期刊文献+
共找到66,717篇文章
< 1 2 250 >
每页显示 20 50 100
Prevalence and Factors Associated with Sharing of Human Immunodeficiency Seropositivity Status among Serodiscordant Couples in the City of Parakou (Benin)
1
作者 Djossou Sègnon Eurydice Elvire Damien Georgia Barikissou +7 位作者 Meba Bio Mamatou Tokpanoude Ignace Ahanhanzo-Glele Rhonel Ataigba Iretinethania Elie Agossoukpe Benoit Kakpo-Zannou Rodrigue Kamoutchoni Corneille Aguemon Badirou 《Open Journal of Epidemiology》 2024年第1期1-18,共18页
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am... Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple. 展开更多
关键词 Serodiscordance sharing of Serostatus HIV PARTNER BENIN
下载PDF
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
2
作者 Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期388-410,共23页
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u... In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security. 展开更多
关键词 Bloom Filter CRYPTOGRAPHY Essential Secret Image sharing Verifiability
下载PDF
Impact of Sharing Marketing on Marketing Willingness of Employees in Internet Decoration Industry
3
作者 Zhongxin LI 《Asian Agricultural Research》 2024年第1期10-13,共4页
With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration ... With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration industry.Based on the data obtained from the ques-tionnaire survey,this paper makes an empirical analysis of the impact of the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing on the marketing willingness of employees in the Internet decoration industry.The results showed that the questionnaire had good internal consistency and construct validity.Through empirical analysis,it can be found that the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing have a significant positive impact on employees'marketing willingness. 展开更多
关键词 MARKETING sharing marketing Internet decoration Marketing willingness
下载PDF
基于ICEEMDAN和分布熵的SS-Y伸缩仪信号随机噪声压制方法
4
作者 吴林斌 《大地测量与地球动力学》 CSCD 北大核心 2024年第4期429-435,共7页
结合改进的自适应噪声完备集合经验模态分解(ICEEMDAN)与分布熵(DistEn),提出一种无需自定义算法参数、去噪效果较好的伸缩仪信号随机噪声压制方法。首先将伸缩仪信号进行ICEEMDAN处理,得到若干个本征模态函数(IMF);然后计算各IMF分量... 结合改进的自适应噪声完备集合经验模态分解(ICEEMDAN)与分布熵(DistEn),提出一种无需自定义算法参数、去噪效果较好的伸缩仪信号随机噪声压制方法。首先将伸缩仪信号进行ICEEMDAN处理,得到若干个本征模态函数(IMF);然后计算各IMF分量的分布熵值,根据不同分布熵值的大小和表征的分量信号混乱程度,有针对性地对各IMF进行取舍;最后进行线性重构。设计仿真信号去噪实验和SS-Y伸缩仪信号去噪实验,结果表明,基于ICEEMDAN-DistEn去噪模型的伸缩仪信号重构还原度较好,去噪效果显著,明显优于CEEMDAN-DistEn、小波去噪和卡尔曼滤波等去噪模型。 展开更多
关键词 ss-Y伸缩仪 随机噪声压制 改进的自适应噪声完备集合经验模态分解 分布熵 信噪比
下载PDF
T6SS阳性CRKP临床感染特征及毒力基因分析
5
作者 刘莉娟 储雯雯 +4 位作者 王梦 闫涛 龚真 周强 刘周 《中国感染控制杂志》 CAS CSCD 北大核心 2024年第4期488-493,共6页
目的分析T6SS阳性耐碳青霉烯类肺炎克雷伯菌(CRKP)临床感染特征,以及其耐药、毒力基因检出率和生物膜形成能力,为临床防控CRKP感染提供参考数据。方法收集2019年1月—2022年12月安徽某三甲医院临床分离的CRKP菌株及患者资料,PCR法检测T... 目的分析T6SS阳性耐碳青霉烯类肺炎克雷伯菌(CRKP)临床感染特征,以及其耐药、毒力基因检出率和生物膜形成能力,为临床防控CRKP感染提供参考数据。方法收集2019年1月—2022年12月安徽某三甲医院临床分离的CRKP菌株及患者资料,PCR法检测T6SS基因、毒力基因、耐药基因和分子分型,96孔板结晶紫染色法检测生物膜形成能力。结果共纳入160株CRKP。标本来源以痰(46.9%)和血(26.3%)为主。CRKP菌株呈现多重耐药表型,以携带bla KPC(80.6%)为主,其次为bla NDM(17.5%)。根据是否携带T6SS将CRKP分为T6SS阳性组(129株,80.6%)和T6SS阴性组(31株,19.4%)。T6SS阳性组患者患慢性肺部疾病和心脏疾病比例高于T6SS阴性组(P<0.05),且预后较阴性组差(P<0.05)。T6SS阳性组中,iuc A、mrk D、rmp A2、peg 344、wab G、fim H检出率均高于T6SS阴性组(均P<0.05)。CRKP中以ST11型(68.8%)为主,其中K64-ST11型占比70.9%,K47-ST11型占比25.5%。T6SS阳性组ST11型和K64-ST11型CRKP占比均高于T6SS阴性组(均P<0.05)。T6SS阳性组CRKP生物膜形成能力强于T6SS阴性组(P<0.001)。两组除bla OXA-48基因外,在携带其他碳青霉烯类耐药基因和抗菌药物耐药率方面差异无统计学意义。结论该地区CRKP呈现多重耐药,CRKP菌株T6SS检出率高,T6SS阳性CRKP毒力基因检出率更高,且生物膜形成能力更强。 展开更多
关键词 肺炎克雷伯菌 T6ss 毒力基因 耐碳青霉烯类 碳青霉烯酶
下载PDF
SS-OCT在角膜成像中的应用进展
6
作者 赵丽丽 宋继科 +1 位作者 卢秀珍 毕宏生 《国际眼科杂志》 CAS 2024年第7期1058-1063,共6页
成像技术的进步彻底改变了眼科领域,改变了我们对眼科疾病的理解、诊断和治疗。扫频源光学相干断层扫描(SS-OCT)是一种最新的非接触式高分辨率成像技术。它进一步提高了成像深度和扫描速度,增加了新的算法和功能。SS-OCT允许对角膜结构... 成像技术的进步彻底改变了眼科领域,改变了我们对眼科疾病的理解、诊断和治疗。扫频源光学相干断层扫描(SS-OCT)是一种最新的非接触式高分辨率成像技术。它进一步提高了成像深度和扫描速度,增加了新的算法和功能。SS-OCT允许对角膜结构进行三维评估,提供角膜前、后表面的曲率和高度图以及角膜厚度图。这可以帮助眼科医生筛查和诊断角膜病变,如圆锥角膜、角膜营养不良和变性。SS-OCT更快、更精准和更灵敏的角膜测量有助于对即将进行角膜和屈光手术的患者做好术前计划和术后监测。文章总结SS-OCT技术的发展及其在角膜疾病中潜在的临床效用与在手术中的应用进展,以支持更多未来可能的研究和临床治疗。 展开更多
关键词 扫频源光学相干断层扫描(ss-OCT) 屈光手术 角膜移植 散光
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
7
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing Internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Analysis and Optimization of Validation Procedure in Blockchain-Enhanced Wireless Resource Sharing and Transactions
8
作者 Enyu Du Yang Gao +3 位作者 Wenjun Wu Zhaoxin Yang Yufeng Yin Pengbo Si 《China Communications》 SCIE CSCD 2023年第10期245-261,共17页
To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of... To ensure the security of resource and intelligence sharing in 6G,blockchain has been widely adopted in wireless communications and applications.Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks,it cannot guarantee the honest behaviors of users in the application before the generation of transactions.Thus,additional technologies are required to ensure that the source of blockchain data is reliable.In this paper,the detailed procedure is designed for the application-oriented task validation in the blockchainenhanced computing resource sharing and transactions in ultra dense networks(UDN).The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users.Based on the analysis results,the UDN deployment is optimized to save network cost while ensuring latency performance.Numerical results verify our analysis,and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing(MEC)servers are also given with various system settings. 展开更多
关键词 blockchain queuing theory wireless resource sharing validation procedure
下载PDF
An Adaptive Wireless Power Sharing Control for Multiterminal HVDC
9
作者 Hasan Alrajhi 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期117-129,共13页
Power sharing among multiterminal high voltage direct current terminals(MT-HVDC)is mainly developed based on a priority or sequential manners,which uses to prevent the problem of overloading due to a predefined contro... Power sharing among multiterminal high voltage direct current terminals(MT-HVDC)is mainly developed based on a priority or sequential manners,which uses to prevent the problem of overloading due to a predefined controller coefficient.Furthermore,fixed power sharing control also suffers from an inability to identify power availability at a rectification station.There is a need for a controller that ensures an efficient power sharing among the MT-HVDC terminals,prevents the possibility of overloading,and utilizes the available power sharing.A new adaptive wireless control for active power sharing among multiterminal(MT-HVDC)systems,including power availability and power management policy,is proposed in this paper.The proposed control strategy solves these issues and,this proposed controller strategy is a generic method that can be applied for unlimited number of converter stations.The rational of this proposed controller is to increase the system reliability by avoiding the necessity of fast communication links.The test system in this paper consists of four converter stations based on three phase-two AC voltage levels.The proposed control strategy for a multiterminal HVDC system is conducted in the power systems computer aided design/electromagnetic transient design and control(PSCAD/EMTDC)simulation environment.The simulation results significantly show the flexibility and usefulness of the proposed power sharing control provided by the new adaptive wireless method. 展开更多
关键词 Active power control fixed power sharing current control HVDC transmission MTDC voltage source converter(VSC) power sharing control adaptive wireless control power conversion
下载PDF
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
10
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing
11
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 Post-quantum cryptography NTRU Shamir’s secret sharing public key
下载PDF
偃松PpSS和PpSE基因过表达载体构建
12
作者 王思瑶 于宏影 +2 位作者 刘洋 梁雪 南方 《温带林业研究》 2024年第2期68-71,共4页
【目的】构建偃松甾醇代谢途径关键基因SS和SE过表达载体,为促进偃松甾醇高效合成奠定基础,为药用偃松遗传改良提供重要基因资源。【方法】以偃松的cDNA为模板,将SS和SE基因克隆至pNC-Cam1304-35s载体;重组质粒通过PCR及测序鉴定正确后... 【目的】构建偃松甾醇代谢途径关键基因SS和SE过表达载体,为促进偃松甾醇高效合成奠定基础,为药用偃松遗传改良提供重要基因资源。【方法】以偃松的cDNA为模板,将SS和SE基因克隆至pNC-Cam1304-35s载体;重组质粒通过PCR及测序鉴定正确后,三亲杂交转入根瘤农杆菌LBA4404。【结果】抗性农杆菌PCR产物长度与预期一致,阳性菌液测序结果与目标基因序列相同。【结论】成功构建SS和SE过表达载体,重组载体的获得为进一步挖掘其在偃松甾醇代谢中的调控机制研究奠定了基础。 展开更多
关键词 偃松 ss SE 过表达
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
13
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
高盐饮食通过激活盐皮质受体引发Dahl SS大鼠肾损伤和高血压的新机制
14
作者 李曦 王蕊 李洪林 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第3期391-399,共9页
盐敏感高血压作为一种顽固性高血压,其发病机制十分复杂。虽然盐皮质激素受体激活和肾损伤在盐敏感高血压的发展中起关键作用,但具体的病理机制目前并不明确。通过高盐饮食诱导建立达尔盐敏感(Dahl SS)大鼠高血压模型,探究盐敏感高血压... 盐敏感高血压作为一种顽固性高血压,其发病机制十分复杂。虽然盐皮质激素受体激活和肾损伤在盐敏感高血压的发展中起关键作用,但具体的病理机制目前并不明确。通过高盐饮食诱导建立达尔盐敏感(Dahl SS)大鼠高血压模型,探究盐敏感高血压及肾损伤产生的病理机制。与盐不敏感的SS-13BN大鼠相比,长期高盐饮食会造成Dahl SS大鼠肾脏中交感神经和肾素-血管紧张素-醛固酮系统(RAAS)的局部激活,最终激活盐皮质激素受体(MR),导致上皮钠通道(ENaC)表达增加、氧化应激与炎症反应增强,从而发生肾纤维化病变,并引发肾脏中磷酸化肌动蛋白(P-Cofilin)与足蛋白(Podocin)表达增加,造成足细胞损伤,最终引发肾损伤与高血压症状。 展开更多
关键词 高盐饮食 Dahl ss大鼠 盐敏感高血压 肾损伤 盐皮质激素受体
下载PDF
血流感染肺炎克雷伯菌Ⅵ型分泌系统(T6SS)的分布及其与毒力和耐药性的相关性分析
15
作者 徐玉金 朱亦丹 +4 位作者 李培芬 黄加铭 孙细欢 林颖颖 黄东红 《福建医药杂志》 CAS 2024年第1期45-49,共5页
目的检测Ⅵ型分泌系统(T6SS)在血流感染分离肺炎克雷伯菌中的分布,并分析其与毒力基因、抗生素耐药之间的关系。方法收集我院血培养分离出的肺炎克雷伯菌,通过PCR方法检测T6SS基因、荚膜血清型和毒力基因,并通过VITEKR2 Compact进行药... 目的检测Ⅵ型分泌系统(T6SS)在血流感染分离肺炎克雷伯菌中的分布,并分析其与毒力基因、抗生素耐药之间的关系。方法收集我院血培养分离出的肺炎克雷伯菌,通过PCR方法检测T6SS基因、荚膜血清型和毒力基因,并通过VITEKR2 Compact进行药敏试验。结果56株肺炎克雷伯菌中,26株(46.43%)T6SS阳性。T6SS阳性株中K1、K2荚膜血清型和11个毒力基因的检出率高于T6SS阴性株(P<0.05)。T6SS阳性肺炎克雷伯菌对抗生素更敏感(P<0.05)。HvKP中T6SS阳性率显著高于T6SS阴性率(P<0.05)。从社区和肝脓肿中分离的T6SS阳性肺炎克雷伯菌更多(P<0.05)。糖尿病、携带Aerobactin、rmpA毒力基因是T6SS阳性肺炎克雷伯菌引起血流感染的独立危险因素。结论Ⅵ型分泌系统(T6SS)在引起血流感染的肺炎克雷伯菌中检出率较高,T6SS阳性株携带更多的毒力基因,可能是导致血流感染的主要原因。 展开更多
关键词 肺炎克雷伯菌 血流感染 T6ss 毒力因子 药物敏感性
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
16
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
17
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
18
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
19
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
20
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部