The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an import...The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an important target of network attacks. In order to perceive the network attack events on the user station side in time, a method combining real-time detection and active defense of random domain names on the user station side was proposed. Capsule network (CapsNet) combined with long short-term memory network (LSTM) was used to classify the domain names extracted from the traffic data. When a random domain name is detected, it sent instructions to routers and switched to update their security policies through the remote terminal protocol (Telnet), or shut down the service interfaces of routers and switched to block network attacks. The experimental results showed that the use of CapsNet combined with LSTM classification algorithm can achieve 99.16% accuracy and 98% recall rate in random domain name detection. Through the Telnet protocol, routers and switches can be linked to make active defense without interrupting services.展开更多
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ...The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense effectiveness.Therefore,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense strategies.the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions.展开更多
Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton fo...Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton for novel drug discovery.To extend the utility of 18β-glycyrrhetinic acid for agricultural uses,a series of novel 18β-glycyrrhetinic acid amide derivatives were prepared and evaluated for their antibacterial potency.Notably,compound 5k showed good antibacterial activity in vitro against Xanthomonas oryzae pv.oryzae(Xoo,EC50=3.64 mg L–1),and excellent protective activity(54.68%)against Xoo in vivo.Compound 5k induced excessive production and accumulation of reactive oxygen species in the tested pathogens,resulting in damaging the bacterial cell envelope.More interestingly,compound 5k could increase the activities of plant defense enzymes including catalase,superoxide dismutase,peroxidase,and phenylalanine ammonia lyase.Taken together,these enjoyable results suggested that designed compounds derived from 18β-glycyrrhetinic acid showed potential for controlling intractable plant bacterial diseases by disturbing the balance of the phytopathogen’s redox system and activating the plant defense system.展开更多
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network elem...This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.展开更多
Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active dece...Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.展开更多
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u...Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.展开更多
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl...Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively implant the backdoor,and triggers on the input can mislead the models during testing.Our study shows that the model shows different learning behaviors in clean and poisoned subsets during training.Based on this observation,we propose a general training pipeline to defend against backdoor attacks actively.Benign models can be trained from the unreli-able dataset by decoupling the learning process into three stages,i.e.,supervised learning,active unlearning,and active semi-supervised fine-tuning.The effectiveness of our approach has been shown in numerous experiments across various backdoor attacks and datasets.展开更多
[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-...[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.展开更多
Previous studies have demonstrated that reactions to unfair offers in the ultimatum game are correlated with negative emotion. However, little is known about the difference in neural activity between a proposer's dec...Previous studies have demonstrated that reactions to unfair offers in the ultimatum game are correlated with negative emotion. However, little is known about the difference in neural activity between a proposer's decision-making in the ultimatum game compared with the dictator game. The present functional magnetic resonance imaging study revealed that proposing fair offers in the dictator game elicited greater activation in the right supramarginal gyrus, right medial frontal gyrus and left anterior cingulate cortex compared with proposing fair offers in the ultimatum game in 23 Chinese undergraduate and graduate students from Beijing Normal University in China. However, greater activation was found in the right superior temporal gyrus and left cingulate gyrus for the reverse contrast. "The results indicate that proposing fair offers in the dictator game is more strongly associated with cognitive control and conflicting information processing compared with proposing fair offers in the ultimatum game.展开更多
Botanical herbicide has been a hot topic in the research and development of novel pesticides. The herbicidal activity and biochemical characteristics of the botanical compound drupacine were studied by evaluating its ...Botanical herbicide has been a hot topic in the research and development of novel pesticides. The herbicidal activity and biochemical characteristics of the botanical compound drupacine were studied by evaluating its effects on seed germination, seedling growth, morphological and physiological characteristics of Amaranthus retroflexus. Drupacine inhibited seed germination and seedling growth, and had a median inhibition concentration(IC50) value of 38.99 mg L-1against A. retroflexus root. The α-amylase activity and soluble sugar content in treated plants were significantly lower than that of the control. The expression of α-amylase gene was dosage-dependently inhibited compared to the untreated control. This suggested that inhibition of α-amylase activity was a mode of action on seed germination. The root hairs were significantly decreased and part of the root cap fell off after treatment with drupacine. The ultrastructure observation showed that cell damage of root tips increased with the treatment time. Drupacine also increased the relative conductivity and malondialdehyde(MDA) content. Peroxidase(POD), catalase(CAT), and superoxide dismutase(SOD) activities were significantly enhanced in the treatment compared to the control. These findings indicated that the physiological and biochemical reaction changes leading to morphological and membrane injuries were the main effects of drupacine on the inhibition of seedling growth. Drupacine can be developed as a botanical herbicide.展开更多
Odorrana margaretae (Anura: Ranidae) is widely distributed in the southern provinces of China. Previously, 72 antimicrobial peptides (AMPs) belonging to 21 families were identified from the skin of O. margaretae,...Odorrana margaretae (Anura: Ranidae) is widely distributed in the southern provinces of China. Previously, 72 antimicrobial peptides (AMPs) belonging to 21 families were identified from the skin of O. margaretae, which were captured in the Hunan province. In the present study, five O. margaretae frogs were captured from the Guizhou province and a total of 28 cDNAs encoding 17 host defense peptides (HDPs) belonging to 14 families were cloned from the skin cDNA library of O. margaretae. Among the 17 HDPs, only one (brevinin-1-Omar5) had been characterized. The distinct HDP expression profiles for O. margaretae in the previous and present study may be attributed to the environmental differences between the sampling locations and the genetic divergence among O. margaretae populations. Besides, 11 of the 17 HDPs identified in the present study were novel for ranids. In order to understand their roles in host defense reactions, three HDPs (odorranain-H-OM1, odorranain-M-OM and ranatuerin-2-OM), which possess low sequence similarity with the known amphibian HDPs, were selected for further chemical synthesis and functional analysis. Odorranain-H-OM1 showed direct antimicrobial activity against bacteria and fungi. Odorranain-M-OM exhibited concentration-dependent anti-oxidant activity. Ranatuerin-2-OM showed lectin-like activity and could strongly hemagglu -tinate human intact erythrocytes with or without the presence of Ca2+. The diverse activities of HDPs implied that they may play different roles in host defense reactions of O. margaretae.展开更多
The scientific decision-making of education policies is not absolutely a complete rational process.The bounded rationality which takes rationality as the judgement standard is the essential connotation of the scientif...The scientific decision-making of education policies is not absolutely a complete rational process.The bounded rationality which takes rationality as the judgement standard is the essential connotation of the scientific decision-making of education policies.Therefore,based on this view and through shaping reasonable education policy values,this research gives full play to the driving force of educational scientific research on education policies and designs effective education decision-making information content and running agenda,thus optimizing the weigh principle of education policy proposals,advocating risk assessment and practice of education decisions,constructing institutional rationality of educational scientific decision-making,and finally realizing the rationality and scientificity of education policy decision-making.展开更多
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa...This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.展开更多
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe...The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system.展开更多
文摘The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an important target of network attacks. In order to perceive the network attack events on the user station side in time, a method combining real-time detection and active defense of random domain names on the user station side was proposed. Capsule network (CapsNet) combined with long short-term memory network (LSTM) was used to classify the domain names extracted from the traffic data. When a random domain name is detected, it sent instructions to routers and switched to update their security policies through the remote terminal protocol (Telnet), or shut down the service interfaces of routers and switched to block network attacks. The experimental results showed that the use of CapsNet combined with LSTM classification algorithm can achieve 99.16% accuracy and 98% recall rate in random domain name detection. Through the Telnet protocol, routers and switches can be linked to make active defense without interrupting services.
基金supported in part by the National Natural Science Foundation of China(62106053)the Guangxi Natural Science Foundation(2020GXNSFBA159042)+2 种基金Innovation Project of Guangxi Graduate Education(YCSW2023478)the Guangxi Education Department Program(2021KY0347)the Doctoral Fund of Guangxi University of Science and Technology(XiaoKe Bo19Z33)。
文摘The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense effectiveness.Therefore,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense strategies.the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions.
基金fundings provided by the National Natural Science Foundation of China(21877021 and 32160661)the Guizhou Provincial S&T Program[(2018)4007]the Program of Introducing Talents of Discipline to Universities of China(D20023,111 Program).
文摘Natural products have long been a crucial source of,or provided inspiration for new agrochemical discovery.Naturally occurring 18β-glycyrrhetinic acid shows broad-spectrum bioactivities and is a potential skeleton for novel drug discovery.To extend the utility of 18β-glycyrrhetinic acid for agricultural uses,a series of novel 18β-glycyrrhetinic acid amide derivatives were prepared and evaluated for their antibacterial potency.Notably,compound 5k showed good antibacterial activity in vitro against Xanthomonas oryzae pv.oryzae(Xoo,EC50=3.64 mg L–1),and excellent protective activity(54.68%)against Xoo in vivo.Compound 5k induced excessive production and accumulation of reactive oxygen species in the tested pathogens,resulting in damaging the bacterial cell envelope.More interestingly,compound 5k could increase the activities of plant defense enzymes including catalase,superoxide dismutase,peroxidase,and phenylalanine ammonia lyase.Taken together,these enjoyable results suggested that designed compounds derived from 18β-glycyrrhetinic acid showed potential for controlling intractable plant bacterial diseases by disturbing the balance of the phytopathogen’s redox system and activating the plant defense system.
文摘This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.
基金Supported by the National Natural Science Foundation of China (No.60572131)Innovation Fund of Technol-ogy Based Firms (No.08C26213200495)+2 种基金Key tech-nologies R&D Program of Jiang su Province (No.BE 2007058)College Natural Science Foundation of Ji-angsu Province (No.08KJB520005)the Scientific Research Foundation of NUPT (No.NY206050)
文摘Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.
文摘Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.
基金supported by the National Nature Science Foundation of China under Grant No.62272007National Nature Science Foundation of China under Grant No.U1936119Major Technology Program of Hainan,China(ZDKJ2019003)。
文摘Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively implant the backdoor,and triggers on the input can mislead the models during testing.Our study shows that the model shows different learning behaviors in clean and poisoned subsets during training.Based on this observation,we propose a general training pipeline to defend against backdoor attacks actively.Benign models can be trained from the unreli-able dataset by decoupling the learning process into three stages,i.e.,supervised learning,active unlearning,and active semi-supervised fine-tuning.The effectiveness of our approach has been shown in numerous experiments across various backdoor attacks and datasets.
基金Supported by Research Fund of the State Tobacco Monopoly Bureau(110201002002)the Open Research Project of Key Laboratory of Tobacco Genetics and Breeding in the Tobacco Industry(TB201006)~~
文摘[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.
基金supported by the National Laboratory of Cognitive Neuroscience and Learning at Beijing Normal University (the 973 program),No. 2010CB8339004the National Natural Science Foundation of China,No. 30970911+1 种基金the Fundamental Research Fund for the Central Universities,No.SWJTU11BR192the Humanity and Social Science Youth foundation of Ministry of Education of China,No. 12YJC630317
文摘Previous studies have demonstrated that reactions to unfair offers in the ultimatum game are correlated with negative emotion. However, little is known about the difference in neural activity between a proposer's decision-making in the ultimatum game compared with the dictator game. The present functional magnetic resonance imaging study revealed that proposing fair offers in the dictator game elicited greater activation in the right supramarginal gyrus, right medial frontal gyrus and left anterior cingulate cortex compared with proposing fair offers in the ultimatum game in 23 Chinese undergraduate and graduate students from Beijing Normal University in China. However, greater activation was found in the right superior temporal gyrus and left cingulate gyrus for the reverse contrast. "The results indicate that proposing fair offers in the dictator game is more strongly associated with cognitive control and conflicting information processing compared with proposing fair offers in the ultimatum game.
基金funded by the Provincial Natural Science Foundation of Hebei for Excellent Young Scholar, China (C2021204071)the Science and Technology Project of Hebei Education Department (QN2021079)+1 种基金the Key Research and Development Project of Hebei Province (21326511D and 19226504D)the China Agriculture Research System of MOF and MARA (CARS-02)。
文摘Botanical herbicide has been a hot topic in the research and development of novel pesticides. The herbicidal activity and biochemical characteristics of the botanical compound drupacine were studied by evaluating its effects on seed germination, seedling growth, morphological and physiological characteristics of Amaranthus retroflexus. Drupacine inhibited seed germination and seedling growth, and had a median inhibition concentration(IC50) value of 38.99 mg L-1against A. retroflexus root. The α-amylase activity and soluble sugar content in treated plants were significantly lower than that of the control. The expression of α-amylase gene was dosage-dependently inhibited compared to the untreated control. This suggested that inhibition of α-amylase activity was a mode of action on seed germination. The root hairs were significantly decreased and part of the root cap fell off after treatment with drupacine. The ultrastructure observation showed that cell damage of root tips increased with the treatment time. Drupacine also increased the relative conductivity and malondialdehyde(MDA) content. Peroxidase(POD), catalase(CAT), and superoxide dismutase(SOD) activities were significantly enhanced in the treatment compared to the control. These findings indicated that the physiological and biochemical reaction changes leading to morphological and membrane injuries were the main effects of drupacine on the inhibition of seedling growth. Drupacine can be developed as a botanical herbicide.
基金supported by the grants from Guiyang Science and Technology Plan Projects (2010-01-Z-24) to Jiang ZHOU
文摘Odorrana margaretae (Anura: Ranidae) is widely distributed in the southern provinces of China. Previously, 72 antimicrobial peptides (AMPs) belonging to 21 families were identified from the skin of O. margaretae, which were captured in the Hunan province. In the present study, five O. margaretae frogs were captured from the Guizhou province and a total of 28 cDNAs encoding 17 host defense peptides (HDPs) belonging to 14 families were cloned from the skin cDNA library of O. margaretae. Among the 17 HDPs, only one (brevinin-1-Omar5) had been characterized. The distinct HDP expression profiles for O. margaretae in the previous and present study may be attributed to the environmental differences between the sampling locations and the genetic divergence among O. margaretae populations. Besides, 11 of the 17 HDPs identified in the present study were novel for ranids. In order to understand their roles in host defense reactions, three HDPs (odorranain-H-OM1, odorranain-M-OM and ranatuerin-2-OM), which possess low sequence similarity with the known amphibian HDPs, were selected for further chemical synthesis and functional analysis. Odorranain-H-OM1 showed direct antimicrobial activity against bacteria and fungi. Odorranain-M-OM exhibited concentration-dependent anti-oxidant activity. Ranatuerin-2-OM showed lectin-like activity and could strongly hemagglu -tinate human intact erythrocytes with or without the presence of Ca2+. The diverse activities of HDPs implied that they may play different roles in host defense reactions of O. margaretae.
基金This paper is funded by the youth project of education of the National Social Science Foundation“Research on the value foundation of educational policy from the perspective of political philosophy”(CAA150123).
文摘The scientific decision-making of education policies is not absolutely a complete rational process.The bounded rationality which takes rationality as the judgement standard is the essential connotation of the scientific decision-making of education policies.Therefore,based on this view and through shaping reasonable education policy values,this research gives full play to the driving force of educational scientific research on education policies and designs effective education decision-making information content and running agenda,thus optimizing the weigh principle of education policy proposals,advocating risk assessment and practice of education decisions,constructing institutional rationality of educational scientific decision-making,and finally realizing the rationality and scientificity of education policy decision-making.
文摘This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.
基金supported by the National Nature Science Foundation of China(Nos.62103357,62203376)the Science and Technology Plan of Hebei Education Department(No.QN2021139)+1 种基金the Nature Science Foundation of Hebei Province(Nos.F2021203043,F2022203074)the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network,Nanjing Institute of Technology(No.XTCX202203).
文摘The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system.