Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types ...Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.展开更多
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of...Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.展开更多
In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital ec...In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.展开更多
Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We ...Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultura...expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultural phrases,展开更多
文摘Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.
基金Supported by the National Natural Science Foundation of China under Grant No 61572529
文摘Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.
文摘In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.
文摘Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
文摘expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultural phrases,