1 Science and technology for environmental protection in China The guiding principles in formulating the ten-year Programme of science and tech-nology for environmental protection are as follows: 1.1 Science and techn...1 Science and technology for environmental protection in China The guiding principles in formulating the ten-year Programme of science and tech-nology for environmental protection are as follows: 1.1 Science and technology should be great to the need economic construction and economic construction must rely on science and technology.展开更多
The characteristics of low pressure plasma produced by a gas discharges lie in thatthe energy of the electrons are much higher than that of the heavy particles in the system. Inthis paperl the low-pressure plasma trea...The characteristics of low pressure plasma produced by a gas discharges lie in thatthe energy of the electrons are much higher than that of the heavy particles in the system. Inthis paperl the low-pressure plasma treatment technology for the environmental contaminantswas synthetically studied, and the reaction processing and mechanism between the low-pressureplasma and the environmental contaminants were theoretically analyzed. At last, the prospectsand existing problems on the application of low-pressure plasma in the field of environmentalprotection were discussed.展开更多
The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these...The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.展开更多
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication an...Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods.展开更多
Chinese steel industry has made significant progress on reducing fresh water consumption and CO_2/SO_2/COD( chemical oxygen demand) /dust emissions,and improving comprehensive utilization of solid waste. Some steel ...Chinese steel industry has made significant progress on reducing fresh water consumption and CO_2/SO_2/COD( chemical oxygen demand) /dust emissions,and improving comprehensive utilization of solid waste. Some steel companies have become topped worldwide. However,due to the large output quantity of crude steel,the whole steel industry is still a huge source of pollutants. At present,environmental protection standards are encountering challenges of lack of technical support,taxation policy and other issues. Steel industry is currently facing enormous environmental pressure. The development trends of environmental protection technologies were studied by summarizing different development stages. To realize the development targets,the industry needs to carry out its research with independent intellectual property rights,develop comprehensive management systems and establish ecological chain with other industries. This can not only raise the level of environmental protection in a broader range,but also improve the energy efficiency of iron and steel plants and increase added value of waste utilization. Finally,23 environmental protection technologies were proposed and 4 new environmental protection practices were studied.展开更多
With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhanc...With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhance system security. Based on the monitoring of foreign mapping for Dom0, a memory privacy protection scheme is designed and implemented to prevent process memory pages in DomU being mapped illegally which might result in the leakage of secret data.展开更多
文摘1 Science and technology for environmental protection in China The guiding principles in formulating the ten-year Programme of science and tech-nology for environmental protection are as follows: 1.1 Science and technology should be great to the need economic construction and economic construction must rely on science and technology.
文摘The characteristics of low pressure plasma produced by a gas discharges lie in thatthe energy of the electrons are much higher than that of the heavy particles in the system. Inthis paperl the low-pressure plasma treatment technology for the environmental contaminantswas synthetically studied, and the reaction processing and mechanism between the low-pressureplasma and the environmental contaminants were theoretically analyzed. At last, the prospectsand existing problems on the application of low-pressure plasma in the field of environmentalprotection were discussed.
基金This work was supported by Research on the Influences of Network Security Threat Intelligence on Sichuan Government and Enterprises and the Development Countermeasure(Project ID 2018ZR0220)Research on Key Technologies of Network Security Protection in Intelligent Vehicle Based on(Project ID 2018JY0510)+3 种基金the Research on Abnormal Behavior Detection Technology of Automotive CAN Bus Based on Information Entropy(Project ID 2018Z105)the Research on the Training Mechanism of Driverless Network Safety Talents for Sichuan Auto Industry Based on Industry-University Synergy(Project ID 18RKX0667),Research and implementation of traffic cooperative perception and traffic signal optimization of main road(Project ID 2018YF0500707SN)Research and implementation of intelligent traffic control and monitoring system(Project ID 2019YGG0201)Remote upgrade system of intelligent vehicle software(Project ID 2018GZDZX0011).
文摘The increasing use of the Internet with vehicles has made travel more convenient.However,hackers can attack intelligent vehicles through various technical loopholes,resulting in a range of security issues.Due to these security issues,the safety protection technology of the in-vehicle system has become a focus of research.Using the advanced autoencoder network and recurrent neural network in deep learning,we investigated the intrusion detection system based on the in-vehicle system.We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior.In order to verify the accuracy and efficiency of the proposed model,it was evaluated using real vehicle data.The experimental results show that the combination of the two technologies can effectively and accurately identify abnormal boundary behavior.The parameters of the model are self-iteratively updated using the time-based back propagation algorithm.We verified that the model proposed in this study can reach a nearly 96%accurate detection rate.
基金This work is funded in part by the Ministry of Science and Technology,Taiwan,under grant MOST 108-2221-E-011-162-MY2.
文摘Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is increasing.Hiding secure data in these transmitted data has emerged broad security issue,such as authentication and copyright protection.On the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based applications.To address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and complex.The secret data are embedded into the smooth blocks by using a simple replacement strategy.The proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)operation.The secret data are embedded into the complex blocks by using a hidden function.After the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret data.The experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods.
基金supported by National Natural Science Foundation of China(Grants No.51234003)
文摘Chinese steel industry has made significant progress on reducing fresh water consumption and CO_2/SO_2/COD( chemical oxygen demand) /dust emissions,and improving comprehensive utilization of solid waste. Some steel companies have become topped worldwide. However,due to the large output quantity of crude steel,the whole steel industry is still a huge source of pollutants. At present,environmental protection standards are encountering challenges of lack of technical support,taxation policy and other issues. Steel industry is currently facing enormous environmental pressure. The development trends of environmental protection technologies were studied by summarizing different development stages. To realize the development targets,the industry needs to carry out its research with independent intellectual property rights,develop comprehensive management systems and establish ecological chain with other industries. This can not only raise the level of environmental protection in a broader range,but also improve the energy efficiency of iron and steel plants and increase added value of waste utilization. Finally,23 environmental protection technologies were proposed and 4 new environmental protection practices were studied.
基金Supported by the National Natural Science Foundation of China(61373169)the National High Technology Research and Development Program of China(863 Program)(2015AA016004)the Foundation of Science and Technology on Information Assure Laboratory(KJ-14-110,KJ-14-101)
文摘With the popularity and commercialization of cloud computing platforms, the security of virtualization technology must be guaranteed. The paper studies the protection of memory privacy under virtual platform to enhance system security. Based on the monitoring of foreign mapping for Dom0, a memory privacy protection scheme is designed and implemented to prevent process memory pages in DomU being mapped illegally which might result in the leakage of secret data.