Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A mul...Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.展开更多
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im...This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”展开更多
The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent trainin...The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.展开更多
With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-mark...With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.展开更多
This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the im...This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.展开更多
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ...Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.展开更多
Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)a...Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.展开更多
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic...The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.展开更多
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat...The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.展开更多
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio...The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.展开更多
The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with...The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.展开更多
The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts...The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.展开更多
With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,un...With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,universities have continuously carried out the construction of software engineering majors.Accreditation Board for Engineering and Technology(ABET)certification,as an internationally recognized higher education quality assurance system,provides important reference and guidance for the construction of software engineering majors.Guided by student learning outcomes and core competencies,combined with the characteristics of software engineering talent cultivation,the innovation of talent cultivation mode takes industry-education integration and school-enterprise cooperation as the main development paths and explores comprehensive reform of the major in terms of professional positioning and goals,curriculum system,teaching conditions,and teachers.This comprehensive reform model has effectively promoted the development of major construction and improved the quality of talent cultivation.展开更多
Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational ...Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setti...Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.展开更多
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their...The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.展开更多
Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducte...Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducted. The multi-stage and cluster sampling approach was adopted for the quantitative part of the study. A questionnaire was designed and 996 children and their keepers were interviewed. Principals, doctors or teachers of the primary schools, directors and child care nurses of kindergarten, and staff of immunization agencies were invited to take part in 12 focus group discussions; meanwhile, face-to-face individual in-depth interviews with 16 officials of the Health, Education and Governmental Departments at various levels were conducted. Results The total number of subjects was 996. 16.7% of the children in the study completed all the procedures of the National Immunization Programme. 34.3% of them had immunization certificates while the remainder 44.7% registered in immunization agencies. Factors, including the migrant children, doubt about vaccine efficiency, mother’s occupation and educational background, knowledge of the National Immunization Programme on targeted vaccines, played an important role in obtaining or not immunization certificates. 95% of the keepers interviewed thought the immunization certificates were useful; 94.8% of them considered the check was critical while only 3.6% of them thought it unnecessary. The first reason from those who found it unnecessary was that they feared that repeated immunization might affect their children’s health. The second reason was the cost of immunization, which some of them could not afford to pay. However, the Health Department expressed a favorable attitude to the checking scheme. Though the Education Department agreed that the scheme was essential, they worried that it would affect the enrollment rate.Conclusion In spite of the difficulty in administering immunization certificate check, the effort would be rewarding for raising the immunization coverage rate among the children in Guizhou Province.展开更多
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani...In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.展开更多
Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the...Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.展开更多
文摘Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.
基金2021 Tianjin Educational Science Planning Project“Research and Practice of Talent Cultivation Mode for IoT Majors in Higher Vocational Colleges under the Guidance of the‘1+X’Certificate System”(CJE210237)。
文摘This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”
文摘The core education function of higher vocational colleges is to train technical talents with high quality,so as to meet the needs of talents in the development stage of our society.Under the guidance of talent training,higher vocational colleges need to pay attention to establishing an all-round and three-dimensional education model,and promote innovation of higher vocational education on the basis of this.It is also a way to promote the innovation of higher vocational education to vigorously promote the construction of“post,course,competition,certificate”mode in the construction of education mode.Through the construction of“post,course,competition,certificate”mode,the education mode of higher vocational colleges is gradually improved,so as to strengthen the effectiveness of talent training in higher vocational colleges.Therefore,in this paper,the author puts forward some suggestions to promote the construction of the integrated education mode of the electronic information engineering technology major in higher vocational colleges,so as to help improve the talent training level of higher vocational colleges.
基金supported by the National Key R&D Program of China(2017YFB0902200).
文摘With the increasing proportion of renewable energy in the power market,the demands on government financial subsidies are gradually increasing.Thus,a joint green certificate-carbon emission right-electricity multi-market trading process is proposed to study the market-based strategy for renewable energy.Considering the commodity characteristics of green certificates and carbon emission rights,the dynamic cost models of green certificates and carbon rights are constructed based on the Rubinstein game and ladder pricing models.Furthermore,considering the irrational bidding behavior of energy suppliers in the actual electricity market,an evolutionary game based multi-market bidding optimization model is presented.Subsequently,it is solved using a composite differential evolutionary algorithm.Finally,the case study results reveal that the proposed model can increase profits and the consumption rate of renewable energy and reduce carbon emission.
基金Supported by School-level Cultivation Project of Hetian Vocational and Technical College(HZ-2022-14)Science and Technology Research and Development Plan Project in Hetian Area(20220219).
文摘This paper emphatically sums up the problems existing in the implementation of"1+X"certificate system by taking horticulture major in higher vocational colleges as an example.From the point of view of the improvement of"1+X"certificate system,the reform of talent training program,the improvement of teachers ability and summing up experience,this paper puts forward the updated working mode and ideas to provide strategies for accelerating the development of vocational education in southern Xinjiang.
文摘Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.
基金supported in part by the National Natural Science Foundation of China(No.5197707).
文摘Cooperation in energy systems is no longer limited to the distribution of electricity,and more attention is paid to the trading of green certificates(GCs).This paper proposed a cooperative method for photovoltaic(PV)and electric-to-hydrogen(EH)trading,including GC trading under risk management.First,a novel PV and EH model is established and the cooperation mechanism is analyzed.Meanwhile,PV and EH models were risk-controlled using the conditional value at risk to reduce the impact of the uncertainty of PV electricity and EH loads.Then,the PV-EH cooperative model was established based on cooperative game theory;this was then divided into two subproblems of“cooperative benefit maximization”and“transaction payment negotiation,”and the above two subproblems were solved distributively by alternating direction multiplier method(ADMM).Only energy transactions and price negotiations were conducted between the PV and EH,which can protect the privacy and confidentiality of each entity.Finally,the effectiveness of the cooperation model was verified using a practical engineering case.The simulation results show that the cooperation of the PV-EH can significantly improve the operational efficiency of each entity and the overall efficiency of the cooperation and realize the efficient redistribution of electricity and GC.
基金supported by Joint Funds of the National Natural Science Foundation of China and Xinjiang under Project U1603261.
文摘The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
基金supported by the National Natural Science Foundation of China under grant 61972207,U1836208,U1836110,61672290the Major Program of the National Social Science Fund of China under Grant No.17ZDA092+2 种基金by the National Key R&D Program of China under grant 2018YFB1003205by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fundby the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.
基金supported by National Key RD Program of China(Grant No.2022YFB3104402,the Research on Digital Identity Trust System for Massive Heterogeneous Terminals in Road Traffic System)the Fundamental Research Funds for the Central Universities(Grant Nos.3282023015,3282023035,3282023051)National First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute(No.3201012).
文摘The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.
基金supported by the National Natural Science Foundation of China(72061147002)the National Social Science Foundation of China(18ZDA074)。
文摘The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.
基金Chongqing Municipal Education Science Planning Project+Educational Reform Special Project+Practice Research on Integrated Teaching Reform of“Post-Course Competition Certificate”for BIM Intelligent Construction Major in Vocational Schools(Project number:K23ZG3250169)。
文摘The model of“post-course competition certificate”can be the basic model of Building Information Modeling(BIM)course teaching in vocational colleges in the new era,and many vocational colleges have also made attempts to construct and apply this model in BIM courses and other professional courses.Based on the application of methods such as literature review and observation,it can be found that it is highly feasible in theory and practice to promote the innovation and reform of BIM curriculum based on this model.However,there are more influencing factors at the practical level,which can easily lead to some problems.In this paper,we will analyze the corresponding problems and put forward a more effective reform strategy of BIM course education innovation in combination with reality.
基金Digital Twin and Acoustic Perception Research Team(2021XJTD06)。
文摘With the rapid development of information technology,the demand for talents in the field of software engineering is growing.In order to cultivate high-quality software engineering talents who meet the market demand,universities have continuously carried out the construction of software engineering majors.Accreditation Board for Engineering and Technology(ABET)certification,as an internationally recognized higher education quality assurance system,provides important reference and guidance for the construction of software engineering majors.Guided by student learning outcomes and core competencies,combined with the characteristics of software engineering talent cultivation,the innovation of talent cultivation mode takes industry-education integration and school-enterprise cooperation as the main development paths and explores comprehensive reform of the major in terms of professional positioning and goals,curriculum system,teaching conditions,and teachers.This comprehensive reform model has effectively promoted the development of major construction and improved the quality of talent cultivation.
文摘Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
基金Supported by Studies of Rural Policy-favored Petty Loan Forest Property Mortgage Mode,the Youth Fund of MOE(Ministry of Education in China)Project on Humanities and Social Sciences(11YJCZH258)the Fundamental Research Funds for the Central Universities(RW2011-36)
文摘Studying petty loan forestry property mortgage mode has significant practical meaning in fund-raising and income-increasing in the forest- agriculture industry,restructuring and expanding the industry as well as setting up scientific industrial public policies. On the basis of literature analysis and field research data,this paper will classify and analyze research papers studying in forestry,property mortgage,and therefore draws conclusions on relevant concepts of petty loan forestry property mortgage,economics and property rights theory as well. At present,the studies of petty loan forestry property mortgage are more practical that are lack of an overall theoretical framework. Considering China's real situation of petty loan forestry property mortgage mode,we have investigated some foreign cases in operating forestry property mortgage systemically and some challenges and difficulties confronted by stakeholders in real cases. Therefore,we put forward that in the current period the fund-raising in forestry industry should focus on establishing and improving an overall rural petty loan forestry property mortgage mode.
基金the National Natural Science Foundation of China (60773086)
文摘The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.
文摘Objective To study the feasibility of enforcing immunization certificate check before children enroll in primary schools or kindergartens in Guizhou Province. Methods Quantitative and qualitative studies were conducted. The multi-stage and cluster sampling approach was adopted for the quantitative part of the study. A questionnaire was designed and 996 children and their keepers were interviewed. Principals, doctors or teachers of the primary schools, directors and child care nurses of kindergarten, and staff of immunization agencies were invited to take part in 12 focus group discussions; meanwhile, face-to-face individual in-depth interviews with 16 officials of the Health, Education and Governmental Departments at various levels were conducted. Results The total number of subjects was 996. 16.7% of the children in the study completed all the procedures of the National Immunization Programme. 34.3% of them had immunization certificates while the remainder 44.7% registered in immunization agencies. Factors, including the migrant children, doubt about vaccine efficiency, mother’s occupation and educational background, knowledge of the National Immunization Programme on targeted vaccines, played an important role in obtaining or not immunization certificates. 95% of the keepers interviewed thought the immunization certificates were useful; 94.8% of them considered the check was critical while only 3.6% of them thought it unnecessary. The first reason from those who found it unnecessary was that they feared that repeated immunization might affect their children’s health. The second reason was the cost of immunization, which some of them could not afford to pay. However, the Health Department expressed a favorable attitude to the checking scheme. Though the Education Department agreed that the scheme was essential, they worried that it would affect the enrollment rate.Conclusion In spite of the difficulty in administering immunization certificate check, the effort would be rewarding for raising the immunization coverage rate among the children in Guizhou Province.
文摘In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.
基金the High Technoeogy Research and Debelopment Program of China
文摘Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security require-nients come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implemen-tation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.