Plants have sophisticated defense systems to fend off insect herbivores. How plants defend against herbivores in dicotyledonous plants, such as Arabidopsis and tobacco, have been relatively well studied, yet little is...Plants have sophisticated defense systems to fend off insect herbivores. How plants defend against herbivores in dicotyledonous plants, such as Arabidopsis and tobacco, have been relatively well studied, yet little is known about the defense responses in monocotyledons. Here, we review the current un- derstanding of rice (Oryza sativa) and maize (Zea rnays) defense against insects. In rice and maize, elicitors derived from insect herbivore oral secretions or oviposition fluids activate phytohormone signaling, and transcriptomic changes mediated mainly by transcription factors lead to accumulation of defense-related secondary metabolites. Direct defenses, such as trypsin protein inhibitors in rice and benzoxazinoids in maize, have anti-digestive or toxic effects on insect herbivores. Herbivory-induced plant volatiles, such as terpenes, are indirect defenses, which attract the natural enemies of herbivores. R gene-mediated defenses against herbivores are also discussed.展开更多
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,...Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.展开更多
Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of...Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based (the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differential power analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, an improvement for resisting fault attack is proposed, which can reduce extra computation time.展开更多
The braking behavior of drivers when a pedestrian comes out from the sidewalk to the road was analyzed using a driving simulator. Based on drivers' braking behavior, the braking control timing of the system for avoid...The braking behavior of drivers when a pedestrian comes out from the sidewalk to the road was analyzed using a driving simulator. Based on drivers' braking behavior, the braking control timing of the system for avoiding the collision with pedestrians was proposed. In this study, the subject drivers started braking at almost the same time in terms of TTC (Time to Collision), regardless of the velocity of a subject vehicle and crossing velocity of pedestrians. This experimental result showed that brake timing of the system which can minimize the interference for braking between drivers and the system is 1.3 s of TTC. Next, the drivers' braking behavior was investigated when the system controlled braking to avoid collision at this timing. As a result, drivers did not show any change of braking behavior with no excessive interference between braking control by the system and braking operation by drivers for avoiding collisions with pedestrians which is equivalent to the excessive dependence on the system.展开更多
The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which in...The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.展开更多
Embedded operating system EOS (Embedded Operating System) is widely used system software which in the past is mainly used in fields of industrial control and defense system. EOS is responsible for the entire softwar...Embedded operating system EOS (Embedded Operating System) is widely used system software which in the past is mainly used in fields of industrial control and defense system. EOS is responsible for the entire software and hardware resource allocation, scheduling work and coordinating concurrent control activities; some more successful applied EOS products have been presently launched. With the development of lnternet technology, information appliances and the universal application of miniaturization and specialization of EOS, EOS started from a single weak situation to a higher professional direction with strong functions.展开更多
This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air ...This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air doors in a complex mine air sub network, and the computer program for solving the switching function of complex networks are offered. It gives the method for discriminating a reversible branch in a complex network by means of the switching function, and the method of counter inverted logical control of airflow inversion by means of open and short circuit conversion of key branches. The research has solved the problem of the stablization of air flow for normal ventination and reversing ventination in a diagonal network.展开更多
Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of inciden...Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC (Nuclear Regulatory Commission) since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (near field communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based equipment qualification management) system works with the support of legacy systems such as PMS (procurement management system) and FMS (facility management system).展开更多
This paper aimed at incorporating the precautionary principles into the planning and development of GSM (global system for mobile communications) masts within the built-up areas of Jimeta. Using GIS (geographic inf...This paper aimed at incorporating the precautionary principles into the planning and development of GSM (global system for mobile communications) masts within the built-up areas of Jimeta. Using GIS (geographic information system) analysis technique, the zone of precautionary principle was defined to 500 meters radius as the zone within which precautionary measures are exercised. The criteria for siting GSM base station are also equally identified. For instance, the presence of certain elements within the precautionary zone like schools, hospitals, residential density and overlap of RF (radio frequency) occurrences, may disqualify any mast location. Analysis of the land use within precautionary zone has shown various proportions of exposure to RF, whereas, only 3.39% of the masts are suitably located and 94.92% are not and therefore should be relocated. The study recommend measures for addressing physical development within precautionary areas, including land conversion and mast sharing to reduce potential harmful effects of RF emanating from GSM base stations.展开更多
基金supported by the National Natural Science Foundation of China(Nos.31772179,U1502263,31600213,31470369,and 31770301)
文摘Plants have sophisticated defense systems to fend off insect herbivores. How plants defend against herbivores in dicotyledonous plants, such as Arabidopsis and tobacco, have been relatively well studied, yet little is known about the defense responses in monocotyledons. Here, we review the current un- derstanding of rice (Oryza sativa) and maize (Zea rnays) defense against insects. In rice and maize, elicitors derived from insect herbivore oral secretions or oviposition fluids activate phytohormone signaling, and transcriptomic changes mediated mainly by transcription factors lead to accumulation of defense-related secondary metabolites. Direct defenses, such as trypsin protein inhibitors in rice and benzoxazinoids in maize, have anti-digestive or toxic effects on insect herbivores. Herbivory-induced plant volatiles, such as terpenes, are indirect defenses, which attract the natural enemies of herbivores. R gene-mediated defenses against herbivores are also discussed.
基金The authors would like to thank the anonymous reviewers for their insightful corrnlents that have helped improve the presentation of this paper. The work was supported partially by the National Natural Science Foundation of China under Grants No. 61070192, No.91018008, No. 61170240 the National High-Tech Research Development Program of China under Grant No. 2007AA01ZA14 the Natural Science Foundation of Beijing un- der Grant No. 4122041.
文摘Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%.
基金Project supported by the National Natural Science Foundation of China (Grant No.60573031)the Foundation of the National Laboratory for Modern Communications (Grant No.51436060205JW0305)
文摘Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based (the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differential power analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, an improvement for resisting fault attack is proposed, which can reduce extra computation time.
文摘The braking behavior of drivers when a pedestrian comes out from the sidewalk to the road was analyzed using a driving simulator. Based on drivers' braking behavior, the braking control timing of the system for avoiding the collision with pedestrians was proposed. In this study, the subject drivers started braking at almost the same time in terms of TTC (Time to Collision), regardless of the velocity of a subject vehicle and crossing velocity of pedestrians. This experimental result showed that brake timing of the system which can minimize the interference for braking between drivers and the system is 1.3 s of TTC. Next, the drivers' braking behavior was investigated when the system controlled braking to avoid collision at this timing. As a result, drivers did not show any change of braking behavior with no excessive interference between braking control by the system and braking operation by drivers for avoiding collisions with pedestrians which is equivalent to the excessive dependence on the system.
文摘The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.
文摘Embedded operating system EOS (Embedded Operating System) is widely used system software which in the past is mainly used in fields of industrial control and defense system. EOS is responsible for the entire software and hardware resource allocation, scheduling work and coordinating concurrent control activities; some more successful applied EOS products have been presently launched. With the development of lnternet technology, information appliances and the universal application of miniaturization and specialization of EOS, EOS started from a single weak situation to a higher professional direction with strong functions.
文摘This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air doors in a complex mine air sub network, and the computer program for solving the switching function of complex networks are offered. It gives the method for discriminating a reversible branch in a complex network by means of the switching function, and the method of counter inverted logical control of airflow inversion by means of open and short circuit conversion of key branches. The research has solved the problem of the stablization of air flow for normal ventination and reversing ventination in a diagonal network.
文摘Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC (Nuclear Regulatory Commission) since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (near field communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based equipment qualification management) system works with the support of legacy systems such as PMS (procurement management system) and FMS (facility management system).
文摘This paper aimed at incorporating the precautionary principles into the planning and development of GSM (global system for mobile communications) masts within the built-up areas of Jimeta. Using GIS (geographic information system) analysis technique, the zone of precautionary principle was defined to 500 meters radius as the zone within which precautionary measures are exercised. The criteria for siting GSM base station are also equally identified. For instance, the presence of certain elements within the precautionary zone like schools, hospitals, residential density and overlap of RF (radio frequency) occurrences, may disqualify any mast location. Analysis of the land use within precautionary zone has shown various proportions of exposure to RF, whereas, only 3.39% of the masts are suitably located and 94.92% are not and therefore should be relocated. The study recommend measures for addressing physical development within precautionary areas, including land conversion and mast sharing to reduce potential harmful effects of RF emanating from GSM base stations.