This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric an...The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles.展开更多
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic...This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.展开更多
With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grai...With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security.展开更多
In this technical paper, the oxidation mechanism and kinetics of aluminum powders are discussed in great details. The potential applications of spherical aluminum powders after oxidation to be part of the surging arre...In this technical paper, the oxidation mechanism and kinetics of aluminum powders are discussed in great details. The potential applications of spherical aluminum powders after oxidation to be part of the surging arresting materials are discussed. Theoretical calculations of oxidation of spherical aluminum powders in a typical gas fluidization bed are demonstrated. Computer software written by the author is used to carry out the basic calculations of important parameters of a gas fluidization bed at different temperatures. A mathematical model of the dynamic system in a gas fluidization bed is developed and the analytical solution is obtained. The mathematical model can be used to estimate aluminum oxide thickness at a defined temperature. The mathematical model created in this study is evaluated and confirmed consistently with the experimental results on a gas fluidization bed. Detail technical discussion of the oxidation mechanism of aluminum is carried out. The mathematical deviations of the mathematical modeling have demonstrated in great details. This mathematical model developed in this study and validated with experimental results can bring a great value for the quantitative analysis of a gas fluidization bed in general from a theoretical point of view. It can be applied for the oxidation not only for aluminum spherical powders, but also for other spherical metal powders. The mathematical model developed can further enhance the applications of gas fluidization technology. In addition to the development of mathematical modeling of a gas fluidization bed reactor, the formation of oxide film through diffusion on both planar and spherical aluminum surfaces is analyzed through a thorough mathematical deviation using diffusion theory and Laplace transformation. The dominant defects and their impact to oxidation of aluminum are also discussed in detail. The well-controlled oxidation film on spherical metal powders such as aluminum and other metal spherical powders can potentially become an important part of switch devices of surge arresting materials, in general.展开更多
The presented paper is dedicated to a new ret-rospective view on the history of natural sci-ences in XX-XXI cc, partially including the sci-ence philosophy (mainly, the problems of the scientific realism, i.e. the cor...The presented paper is dedicated to a new ret-rospective view on the history of natural sci-ences in XX-XXI cc, partially including the sci-ence philosophy (mainly, the problems of the scientific realism, i.e. the correspondence of science to reality) and also a novel scheme for different classes of sciences with different ob-jects and paradigms. There are analyzed the chosen “great” and “grand” problems of phys-ics (including the comprehension of quantum mechanics, with a recently elaborated new chapter, connected with time as a quantum obs- ervable and time analysis of quantum processes) and also of natural sciences as a whole. The particular attention is paid to the interpretation questions and slightly to the aspects, inevitably connected with the world- views of the res- earchers (which do often constitute a part of the interpretation questions).展开更多
Regulated cell death is a form of cell death that is actively controlled by biomolecules.Several studies have shown that regulated cell death plays a key role after spinal cord injury.Pyroptosis and ferroptosis are ne...Regulated cell death is a form of cell death that is actively controlled by biomolecules.Several studies have shown that regulated cell death plays a key role after spinal cord injury.Pyroptosis and ferroptosis are newly discovered types of regulated cell deaths that have been shown to exacerbate inflammation and lead to cell death in damaged spinal cords.Autophagy,a complex form of cell death that is interconnected with various regulated cell death mechanisms,has garnered significant attention in the study of spinal cord injury.This injury triggers not only cell death but also cellular survival responses.Multiple signaling pathways play pivotal roles in influencing the processes of both deterioration and repair in spinal cord injury by regulating pyroptosis,ferroptosis,and autophagy.Therefore,this review aims to comprehensively examine the mechanisms underlying regulated cell deaths,the signaling pathways that modulate these mechanisms,and the potential therapeutic targets for spinal cord injury.Our analysis suggests that targeting the common regulatory signaling pathways of different regulated cell deaths could be a promising strategy to promote cell survival and enhance the repair of spinal cord injury.Moreover,a holistic approach that incorporates multiple regulated cell deaths and their regulatory pathways presents a promising multi-target therapeutic strategy for the management of spinal cord injury.展开更多
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ...In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFI...Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system.展开更多
As the hydrocarbon generation and storage mechanisms of high quality shales of Upper Ordovician Wufeng Formation– Lower Silurian Longmaxi Formation remain unclear, based on geological conditions and experimental mode...As the hydrocarbon generation and storage mechanisms of high quality shales of Upper Ordovician Wufeng Formation– Lower Silurian Longmaxi Formation remain unclear, based on geological conditions and experimental modelling of shale gas formation, the shale gas generation and accumulation mechanisms as well as their coupling relationships of deep-water shelf shales in Wufeng–Longmaxi Formation of Sichuan Basin were analyzed from petrology, mineralogy, and geochemistry. The high quality shales of Wufeng–Longmaxi Formation in Sichuan Basin are characterized by high thermal evolution, high hydrocarbon generation intensity, good material base, and good roof and floor conditions;the high quality deep-water shelf shale not only has high biogenic silicon content and organic carbon content, but also high porosity coupling. It is concluded that:(1) The shales had good preservation conditions and high retainment of crude oil in the early times, and the shale gas was mainly from cracking of crude oil.(2) The biogenic silicon(opal A) turned into crystal quartz in early times of burial diagenesis, lots of micro-size intergranular pores were produced in the same time;moreover, the biogenic silicon frame had high resistance to compaction, thus it provided the conditions not only for oil charge in the early stage, but also for formation and preservation of nanometer cellular-like pores, and was the key factor enabling the preservation of organic pores.(3) The high quality shale of Wufeng–Longmaxi Formation had high brittleness, strong homogeneity, siliceous intergranular micro-pores and nanometer organic pores, which were conducive to the formation of complicated fissure network connecting the siliceous intergranular nano-pores, and thus high and stable production of shale gas.展开更多
The objective herein was to connect the ontogeny process of diplochromosomal, amitotic, 4n-skewed division-system, to cytogenetic deficiency lesions in satellite, repetitive DNAs, especially in the chromosomal fragile...The objective herein was to connect the ontogeny process of diplochromosomal, amitotic, 4n-skewed division-system, to cytogenetic deficiency lesions in satellite, repetitive DNAs, especially in the chromosomal fragile sites, some 100 distributed over the genome. These latter studies had shown that chemical induced replication-stress led to un-replicated lesions in these fragile sites, which from inaccurate repair processes caused genomic instability. In the chain of events of the ontogeny process to the special tetraploidy, it was proposed that primary damaged human cells could undergo replication stress from repair-process present during cell replication, a suggestion verified by X-ray damaged cells producing the unstable fragile sites (see text). The cancer-importance for therapy is recognition of cell cycle change for the 4n derivative fitness-gained, diploid progeny cells. An open question is whether RB controlling G1 to S-period is mutated at this suggested tumorigenesis initiating phase, and if so, with what consequences for therapy. The fragile site studies further showed that repair of repetitive DNAs could produce two types of genomic changes: single gene mutations and CNVs, which were here shown to be chromosomally located on “borders” to repairing satellite lesions. This genomic placement was found to correspond to mutations identified in tumor sequencing (p53, Rb, MYC), favoring a bad luck location for their cancer “mutational nature”. The CNVs in cancers, are here seen as molecular expressions of long-known cytogenetic HSRs and DMs also with demonstrated origin from amplifications of single genes. Over-expression of oncogenes was hinted of being from duplications, but Drosophila genetics demonstrated the opposite, gene inactivation. The reduced eye-size from dominant, BAR-Ultra-Bar-eye phenotypes, was caused by duplications, inactivating the genetic system for eye-size. The finding of CNVs showing “evasion” of the immune system suggests, inactivation of immune-determining genetics. Since mutated genes on borders to satellite DNAs are a fact in hematological cancers, the 4n-skewed division-system is suggested to replace debated leukemogenesis with fitness-gain from molecular mutations. For these cancers the question is how normal bone marrow cells attain genomic damage for special tetraploidy, which was referred to studies of cells moving in artificial marrow-like substrate, needing serious attention.展开更多
. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first .... Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs.展开更多
The complex morphological,anatomical,physiological,and chemical mechanisms within the aging brain have been the hot topic of research for centuries.The aging process alters the brain structure that affects functions a...The complex morphological,anatomical,physiological,and chemical mechanisms within the aging brain have been the hot topic of research for centuries.The aging process alters the brain structure that affects functions and cognitions,but the worsening of such processes contributes to the pathogenesis of neurodegenerative disorders,such as Alzheimer's disease.Beyond these observable,mild morphological shifts,significant functional modifications in neurotransmission and neuronal activity critically influence the aging brain.Understanding these changes is important for maintaining cognitive health,especially given the increasing prevalence of age-related conditions that affect cognition.This review aims to explore the age-induced changes in brain plasticity and molecular processes,differentiating normal aging from the pathogenesis of Alzheimer's disease,thereby providing insights into predicting the risk of dementia,particularly Alzheimer's disease.展开更多
An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reacti...An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reactions. It is demonstrated that the geometric information stored in the tetrahedral configuration (substrate) can be transmitted in the corresponding trigonal bipyramidal (TBP) state for nucleophilic substitution. In this article, we focus on these specific mechanistic aspects of carbon and phosphorus. We consider our study as a contribution to the significance of these (bio)chemical intermediates.展开更多
By generalizing the isotope effect for elemental superconductors (SCs) to the case of pairing in the 2-phonon exchange mechanism for composite SCs, we give here an explanation of the well-known increase in the critica...By generalizing the isotope effect for elemental superconductors (SCs) to the case of pairing in the 2-phonon exchange mechanism for composite SCs, we give here an explanation of the well-known increase in the critical temperature (Tc) of Bi2Sr2CaCu2O8 from 95 K to 110 K and of Bi2Sr2Ca2Cu3O10 from 105 to 115 - 125 K when Bi and Sr in these are replaced by Tl and Ba, respectively. On this basis, we also give the estimated Tcs of some hypothetical SCs, assuming that they may be fabricated by substitutions similar to Bi → Tl and Sr → Ba.展开更多
Coal and oil shale are two common sedimentary energy sources which are often symbiotically developed in M esozoic- Cenozoic continental fault basins. However, the mechanisms and characteristics of the symbiotic develo...Coal and oil shale are two common sedimentary energy sources which are often symbiotically developed in M esozoic- Cenozoic continental fault basins. However, the mechanisms and characteristics of the symbiotic development are not yet clearly known. In this research study, the typical continental fault basins of eastern China were chosen as examples for the purpose of conducting an examination of the coal and oil shale symbiotic assemblage types, genetic environmental differences, and transformation mechanisms, as well as the development and occurrence characteristics o f different assemblage types. Through a large number of investigations, systematic experimental testing, and sequence stratigraphy studies, the following conclusions were obtained:(1) There were five types of coal and oil shale symbiotic assemblages observed in the continental fault basins,(2) The development of coal and oil shale deposits requires a warm and humid climate, stable structure, abundant organic matter supply, a certain water depth, and a lower terrestrial source debris supply. The observed differences were that the water depth conditions were diversified in the study area, as well as the sources, types, and content of the organic matter.(3) The rapid transformations of the coal and oil shale genetic environments were mainly controlled by the tectonic settings and climatic conditions, which were determined to control the changes in the water depths, salinity,redox conditions, and lake productivity of the genetic environments. Also, in the symbiotic assemblages, genetic environment changes had induced the development of oil shale deposits, which gradually evolved into coal genetic environments.(4) In the isochronous sequence stratigraphic framework of the coal and oil shale symbiotic assemblages, the lake expansion system tracts (EST) were determined to be the most beneficial to the growth o f all the types of assemblages and were characterized by more assemblage development phases and smaller bed thicknesses. From the early to the late stages of the EST, and from the lakesides to lake centers, the thicknesses of the coal seams in the symbiotic assemblages showed trends of thinning, while the thicknesses of the oil shale deposits exhibited increasing trends. The early stages of high stand system tracts were found to be beneficial to the development of the symbiotic assemblages of coal seams overlying the oil shale. This tract type generally presented large bed thicknesses and distribution ranges. The low stand system tract and the late high stand system tract were determined to be unconducive to the development of the symbiotic assemblages.展开更多
The giant perilous rock at Wangxia (named Wangxia perilous rock) is representative in Three Gorges of the Yangtze River, China, has threatened badly the navigation of the Yangtze River channel for a long period. The g...The giant perilous rock at Wangxia (named Wangxia perilous rock) is representative in Three Gorges of the Yangtze River, China, has threatened badly the navigation of the Yangtze River channel for a long period. The giant perilous rock is composed of siliceous limestone and argillaceous limestone, and includes two elements marking by W1 and W2, respectively. The W1 is an isolated pillar while the W2 is in clintheriform. The linking segment of dominant fissure in the W2 is composed by moniliform solution funnels at its back, and the locked segment of the dominant fissure at the base of the W2 is composed by two parts. For the locked part of the dominant fissure of the W2, the upper segment shows the same lithology with the perilous rock and it can be simplified as an elastic medium, for the lower segment composed by argillaceous shale and mudstone can be simplified as a strain-softening medium. Introducing the water-softened function, the constitutive curves with two kinds of medium materials for the locked segment in the dominant fissure of the W2 have been proposed. Based on energy principle, the cusp catastrophe model for perilous rock rupture is built and formulas for the transient elastic and impulsive acceleration and the elastic-impulsive velocity of perilous rock catastrophe rupture have been established. By the calculation, the elastic-impulsive acceleration for the catastrophe rupture of the W2 is 531.4 m/s2, while the average elastic-impulsive velocity is 2.608 m/s. Further, it is deduced that the elastic-impulsive velocity at the base of the W2 is about 5.2 m/s. For the transient ruture of the W2, there is a greater speed difference between the top and the base of the W2, which impels the giant perilous rock to be retroverted sliding rupture, coinciding with the fact. Undoubtedly, studies in this paper must play an important role to analyze the catastrophe rupture mechanism of giant perilous rocks at both banks in Three Gorges of the Yangtze River, China.展开更多
Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context ...Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context of an attack graph describes the length or number of steps that the attacker has to take in achieving the goal state. However, EPL varies and it is based on the “state of vulnerabilities” [2] [3] in a given computer system. Any vulnerability throughout its life cycle passes through several stages that we identify as “states of the vulnerability life cycle” [2] [3]. In our previous studies we have developed mathematical models using Markovian theory to estimate the probability of a given vulnerability being in a particular state of its life cycle. There, we have considered a typical model of a computer network system with two computers subject to three vulnerabilities, and developed a method driven by an algorithm to estimate the EPL of this network system as a function of time. This approach is important because it allows us to monitor a computer system during the process of being exploited. Proposed non-homogeneous model in this study estimates the behavior of the EPL as a function of time and therefore act as an index of the risk associated with the network system getting exploited.展开更多
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ...In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles.
文摘This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.
基金Supported by Key and Emerging Agricultural Discipline Construction Projectof Anhui Provincial Department of Finance(13A1425)
文摘With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security.
文摘In this technical paper, the oxidation mechanism and kinetics of aluminum powders are discussed in great details. The potential applications of spherical aluminum powders after oxidation to be part of the surging arresting materials are discussed. Theoretical calculations of oxidation of spherical aluminum powders in a typical gas fluidization bed are demonstrated. Computer software written by the author is used to carry out the basic calculations of important parameters of a gas fluidization bed at different temperatures. A mathematical model of the dynamic system in a gas fluidization bed is developed and the analytical solution is obtained. The mathematical model can be used to estimate aluminum oxide thickness at a defined temperature. The mathematical model created in this study is evaluated and confirmed consistently with the experimental results on a gas fluidization bed. Detail technical discussion of the oxidation mechanism of aluminum is carried out. The mathematical deviations of the mathematical modeling have demonstrated in great details. This mathematical model developed in this study and validated with experimental results can bring a great value for the quantitative analysis of a gas fluidization bed in general from a theoretical point of view. It can be applied for the oxidation not only for aluminum spherical powders, but also for other spherical metal powders. The mathematical model developed can further enhance the applications of gas fluidization technology. In addition to the development of mathematical modeling of a gas fluidization bed reactor, the formation of oxide film through diffusion on both planar and spherical aluminum surfaces is analyzed through a thorough mathematical deviation using diffusion theory and Laplace transformation. The dominant defects and their impact to oxidation of aluminum are also discussed in detail. The well-controlled oxidation film on spherical metal powders such as aluminum and other metal spherical powders can potentially become an important part of switch devices of surge arresting materials, in general.
文摘The presented paper is dedicated to a new ret-rospective view on the history of natural sci-ences in XX-XXI cc, partially including the sci-ence philosophy (mainly, the problems of the scientific realism, i.e. the correspondence of science to reality) and also a novel scheme for different classes of sciences with different ob-jects and paradigms. There are analyzed the chosen “great” and “grand” problems of phys-ics (including the comprehension of quantum mechanics, with a recently elaborated new chapter, connected with time as a quantum obs- ervable and time analysis of quantum processes) and also of natural sciences as a whole. The particular attention is paid to the interpretation questions and slightly to the aspects, inevitably connected with the world- views of the res- earchers (which do often constitute a part of the interpretation questions).
基金supported by the Natural Science Foundation of Fujian Province,No.2021J02035(to WX).
文摘Regulated cell death is a form of cell death that is actively controlled by biomolecules.Several studies have shown that regulated cell death plays a key role after spinal cord injury.Pyroptosis and ferroptosis are newly discovered types of regulated cell deaths that have been shown to exacerbate inflammation and lead to cell death in damaged spinal cords.Autophagy,a complex form of cell death that is interconnected with various regulated cell death mechanisms,has garnered significant attention in the study of spinal cord injury.This injury triggers not only cell death but also cellular survival responses.Multiple signaling pathways play pivotal roles in influencing the processes of both deterioration and repair in spinal cord injury by regulating pyroptosis,ferroptosis,and autophagy.Therefore,this review aims to comprehensively examine the mechanisms underlying regulated cell deaths,the signaling pathways that modulate these mechanisms,and the potential therapeutic targets for spinal cord injury.Our analysis suggests that targeting the common regulatory signaling pathways of different regulated cell deaths could be a promising strategy to promote cell survival and enhance the repair of spinal cord injury.Moreover,a holistic approach that incorporates multiple regulated cell deaths and their regulatory pathways presents a promising multi-target therapeutic strategy for the management of spinal cord injury.
文摘In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
基金supported by National Basic Research Program of China(973 Program, No.2010CB327403)
文摘Collision and security issues are considered as barriers to RFID applications.In this paper,a parallelizable anti-collision based on chaotic sequence combined dynamic frame slotted aloha to build a high-efficiency RFID system is proposed.In the tags parallelizable identification,we design a Discrete Markov process to analyze the success identification rate.Then a mutual authentication security protocol merging chaotic anti-collision is presented.The theoretical analysis and simulation results show that the proposed identification scheme has less than 45.1%of the identification time slots compared with the OVSF-system when the length of the chaos sequence is 31.The success identification rate of the proposed chaotic anti-collision can achieve 63%when the number of the tag is100.We test the energy consumption of the presented authentication protocol,which can simultaneously solve the anti-collision and security of the UHF RFID system.
基金Supported by the China National Science and Technology Major Project(2017ZX05036,2017ZX05036001).
文摘As the hydrocarbon generation and storage mechanisms of high quality shales of Upper Ordovician Wufeng Formation– Lower Silurian Longmaxi Formation remain unclear, based on geological conditions and experimental modelling of shale gas formation, the shale gas generation and accumulation mechanisms as well as their coupling relationships of deep-water shelf shales in Wufeng–Longmaxi Formation of Sichuan Basin were analyzed from petrology, mineralogy, and geochemistry. The high quality shales of Wufeng–Longmaxi Formation in Sichuan Basin are characterized by high thermal evolution, high hydrocarbon generation intensity, good material base, and good roof and floor conditions;the high quality deep-water shelf shale not only has high biogenic silicon content and organic carbon content, but also high porosity coupling. It is concluded that:(1) The shales had good preservation conditions and high retainment of crude oil in the early times, and the shale gas was mainly from cracking of crude oil.(2) The biogenic silicon(opal A) turned into crystal quartz in early times of burial diagenesis, lots of micro-size intergranular pores were produced in the same time;moreover, the biogenic silicon frame had high resistance to compaction, thus it provided the conditions not only for oil charge in the early stage, but also for formation and preservation of nanometer cellular-like pores, and was the key factor enabling the preservation of organic pores.(3) The high quality shale of Wufeng–Longmaxi Formation had high brittleness, strong homogeneity, siliceous intergranular micro-pores and nanometer organic pores, which were conducive to the formation of complicated fissure network connecting the siliceous intergranular nano-pores, and thus high and stable production of shale gas.
文摘The objective herein was to connect the ontogeny process of diplochromosomal, amitotic, 4n-skewed division-system, to cytogenetic deficiency lesions in satellite, repetitive DNAs, especially in the chromosomal fragile sites, some 100 distributed over the genome. These latter studies had shown that chemical induced replication-stress led to un-replicated lesions in these fragile sites, which from inaccurate repair processes caused genomic instability. In the chain of events of the ontogeny process to the special tetraploidy, it was proposed that primary damaged human cells could undergo replication stress from repair-process present during cell replication, a suggestion verified by X-ray damaged cells producing the unstable fragile sites (see text). The cancer-importance for therapy is recognition of cell cycle change for the 4n derivative fitness-gained, diploid progeny cells. An open question is whether RB controlling G1 to S-period is mutated at this suggested tumorigenesis initiating phase, and if so, with what consequences for therapy. The fragile site studies further showed that repair of repetitive DNAs could produce two types of genomic changes: single gene mutations and CNVs, which were here shown to be chromosomally located on “borders” to repairing satellite lesions. This genomic placement was found to correspond to mutations identified in tumor sequencing (p53, Rb, MYC), favoring a bad luck location for their cancer “mutational nature”. The CNVs in cancers, are here seen as molecular expressions of long-known cytogenetic HSRs and DMs also with demonstrated origin from amplifications of single genes. Over-expression of oncogenes was hinted of being from duplications, but Drosophila genetics demonstrated the opposite, gene inactivation. The reduced eye-size from dominant, BAR-Ultra-Bar-eye phenotypes, was caused by duplications, inactivating the genetic system for eye-size. The finding of CNVs showing “evasion” of the immune system suggests, inactivation of immune-determining genetics. Since mutated genes on borders to satellite DNAs are a fact in hematological cancers, the 4n-skewed division-system is suggested to replace debated leukemogenesis with fitness-gain from molecular mutations. For these cancers the question is how normal bone marrow cells attain genomic damage for special tetraploidy, which was referred to studies of cells moving in artificial marrow-like substrate, needing serious attention.
文摘. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs.
文摘The complex morphological,anatomical,physiological,and chemical mechanisms within the aging brain have been the hot topic of research for centuries.The aging process alters the brain structure that affects functions and cognitions,but the worsening of such processes contributes to the pathogenesis of neurodegenerative disorders,such as Alzheimer's disease.Beyond these observable,mild morphological shifts,significant functional modifications in neurotransmission and neuronal activity critically influence the aging brain.Understanding these changes is important for maintaining cognitive health,especially given the increasing prevalence of age-related conditions that affect cognition.This review aims to explore the age-induced changes in brain plasticity and molecular processes,differentiating normal aging from the pathogenesis of Alzheimer's disease,thereby providing insights into predicting the risk of dementia,particularly Alzheimer's disease.
文摘An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reactions. It is demonstrated that the geometric information stored in the tetrahedral configuration (substrate) can be transmitted in the corresponding trigonal bipyramidal (TBP) state for nucleophilic substitution. In this article, we focus on these specific mechanistic aspects of carbon and phosphorus. We consider our study as a contribution to the significance of these (bio)chemical intermediates.
文摘By generalizing the isotope effect for elemental superconductors (SCs) to the case of pairing in the 2-phonon exchange mechanism for composite SCs, we give here an explanation of the well-known increase in the critical temperature (Tc) of Bi2Sr2CaCu2O8 from 95 K to 110 K and of Bi2Sr2Ca2Cu3O10 from 105 to 115 - 125 K when Bi and Sr in these are replaced by Tl and Ba, respectively. On this basis, we also give the estimated Tcs of some hypothetical SCs, assuming that they may be fabricated by substitutions similar to Bi → Tl and Sr → Ba.
基金supported by the National Key Research and Development Plan (2017YFC0601400)SDUST Research Fund (2018TDJH101)the National Natural Science Foundation of China (41402086, 272172)
文摘Coal and oil shale are two common sedimentary energy sources which are often symbiotically developed in M esozoic- Cenozoic continental fault basins. However, the mechanisms and characteristics of the symbiotic development are not yet clearly known. In this research study, the typical continental fault basins of eastern China were chosen as examples for the purpose of conducting an examination of the coal and oil shale symbiotic assemblage types, genetic environmental differences, and transformation mechanisms, as well as the development and occurrence characteristics o f different assemblage types. Through a large number of investigations, systematic experimental testing, and sequence stratigraphy studies, the following conclusions were obtained:(1) There were five types of coal and oil shale symbiotic assemblages observed in the continental fault basins,(2) The development of coal and oil shale deposits requires a warm and humid climate, stable structure, abundant organic matter supply, a certain water depth, and a lower terrestrial source debris supply. The observed differences were that the water depth conditions were diversified in the study area, as well as the sources, types, and content of the organic matter.(3) The rapid transformations of the coal and oil shale genetic environments were mainly controlled by the tectonic settings and climatic conditions, which were determined to control the changes in the water depths, salinity,redox conditions, and lake productivity of the genetic environments. Also, in the symbiotic assemblages, genetic environment changes had induced the development of oil shale deposits, which gradually evolved into coal genetic environments.(4) In the isochronous sequence stratigraphic framework of the coal and oil shale symbiotic assemblages, the lake expansion system tracts (EST) were determined to be the most beneficial to the growth o f all the types of assemblages and were characterized by more assemblage development phases and smaller bed thicknesses. From the early to the late stages of the EST, and from the lakesides to lake centers, the thicknesses of the coal seams in the symbiotic assemblages showed trends of thinning, while the thicknesses of the oil shale deposits exhibited increasing trends. The early stages of high stand system tracts were found to be beneficial to the development of the symbiotic assemblages of coal seams overlying the oil shale. This tract type generally presented large bed thicknesses and distribution ranges. The low stand system tract and the late high stand system tract were determined to be unconducive to the development of the symbiotic assemblages.
文摘The giant perilous rock at Wangxia (named Wangxia perilous rock) is representative in Three Gorges of the Yangtze River, China, has threatened badly the navigation of the Yangtze River channel for a long period. The giant perilous rock is composed of siliceous limestone and argillaceous limestone, and includes two elements marking by W1 and W2, respectively. The W1 is an isolated pillar while the W2 is in clintheriform. The linking segment of dominant fissure in the W2 is composed by moniliform solution funnels at its back, and the locked segment of the dominant fissure at the base of the W2 is composed by two parts. For the locked part of the dominant fissure of the W2, the upper segment shows the same lithology with the perilous rock and it can be simplified as an elastic medium, for the lower segment composed by argillaceous shale and mudstone can be simplified as a strain-softening medium. Introducing the water-softened function, the constitutive curves with two kinds of medium materials for the locked segment in the dominant fissure of the W2 have been proposed. Based on energy principle, the cusp catastrophe model for perilous rock rupture is built and formulas for the transient elastic and impulsive acceleration and the elastic-impulsive velocity of perilous rock catastrophe rupture have been established. By the calculation, the elastic-impulsive acceleration for the catastrophe rupture of the W2 is 531.4 m/s2, while the average elastic-impulsive velocity is 2.608 m/s. Further, it is deduced that the elastic-impulsive velocity at the base of the W2 is about 5.2 m/s. For the transient ruture of the W2, there is a greater speed difference between the top and the base of the W2, which impels the giant perilous rock to be retroverted sliding rupture, coinciding with the fact. Undoubtedly, studies in this paper must play an important role to analyze the catastrophe rupture mechanism of giant perilous rocks at both banks in Three Gorges of the Yangtze River, China.
文摘Any computer system with known vulnerabilities can be presented using attack graphs. An attacker generally has a mission to reach a goal state that he expects to achieve. Expected Path Length (EPL) [1] in the context of an attack graph describes the length or number of steps that the attacker has to take in achieving the goal state. However, EPL varies and it is based on the “state of vulnerabilities” [2] [3] in a given computer system. Any vulnerability throughout its life cycle passes through several stages that we identify as “states of the vulnerability life cycle” [2] [3]. In our previous studies we have developed mathematical models using Markovian theory to estimate the probability of a given vulnerability being in a particular state of its life cycle. There, we have considered a typical model of a computer network system with two computers subject to three vulnerabilities, and developed a method driven by an algorithm to estimate the EPL of this network system as a function of time. This approach is important because it allows us to monitor a computer system during the process of being exploited. Proposed non-homogeneous model in this study estimates the behavior of the EPL as a function of time and therefore act as an index of the risk associated with the network system getting exploited.
基金Supported by 863 Project of China (No.2006AA01Z224)
文摘In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.