PIN DI COMPREHENSIVE PROTECTING FOREST SYSTEM
10
作者 Liu Tao Qu Zhiyi The Forestry Institute of Chifeng City, Inner Mongolia 《干旱区资源与环境》 CSCD 1993年第Z1期321-322,共2页
A multi-function protecting forest system was planed and arranged elaborately for im-provement of the local ecological conditions and high economical benefit. The system in-cludes level farmland shelter belt network, ... A multi-function protecting forest system was planed and arranged elaborately for im-provement of the local ecological conditions and high economical benefit. The system in-cludes level farmland shelter belt network, hillside farmland shelter belt network, stereoscop-ic sparse-wood pasture, erosion control fuel forest, fast growing commercial forest, eco-nomical forest, salt-soda controlling project and salt-soda protecting forest on salt-sodaland, ect.. 展开更多
关键词 Integrated Protected FOREST system UNITED PLAN Elaborate Arrangement
下载PDF
Dynamic analysis of buried pipeline with and without barrier system subjected to underground detonation
11
作者 Chaidul Haque Chaudhuri Deepankar Choudhury 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第11期95-105,共11页
Failure of pipe networks due to blast loads resulting from terrorist attacks or construction facilities, may cause economic loss, environmental pollution, source of firing or even it may lead to a disaster. The presen... Failure of pipe networks due to blast loads resulting from terrorist attacks or construction facilities, may cause economic loss, environmental pollution, source of firing or even it may lead to a disaster. The present work develops a closed-form solution of buried pipe with barrier system subjected to subsurface detonation. The solution is derived based on the concept of double-beam system. Euler Bernoulli's beams are used to simulate the buried pipe and the barrier system. Soil is idealized as viscoelastic foundation along with shear interaction between discrete Winkler springs(advanced soil model). The finite SineFourier transform is employed to solve the coupled partial differential equations. The solution is validated with past studies. A parametric study is conducted to investigate the influence of TNT charge weight, pipe material, damping ratio and TNT offset on the response of buried pipe with and without barrier system. Further a statistical analysis is carried out to get the significant soil and pipe input parameters. It is perceived that peak pipe displacements for both the cases(with and without barrier) are increases with increasing the weight of TNT charge and decreases with increasing the damping ratio and TNT offset. The deformation of pipe also varies with pipe material. Pipe safety against blast loads can be ensured by providing suitable barrier layer. The present study can be utilized in preliminary design stage as an alternative to expensive numerical analysis or field study. 展开更多
关键词 Buried pipeline Subsurface detonation Analytical solution Viscoelastic foundation Protective barrier
下载PDF
100 kA/10kV thyristor stack design for the quench protection system in CRAFT
12
作者 仝玮 徐猛 +2 位作者 李华 陈波 宋执权 《Plasma Science and Technology》 SCIE EI CAS CSCD 2023年第5期193-206,共14页
Thyristors have longer lifetimes,higher reliability,and very high voltage and current ratings and they require less maintenance than other high-power semiconductor devices.As a result,they are particularly suitable fo... Thyristors have longer lifetimes,higher reliability,and very high voltage and current ratings and they require less maintenance than other high-power semiconductor devices.As a result,they are particularly suitable for quench protection systems(QPSs),which protect the superconducting magnets in large fusion devices from damage.In this paper,we propose a design for a 100 k A/10 k V thyristor stack supported by both theoretical and simulation-based analyses as well as experimental verification.Due to the ultrahigh electrical performance requirements imposed on the QPS by the Comprehensive Research Facility for Fusion Technology(CRAFT),three main issues must be considered:the voltage-balancing problem caused by multiple thyristors in a series structure,the increased junction temperature problem caused by extremely high currents,and the reverse recovery phenomenon that arises from the thyristor’s physical structure.Hence,a series of detailed theoretical analyses,simulations,and experiments,including a thyristor junction temperature prediction method and reverse recovery process modeling,were carried out to optimize the design.Finally,the reliability and stability of the thyristor stack were verified by a series of prototype experiments.The results confirmed the correctness and accuracy of the proposed thyristor stack design method and also indicated that the proposed thyristor stack can meet the application conditions of a 100 k A QPS in the CRAFT project. 展开更多
关键词 superconducting magnet THYRISTOR pulsed power supply quench protection system
下载PDF
Improvement of Legislation System of Protecting Women’s Rights and Interests in China——Taking the Amendment of the Law on the Protection of Women’s Rights and Interests as an Opportunity
13
作者 曹薇薇 CHEN Feng(Translated) 《The Journal of Human Rights》 2022年第3期553-580,共28页
The Law on the Protection of Women’s Rights and interests has been amended twice since it was promulgated 1992,and it has formed a relatively complete legislation system together with relevant laws and regulations,ac... The Law on the Protection of Women’s Rights and interests has been amended twice since it was promulgated 1992,and it has formed a relatively complete legislation system together with relevant laws and regulations,accumulating experience of judicial application in practice.In the current proposed amendment of the Law on the Protection of Women’s Rights and interests,the main issues that should be considered are:First,the legislative purpose of this law should be reviewed to clarify the three legislative positions of the Law on Women’s Rights and interests,in terms of protection,practice and foundation.Second,it is necessary to grasp whether the text content is appropriate and rectify any defects in the existing text.Third,it should explore how to reform and implement specific systems from the micro perspective to improve the specific systems of women’s personal,property,and social rights and interests.Fourth,it should strengthen the systematic interaction with other norms at different levels and implement the principle of gender equality stipulated in the Constitution of the People’s Republic of China.Fifth,attention should be paid to the necessity of invoking the Law in judicial practice,the possibility of operation and the effectiveness of enforcement.The proposed amendment of the Law on the Protection of Women’s Rights and interests should also sum up the experience of local legislation and judicial decisions and improve the quality of judicial application of the law so that is truly responds to the practical needs and challenges of the protection of women’s rights and interests and the implementation of gender equality in the new era. 展开更多
关键词 protecting women’s rights and interests Law on the Protection of Women’s Rights and Interests legislation system amendment of the law
下载PDF
PIMS:An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context
14
作者 Miaomiao Yang Guosheng Huang +3 位作者 Junwei Liu Yanshuang Gui Qixu Wang Xingshu Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1879-1898,共20页
With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,mal... With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,malware attacks such as Doki and Symbiote threaten the container runtime’s security.Malware initiates various types of runtime anomalies based on process form(e.g.,modifying the process of a container,and opening the external ports).Fortunately,dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime.Nevertheless,the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.As a result,the existing dynamicmonitoringmechanismis still not practical enough.To ensure the trustworthiness of the baseline value data and,simultaneously,to achieve the integrity verification of the monitored process,we combine blockchain and trusted computing to propose a process integrity monitoring system named IPMS.Firstly,the hardware TPM 2.0 module is applied to construct a trusted security foundation for the integrity of the process code segment due to its tamper-proof feature.Then,design a new format for storing measurement logs,easily distinguishing files with the same name in different containers from log information.Meanwhile,the baseline value data is stored on the blockchain to avoidmalicious damage.Finally,trusted computing technology is used to perform fine-grained integrity measurement and remote attestation of processes in a container,detect abnormal containers in time and control them.We have implemented a prototype system and performed extensive simulation experiments to test and analyze the functionality and performance of the PIMS.Experimental results show that PIMS can accurately and efficiently detect tampered processes with only 3.57% performance loss to the container. 展开更多
关键词 Blockchain-based protection dynamic monitoring remote attestation integrity verification
下载PDF
An Intelligent Approach for Intrusion Detection in Industrial Control System
15
作者 Adel Alkhalil Abdulaziz Aljaloud +5 位作者 Diaa Uliyan Mohammed Altameemi Magdy Abdelrhman Yaser Altameemi Aakash Ahmad Romany Fouad Mansour 《Computers, Materials & Continua》 SCIE EI 2023年第11期2049-2078,共30页
Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographi... Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographically distributed control elements,and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions.In recent years,there has been a lot of focus on the security of industrial control systems.Due to the advancement in information technologies,the risk of cyberattacks on industrial control system has been drastically increased.Because they are so inextricably tied to human life,any damage to them might have devastating consequences.To provide an efficient solution to such problems,this paper proposes a new approach to intrusion detection.First,the important features in the dataset are determined by the difference between the distribution of unlabeled and positive data which is deployed for the learning process.Then,a prior estimation of the class is proposed based on a support vector machine.Simulation results show that the proposed approach has better anomaly detection performance than existing algorithms. 展开更多
关键词 Industrial control system anomaly detection intrusion detection system protection
下载PDF
Optimization of Anti-Collapse Drilling Fluid Systems with High Potassium Content
16
作者 Yu Xia Jian Guan +2 位作者 Yong Gao Shanfa Tang Jialuo Rong 《Fluid Dynamics & Materials Processing》 EI 2023年第6期1609-1622,共14页
The ash mudstone in some oil formations is highly water-sensitive.The oil formation is fractured,and the risk of well leakage and collapse is not negligible.This study presents a countermeasure for well collapse preve... The ash mudstone in some oil formations is highly water-sensitive.The oil formation is fractured,and the risk of well leakage and collapse is not negligible.This study presents a countermeasure for well collapse prevention,based on a“force-chemistry synergistic balance”approach and the utilization of environmentally friendly and efficient hydration inhibitors.The relevance of this approach is demonstrated considering a drilling fluid system with the high potassium content.The analysis shows that the system can maintain good rheological properties,filtration loss and suspension stability even after aging at 130℃ for 16 h.The primary roll recovery of rock chips is better than 98%.The secondary rolling recovery rate is 89%.The rapid water loss is close to zero.The effects of carrying rock,sand,hydration inhibition and dispersion of drill chips are all noticeable. 展开更多
关键词 Mudstone hydration force-chemistry synergistic balance environmental protection high potassium content potent inhibition anti-collapse drilling fluid
下载PDF
Adversarial Examples Protect Your Privacy on Speech Enhancement System
17
作者 Mingyu Dong Diqun Yan Rangding Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1-12,共12页
Speech is easily leaked imperceptibly.When people use their phones,the personal voice assistant is constantly listening and waiting to be activated.Private content in speech may be maliciously extracted through automa... Speech is easily leaked imperceptibly.When people use their phones,the personal voice assistant is constantly listening and waiting to be activated.Private content in speech may be maliciously extracted through automatic speech recognition(ASR)technology by some applications on phone devices.To guarantee that the recognized speech content is accurate,speech enhancement technology is used to denoise the input speech.Speech enhancement technology has developed rapidly along with deep neural networks(DNNs),but adversarial examples can cause DNNs to fail.Considering that the vulnerability of DNN can be used to protect the privacy in speech.In this work,we propose an adversarial method to degrade speech enhancement systems,which can prevent the malicious extraction of private information in speech.Experimental results show that the generated enhanced adversarial examples can be removed most content of the target speech or replaced with target speech content by speech enhancement.The word error rate(WER)between the enhanced original example and enhanced adversarial example recognition result can reach 89.0%.WER of target attack between enhanced adversarial example and target example is low at 33.75%.The adversarial perturbation in the adversarial example can bring much more change than itself.The rate of difference between two enhanced examples and adversarial perturbation can reach more than 1.4430.Meanwhile,the transferability between different speech enhancement models is also investigated.The low transferability of the method can be used to ensure the content in the adversarial example is not damaged,the useful information can be extracted by the friendly ASR.This work can prevent the malicious extraction of speech. 展开更多
关键词 Adversarial example speech enhancement privacy protection deep neural network
下载PDF
A Double-Ended Protection Principle for an LCC-VSC-MTDC System with Strong Anti-Interference Ability
18
作者 ChuanjianWu Dahai Zhang Jinghan He 《Energy Engineering》 EI 2023年第2期299-316,共18页
The DC grid technology of multi-power supply and multi-drop-point power reception is an effective solution for large-scale renewable energy integration into the power grid.Line-commutated converter-Voltage source conv... The DC grid technology of multi-power supply and multi-drop-point power reception is an effective solution for large-scale renewable energy integration into the power grid.Line-commutated converter-Voltage source converter(LCC-VSC)power grids are one of the more important developmental directions of the future power grid that have occured in recent years.But the multi-terminal high voltage direct current system has the problems of inconsistent boundary characteristics,inconsistent control,and fault response characteristics,which puts higher requirements on the protection scheme.Thus,a completely new protection principle is proposed in this paper.Firstly,the fault characteristics of distributed capacitance current are analyzed.The reactive power calculated by the distribution parameters of different frequencies is different.Subsequently,the fault characteristics of DC reactive power are analyzed,and a DC reactive power extraction algorithm is proposed.The polarity of the multi-band DC reactive power is used to construct the protection scheme.Finally,the LCC-VSC power grid model verifies the correctness and superiority of the proposed protection scheme.The proposed scheme uses DC reactive power instead of fault current to solve the long delay problem caused by distributed capacitance.Compared with the prior art,the proposed solution is not affected by distributed capacitance and has a stronger anti-interference ability(600Ω+10 dB+1 ms). 展开更多
关键词 Hybrid DC transmission double-ended protection S transform Hilbert transform
下载PDF
HIL testing of wheel slide protection systems:criteria for continuous updating and validation
19
作者 L.Pugi G.Paolieri +4 位作者 M.Giorgetti L.Berzi R.Viviani L.Cabrucci L.Bocciolini 《Railway Engineering Science》 2023年第2期108-121,共14页
Assessment of railway wheel slide protection(WSP) systems involves the execution of complex experimental activities that are quite expensive and time-consuming, since they involve the physical reproduction of degraded... Assessment of railway wheel slide protection(WSP) systems involves the execution of complex experimental activities that are quite expensive and time-consuming, since they involve the physical reproduction of degraded adhesion conditions on a real railway line. WSP is devoted to regulating applied braking forces to avoid excessive wheel sliding in case of degraded adhesion conditions between wheel and rail. WSP must be also compliant to safety specifications related to assured braking performances and consumed air. Hardware in the loop(HIL) testing offers an affordable and sustainable way to accelerate these activities optimizing cost, duration and safety of experimental activities performed online. HIL test rigs are subjected to continuous updates, customization and natural ageing of their components. This work investigates the criteria that can be adopted to assure a continuous monitoring and validation of a real WSP test rig, the Italian test rig of Firenze Osmannoro. 展开更多
关键词 Hardware in the loop(HIL) Wheel slide protection(WSP) Degraded adhesion conditions Train brake
下载PDF
Analysis of the Distribution of Tulipa fosteriana and Tulipa ingens. The Importance of Protecting Wild Plants, in Particular Tulips All over the World
20
作者 Shukrullozoda Roza Shukrullo Qizi Dekhkonov Davron Burxonovich +3 位作者 Khaydarov Khislat Kudratovich Umurzakova Zebuniso Iskandarovna Olimjonova Sadoqat Gùlomjon Qizi Norimova Guljakhon Komiljon Qizi 《American Journal of Plant Sciences》 CAS 2023年第5期613-624,共12页
The assessment of the distribution and importance of the protection of tulip varieties around the world and separately rare, wild-growing ancestors of cultivated tulips, in particular Tulipa fosteriana and Tulipa inge... The assessment of the distribution and importance of the protection of tulip varieties around the world and separately rare, wild-growing ancestors of cultivated tulips, in particular Tulipa fosteriana and Tulipa ingens on the globe, including Central Asia, Uzbekistan and the Samarkand region, was described. A distribution map was introduced to visualize the data. Information about the morphological description of the studied species was also given. 展开更多
关键词 Distribution Area Threat of Extinction Protection SUBPOPULATION “Hot Spot”
下载PDF
上一页 1 2 186 下一页 到第
使用帮助 返回顶部