This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambi...Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambiguity(IBA) increases as the directional difference between beams becomes smaller.An adaptive antenna activation based beamforming scheme was proposed to mitigate IBA.In the district near the base station(BS),all antenna elements(AEs) were activated to generate two beams.As the distance from the train to the BS increased,only the minimum number of AEs satisfying the resolution criterion would be activated.At the cell edge,one beam was switched off due to intolerable IBA.The proposed scheme can achieve SE gain to the non-adaptive scheme and show more robustness against the direction-of-arrival(DOA) estimation error.展开更多
Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastruc...Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.展开更多
Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and contr...Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and control of membrane antenna are challenging.To maintain the working performance of the antenna,the pointing and surface accuracies must be strictly maintained.Therefore,the accurate dynamic modeling and effective active control of large-scale space membrane antennas have great theoretical significance and practical value,and have attracted considerable interest in recent years.This paper reviews the dynamics and active control of large-scale space membrane antennas.First,the development and status of large-scale space membrane antennas are summarized.Subsequently,the key problems in the dynamics and active control of large membrane antennas,including the dynamics of wrinkled membranes,large-amplitude nonlinear vibration,nonlinear model reduction,rigid-flexible-thermal coupling dynamic modeling,on-orbit modal parameter identification,active vibration control,and wave-based vibration control,are discussed in detail.Finally,the research outlook and future trends are presented.展开更多
In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with th...In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with this heat wave over Northeast China are analyzed using station temperature data and NCEP–NCAR reanalysis data.The results indicate that strong anomalous positive geopotential height centers existed from the lower to upper levels over Northeast China,and the related downward motions were directly responsible for the extreme high-temperature anomalies.The northwestward shift of the western Pacific subtropical high(WPSH)and the northeastward shift of the South Asian high concurrently reinforced the geopotential height anomalies and descending flow over Northeast China.In addition,an anomalous Pacific–Japan pattern in the lower troposphere led to the northwestward shift of the WPSH,jointly favoring the anomalous geopotential height over Northeast China.Two wave trains emanating from the Atlantic region propagated eastwards along high latitudes and midlatitudes,respectively,and converged over Northeast China,leading to the enhancement of the geopotential height anomalies.展开更多
Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined acti...Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water.展开更多
Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system incl...Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.展开更多
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili...In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.展开更多
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or tru...We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.展开更多
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic...This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.展开更多
高校多校区一体化管理中,校区间人员流动频繁,如何保证学校师生在不同校区获得一致的上网体验成为一个难题。除了加快建设多活数据中心,实现重要信息系统的容灾备份体系之外,网络基础设施服务域名系统(Domain Name System,DNS)的一体化...高校多校区一体化管理中,校区间人员流动频繁,如何保证学校师生在不同校区获得一致的上网体验成为一个难题。除了加快建设多活数据中心,实现重要信息系统的容灾备份体系之外,网络基础设施服务域名系统(Domain Name System,DNS)的一体化部署也面临新挑战。以河海大学南京校区和常州校区为例,通过多活容灾网络架构等技术手段部署一体化智能DNS服务,有效解决网络拥塞和信息系统访问瓶颈的问题,同时提升DNS管理的便捷性和服务的安全可靠性,对相关应用场景具有一定参考价值。展开更多
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.
基金supported partially by the 973 Program under the Grant 2012CB316100
文摘Large-scale array aided beamforming improves the spectral efficiency(SE) as a benefit of high angular resolution.When dual-beam downlink beamforming is applied to the train moving towards cell edge,the inter-beam ambiguity(IBA) increases as the directional difference between beams becomes smaller.An adaptive antenna activation based beamforming scheme was proposed to mitigate IBA.In the district near the base station(BS),all antenna elements(AEs) were activated to generate two beams.As the distance from the train to the BS increased,only the minimum number of AEs satisfying the resolution criterion would be activated.At the cell edge,one beam was switched off due to intolerable IBA.The proposed scheme can achieve SE gain to the non-adaptive scheme and show more robustness against the direction-of-arrival(DOA) estimation error.
文摘Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.
基金the National Natural Science Foundation of China(Grant Nos.12102252 and 12172214)Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQ-MSX0761).
文摘Large-scale space membrane antennas have significant potential in satellite communication,space-based early warning,and Earth observation.Because of their large size and high flexibility,the dynamic analysis and control of membrane antenna are challenging.To maintain the working performance of the antenna,the pointing and surface accuracies must be strictly maintained.Therefore,the accurate dynamic modeling and effective active control of large-scale space membrane antennas have great theoretical significance and practical value,and have attracted considerable interest in recent years.This paper reviews the dynamics and active control of large-scale space membrane antennas.First,the development and status of large-scale space membrane antennas are summarized.Subsequently,the key problems in the dynamics and active control of large membrane antennas,including the dynamics of wrinkled membranes,large-amplitude nonlinear vibration,nonlinear model reduction,rigid-flexible-thermal coupling dynamic modeling,on-orbit modal parameter identification,active vibration control,and wave-based vibration control,are discussed in detail.Finally,the research outlook and future trends are presented.
基金supported by the National Natural Science Foundation of China under Grant 41775073
文摘In late July and early August 2018,Northeast China suffered from extremely high temperatures,with the maxium temperature anomaly exceeding 6°C.In this study,the large-scale circulation features associated with this heat wave over Northeast China are analyzed using station temperature data and NCEP–NCAR reanalysis data.The results indicate that strong anomalous positive geopotential height centers existed from the lower to upper levels over Northeast China,and the related downward motions were directly responsible for the extreme high-temperature anomalies.The northwestward shift of the western Pacific subtropical high(WPSH)and the northeastward shift of the South Asian high concurrently reinforced the geopotential height anomalies and descending flow over Northeast China.In addition,an anomalous Pacific–Japan pattern in the lower troposphere led to the northwestward shift of the WPSH,jointly favoring the anomalous geopotential height over Northeast China.Two wave trains emanating from the Atlantic region propagated eastwards along high latitudes and midlatitudes,respectively,and converged over Northeast China,leading to the enhancement of the geopotential height anomalies.
基金supported by the Universiti Kebangsaan Malaysia Grant(Grant No.GUP-2014-077)
文摘Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water.
基金This work was partially supported by the National Natural Science Foundation of China(No.61802034)National Key Research and Development Program of China(No.2019YFC1509602)Chongqing Natural Science Foundation(cstc2019jcyj-msxmX0264).
文摘Due to both of jamming and eavesdropping,active eavesdroppers can induce more serious security threats to unmanned aerial vehicle(UAV)-enabled communications.This paper considers a secure UAV communication system including both the downlink(DL)and uplink(UL)transmissions,where the confidential information is transmitted between a UAV and a ground node in the presence of an active eavesdropper.We aim to maximize the average secrecy rates of the DL and UL communications,respectively,by jointly optimizing the UAV trajectory and the UAV/ground node’s transmit power control over a given flight period.Due to the non-convexity of the formulated problems,it is difficult to obtain globally optimal solutions.However,we propose efficient iterative algorithms to obtain high-quality suboptimal solutions by applying the block coordinate descent and successive convex optimization methods.Simulation results show that the joint optimization algorithms can effectively improve the secrecy rate performance for both the DL and UL communications,as compared with other baseline schemes.The proposed schemes can be considered as special cases of UAV-assisted non-orthogonal multiple access(NOMA)networks.
基金supported in part by the National Natural Science Foundation of China(61227801,61121001,61201152,and 61421061)the Program for New Century Excellent Talents in University(NCET-01-0259)the Fundamental Research Funds for the Central Universities(2013RC0106)
文摘In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs.
文摘We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.
文摘This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion.
文摘高校多校区一体化管理中,校区间人员流动频繁,如何保证学校师生在不同校区获得一致的上网体验成为一个难题。除了加快建设多活数据中心,实现重要信息系统的容灾备份体系之外,网络基础设施服务域名系统(Domain Name System,DNS)的一体化部署也面临新挑战。以河海大学南京校区和常州校区为例,通过多活容灾网络架构等技术手段部署一体化智能DNS服务,有效解决网络拥塞和信息系统访问瓶颈的问题,同时提升DNS管理的便捷性和服务的安全可靠性,对相关应用场景具有一定参考价值。