Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certai...Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certain by-products, and identify cheaper replacements for expensive conventional PRB materials, especially pure metallic iron. The feasibility of reductive denitrification of nitrate by SIF was studied by batch experiments. Operational parameters such as pH value, SIF dosage and initial concentration of nitrate were investigated. The removal efficiency of nitrate reached 80% under the conditions of pH of 2.5, nitrate initial con- centration of 45 mg/L and SIF dosage of 100 g/L within 4 h. Results indicated that nitrate removal is inversely related to pH. Low pH value condition favors for the nitrate transformation. Different from the results of others who studied nitrate reduction using iron powder, we found that there was a lag time before nitrate reduction occurs, even at low pH. Finally, the possible mechanism of nitrate reduction by Fe0 is discussed.展开更多
An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measur...An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.展开更多
According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the num...According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.展开更多
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.展开更多
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a...Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.展开更多
To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approac...To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue.展开更多
This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied ...This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied a gap-free model using molecular dynamics. Physical quantities such as volume and pressure of the Na-O and Li-O systems exhibit similar behaviors around the thermodynamic ensembles NPT and NVE. However, for the Na2O system, at a minimum temperature value, we observe a range of total energy values;in contrast, for the Li2O system, a minimum energy corresponds to a range of temperatures. Finally, for physicochemical properties, we studied the diffusion coefficient and activation energy of lithium and potassium oxides around their melting temperatures. The order of magnitude of the diffusion coefficients is given by the relation Dli-O >DNa-O for the multiplicity 8*8*8, while for the activation energy, the order is well reversed EaNa-O > EaLi-O.展开更多
Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and reg...Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and regions applied for patents and trademarks in China in 2019.Japan.展开更多
This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch ...This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch studies were conducted in abiotic and biotic reactors containing fresh and aged SIF under different dissolved oxygen concentrations with NO_(3)^(-)−N and/or PO_(4)^(3−)influent(s)and their nitrate/phosphate removal and by-product formations were studied.Batch reactors were seeded with a homogenized mixed microbial inoculum procured from natural sludges which were enriched over 6 months under denitrifying conditions in the presence of SIF.Results indicated that when influent containing 40 mg/L of NO_(3)^(-)−N was treated with 5 g SIF,79.9%nitrate reduction was observed in 8 days abiotically and 100%removal was accomplished in 20 days when the reactor was seeded.Both abiotic and seeded reactors removed more than 92%PO_(4)^(3−)under high DO conditions in 12 days.Abiotic and biochemical removal of NO_(3)^(-)−N and abiotic removal of PO_(4)^(3−)were higher under independent NO_(3)^(-)−N/PO_(4)^(3−)loading,while 99%PO_(4)^(3−)was removed biochemically under combined NO_(3)^(-)−N and PO_(4)^(3−)loading.This study furthers the understandings of nitrate and phosphate removal in Zero Valent Iron(ZVI)assisted mixed microbial systems to encourage the application of SIF-supported bio-chemical processes in the simultaneous removals of these pollutants.展开更多
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ...Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.展开更多
Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regiona...Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regional stratigraphic unconformities are mainly developed in the Sichuan Basin,from the bottom up which are between pre-Sinian and Sinian,between Sinian and Cambrian,between pre-Permian and Permian,between middle and upper Permian,between middle and upper Triassic,and between Triassic and Jurassic.Especially,16 of 21l conventional(and tight)gas fields discovered are believed to have formed in relation to regional unconformities.Second,regional unconformity mainly controls hydrocarbon accumulation from five aspects:(1)The porosity and permeability of reservoirs under the unconformity are improved through weathering crust karstification to form large-scale karst reservoirs;(2)Good source-reservoir-caprock assemblage can form near the unconformity,which provides a basis for forming large gas field;(3)Regional unconformity may lead to stratigraphic pinch-out and rugged ancient landform,giving rise to a large area of stratigraphic and lithologic trap groups;(4)Regional unconformity provides a dominant channel for lateral migration of oil and gas;and(5)Regional unconformity is conducive to large-scale accumulation of oil and gas.Third,the areas related to regional unconformities are the exploration focus of large gas fields in the Sichuan Basin.The pre-Sinian is found with source rocks,reservoir rocks and other favorable conditions for the formation of large gas fields,and presents a large exploration potential.Thus,it is expected to be an important strategic replacement.展开更多
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ...File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems.展开更多
In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and ...In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc.展开更多
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun...Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.展开更多
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it...Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes.展开更多
基金Project (No. 20407015) supported by the National Natural Sci-ence Foundation of China
文摘Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certain by-products, and identify cheaper replacements for expensive conventional PRB materials, especially pure metallic iron. The feasibility of reductive denitrification of nitrate by SIF was studied by batch experiments. Operational parameters such as pH value, SIF dosage and initial concentration of nitrate were investigated. The removal efficiency of nitrate reached 80% under the conditions of pH of 2.5, nitrate initial con- centration of 45 mg/L and SIF dosage of 100 g/L within 4 h. Results indicated that nitrate removal is inversely related to pH. Low pH value condition favors for the nitrate transformation. Different from the results of others who studied nitrate reduction using iron powder, we found that there was a lag time before nitrate reduction occurs, even at low pH. Finally, the possible mechanism of nitrate reduction by Fe0 is discussed.
文摘An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.
文摘According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.
基金Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
文摘Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
基金This research work was funded by Institutional Fund Projects under Grant No.(IFPIP:211-611-1443).
文摘Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.
基金The National Natural Science Foundation of China(22276153,51974262)funded this work。
文摘To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue.
文摘This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied a gap-free model using molecular dynamics. Physical quantities such as volume and pressure of the Na-O and Li-O systems exhibit similar behaviors around the thermodynamic ensembles NPT and NVE. However, for the Na2O system, at a minimum temperature value, we observe a range of total energy values;in contrast, for the Li2O system, a minimum energy corresponds to a range of temperatures. Finally, for physicochemical properties, we studied the diffusion coefficient and activation energy of lithium and potassium oxides around their melting temperatures. The order of magnitude of the diffusion coefficients is given by the relation Dli-O >DNa-O for the multiplicity 8*8*8, while for the activation energy, the order is well reversed EaNa-O > EaLi-O.
文摘Japan,the United States and Germany topped the list of the most patent filings in China in 2019,according to the China’s National Intellectual Property Administration(CNIPA).Market entities from 186 countries and regions applied for patents and trademarks in China in 2019.Japan.
基金We are grateful for the project grants supported by the Major Science and Technology Programs for Water Pollution Control and Management of China(Nos.2012ZX07205-001 and 2017ZX7103-007).
文摘This study focuses on identifying the factors under which mixed microbial seeds assist bio-chemical denitrification when Scrap Iron Filings(SIF)are used as electron donors and adsorbents in low C/N ratio waters.Batch studies were conducted in abiotic and biotic reactors containing fresh and aged SIF under different dissolved oxygen concentrations with NO_(3)^(-)−N and/or PO_(4)^(3−)influent(s)and their nitrate/phosphate removal and by-product formations were studied.Batch reactors were seeded with a homogenized mixed microbial inoculum procured from natural sludges which were enriched over 6 months under denitrifying conditions in the presence of SIF.Results indicated that when influent containing 40 mg/L of NO_(3)^(-)−N was treated with 5 g SIF,79.9%nitrate reduction was observed in 8 days abiotically and 100%removal was accomplished in 20 days when the reactor was seeded.Both abiotic and seeded reactors removed more than 92%PO_(4)^(3−)under high DO conditions in 12 days.Abiotic and biochemical removal of NO_(3)^(-)−N and abiotic removal of PO_(4)^(3−)were higher under independent NO_(3)^(-)−N/PO_(4)^(3−)loading,while 99%PO_(4)^(3−)was removed biochemically under combined NO_(3)^(-)−N and PO_(4)^(3−)loading.This study furthers the understandings of nitrate and phosphate removal in Zero Valent Iron(ZVI)assisted mixed microbial systems to encourage the application of SIF-supported bio-chemical processes in the simultaneous removals of these pollutants.
基金National Natural Science Foundation of China(62173066)Open Project of Sichuan Provincial Key Laboratory of Intelligent Terminal Co-built by Province and City(SCITLAB-1014)。
文摘Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.
基金Supported by the National Natural Science Foundation Project of China(U22B6002)Prospective Basic Technology Research Project of PetroChina(2021DJ0605).
文摘Based on outcrop,seismic and drilling data,the main regional unconformities in the Sichuan Basin and their controls on hydrocarbon accumulation were systematically studied.Three findings are obtained.First,six regional stratigraphic unconformities are mainly developed in the Sichuan Basin,from the bottom up which are between pre-Sinian and Sinian,between Sinian and Cambrian,between pre-Permian and Permian,between middle and upper Permian,between middle and upper Triassic,and between Triassic and Jurassic.Especially,16 of 21l conventional(and tight)gas fields discovered are believed to have formed in relation to regional unconformities.Second,regional unconformity mainly controls hydrocarbon accumulation from five aspects:(1)The porosity and permeability of reservoirs under the unconformity are improved through weathering crust karstification to form large-scale karst reservoirs;(2)Good source-reservoir-caprock assemblage can form near the unconformity,which provides a basis for forming large gas field;(3)Regional unconformity may lead to stratigraphic pinch-out and rugged ancient landform,giving rise to a large area of stratigraphic and lithologic trap groups;(4)Regional unconformity provides a dominant channel for lateral migration of oil and gas;and(5)Regional unconformity is conducive to large-scale accumulation of oil and gas.Third,the areas related to regional unconformities are the exploration focus of large gas fields in the Sichuan Basin.The pre-Sinian is found with source rocks,reservoir rocks and other favorable conditions for the formation of large gas fields,and presents a large exploration potential.Thus,it is expected to be an important strategic replacement.
文摘File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems.
基金This research was supported by the Universiti Sains Malaysia(USM)and the ministry of Higher Education Malaysia through Fundamental Research Grant Scheme(FRGS-Grant No:FRGS/1/2020/TK0/USM/02/1).
文摘In the Big Data era,numerous sources and environments generate massive amounts of data.This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes.Hadoop is used to process this kind of data.It is known to handle vast volumes of data more efficiently than tiny amounts,which results in inefficiency in the framework.This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm(EBFM)that merges files depending on predefined parameters(type and size).Implementing this algorithm will ensure that the maximum amount of the block size and the generated file size will be in the same range.Its primary goal is to dynamically merge files with the stated criteria based on the file type to guarantee the efficacy and efficiency of the established system.This procedure takes place before the files are available for the Hadoop framework.Additionally,the files generated by the system are named with specific keywords to ensure there is no data loss(file overwrite).The proposed approach guarantees the generation of the fewest possible large files,which reduces the input/output memory burden and corresponds to the Hadoop framework’s effectiveness.The findings show that the proposed technique enhances the framework’s performance by approximately 64%while comparing all other potential performance-impairing variables.The proposed approach is implementable in any environment that uses the Hadoop framework,not limited to smart cities,real-time data analysis,etc.
基金supported in part by Ministry of Science and Technology(MOST),Taiwan under the Grant MOST 109-2221-E-029-017-MY2.
文摘Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users.
基金supported by the National Natural Science Foundation of China (62072325)Shanxi Scholarship Council of China (HGKY2019081)+1 种基金Fundamental Research Program of Shanxi Province (202103021224272)TYUST SRIF (20212039).
文摘Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes.