期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Sources of Polycyclic Aromatic Hydrocarbons in Street Dust from the Chang-Zhu-Tan Region, Hunan, China 被引量:1
1
作者 Yongzhen Long Guoxiang Chi +2 位作者 Hairuo Qing Tagen Dai qianhong wu 《Journal of Environmental Protection》 2011年第10期1331-1340,共10页
Street dusts collected from 20 sites as well as three special dust samples collected from chimney of coal-fired plant, smelter and refinery of nonferrous metals and automobile exhaust, respectively, in the Chang-Zhu-T... Street dusts collected from 20 sites as well as three special dust samples collected from chimney of coal-fired plant, smelter and refinery of nonferrous metals and automobile exhaust, respectively, in the Chang-Zhu-Tan (Changsha, Zhuzhou and Xiangtan) urban region, Hunan, China, in May to August 2009, were investigated for sources of polycylic aromatic hydrocarbons (PAHs). The ΣPAHs16 levels were in the range of 3515 - 24488 ng/g, with a mean of 8760 ng/g. The sources of PAH inputs to street dusts were determined by isomer ratios, principal components analysis and REE geochemical analysis. The isomer ratios suggested a rather uniform mixture of coal combustion and petroleum PAH sources. Factor analysis indicated that the main sources of 16 PAHs were coal combustion/vehicle exhaust and coking/ petroleum. Rare earth elements (REE) and Factor score analysis further indicated the possible dust sources were from background soil, coal or coking combustion, nonferrous metal factories, traffic exhaust. 展开更多
关键词 STREET Dust Polycclic AROMATIC Hydrocarbons RARE Earth Element SOURCES of Pollution
在线阅读 下载PDF
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin 被引量:5
2
作者 Mingming Wang qianhong wu +3 位作者 Bo Qin Qin Wang Jianwei Liu Zhenyu Guan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期568-586,共19页
An effective and secure system used for evidence preservation is essential to possess the properties of anti- loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on central... An effective and secure system used for evidence preservation is essential to possess the properties of anti- loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on centralized cloud storage is depressingly beset by the security problems such as incomplete confidence and unreliable regulation. Moreover, an expensive, inefficient and incompatible design impedes the effort of evidence preservation. In contrast, the decentralized blockchain network is qualified as a perfect replacement for its secure anonymity, irrevocable commitment, and transparent traceability. Combining with subliminal channels in blockchain, we have weaved the transaction network with newly designed evidence audit network. In this paper, we have presented and implemented a lightweight digital evidence-preservation architecture which possesses the features of privacy-anonymity, audit-transparency, function-scalability and operation-lightweight. The anonymity is naturally formed from the cryptographic design, since the cipher evidence under encrypted cryptosystem and hash-based functions leakages nothing to the public. Covert channels are efficiently excavated to optimize the cost, connectivity and security of the framework, transforming the great computation power of Bitcoin network to the value of credit. The transparency used for audit, which relates to the proof of existence, comes from instant timestamps and irreversible hash functions in mature blockchain network. The scalability is represented by the evidence chain interacted with the original blockchain, and the extended chains on top of mainchain will cover the most of auditors in different institutions. And the lightweight, which is equal to low-cost, is derived from our fine-grained hierarchical services. At last, analyses of efficiency, security, and availability have shown the complete accomplishment of our system. 展开更多
关键词 blockchain covert channel data auditing digital evidence
原文传递
Discovery of a Hadean xenocrystic zircon in the Cathaysia Block 被引量:1
3
作者 Youyue Lu Jingya Cao +7 位作者 Jianming Fu Lei Liu qianhong wu Xiaoyong Yang Shengxiong Yang Shunbo Cheng Xiaofei Qiu Ding He 《Science Bulletin》 SCIE EI CAS CSCD 2022年第23期2416-2419,M0004,共5页
The early history of Earth is poorly understood,due to the lack of ancient rocks formed after the formation of the newborn Earth,especiallyfor thefirst 500 million years(Hadean Eon).To our knowledge,this period is the... The early history of Earth is poorly understood,due to the lack of ancient rocks formed after the formation of the newborn Earth,especiallyfor thefirst 500 million years(Hadean Eon).To our knowledge,this period is the most geodynamically vigorous in the crustal evolution history of Earth[1],and is characterized by intense collision with meteorites and the formation of a global magma ocean(~4.41 Ga;cf.review article by Ref.[2]). 展开更多
关键词 冥古宙 华夏板块 地壳演化 岩石成因 原始地幔 新生地壳 亏损地幔 岩浆成因
原文传递
Graph Computing and Its Application in Power Grid Analysis 被引量:1
4
作者 Mike Zhou Jianfeng Yan qianhong wu 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第6期1550-1557,共8页
Approaches to apply graph computing to power grid analysis are systematically explained using real-world application examples.Through exploring the nature of the power grid and the characteristics of power grid analys... Approaches to apply graph computing to power grid analysis are systematically explained using real-world application examples.Through exploring the nature of the power grid and the characteristics of power grid analysis,the guidelines for selecting appropriate graph computing techniques for the application to power grid analysis are outlined.A custom graph model for representing the power grid for the analysis and simulation purpose and an in-memory computing(IMC)based graph-centric approach with a shared-everything architecture are introduced.Graph algorithms,including network topology processing and subgraph processing,and graph computing application scenarios,including in-memory computing,contingency analysis,and Common Information Model(CIM)model merge,are presented. 展开更多
关键词 CIM model merge contingency analysis Graph computing in-memory computing network topology processing power grid analysis subgraph processing
原文传递
tsrCert:Traceable Self-Randomization Certificate and Its Application to Blockchain Supervision 被引量:1
5
作者 Yan Zhu Haibin Zheng +6 位作者 Bo Qin Wanting Fu Zhenwei Guo Yujue Wang qianhong wu Bingyu Li Xuan Ding 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第6期1128-1147,共20页
Traditional public key infrastructure(PKI)only provides authentication for network communication,and the standard X.509 certificate used in this architecture reveals the user’s identity.This lack of privacy protectio... Traditional public key infrastructure(PKI)only provides authentication for network communication,and the standard X.509 certificate used in this architecture reveals the user’s identity.This lack of privacy protection no longer satisfies the increasing demands for personal privacy.Though an optimized anonymous PKI certificate realizes anonymity,it has the potential to be abused due to the lack of identity tracking.Therefore,maintaining a balance between user anonymity and traceability has become an increasing requirement for current PKI.This paper introduces a novel traceable self-randomization certificate authentication scheme based on PKI architecture that achieves both anonymity and traceability.We propose a traceable self-randomization certificate authentication scheme based on the short randomizable signature.Specifically,certificate users can randomize the initial certificate and public key into multiple anonymous certificates and public keys by themselves under the premise of traceability,which possesses lower computational complexity and fewer interactive operations.Users can exhibit different attributes of themselves in different scenarios,randomizing the attributes that do not necessarily need to be displayed.Through security and performance analysis,we demonstrate the suitability of the improved PKI architecture for practical applications.Additionally,we provide an application of the proposed scheme to the permissioned blockchain for supervision. 展开更多
关键词 public key infrastructure traceable self-randomization certificate randomizable signature anonymity and traceability blockchain supervision
原文传递
Revocable Hierarchical Identity-Based Broadcast Encryption
6
作者 Dawei Li Jianwei Liu +2 位作者 Zongyang Zhang qianhong wu Weiran Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期539-549,共11页
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of us... Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption (RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguishability is defined against the selectively Bounded Revocable Identity-Vector-Set and Chosen-Plaintext Attack (IND-sBRIVS-CPA). An IND-sBRIVS-CPA secure RHIBBE scheme is constructed with efficient revocation on prime-order bilinear groups. The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption. 展开更多
关键词 Revocable Hierarchical Identity-Based Broadcast Encryption (RHIBBE) REVOCATION provable security
原文传递
Flexible radio-frequency micro electro-mechanical switch towards the applications of satellite communications
7
作者 Yingli Shi Chao Zhou +7 位作者 Zibo Cao Yurong He Jingwen Guo Chunxin Li qianhong wu Kui Liang Yanzhao Li Yuan Lin 《npj Flexible Electronics》 SCIE 2022年第1期789-798,共10页
This paper presents a flexible radio-frequency microelectromechanical system(RF MEMS)switch integrated on cyclo-olefin polymer(COP)substrate using a modified surface MEMS processing technology,which could be used in t... This paper presents a flexible radio-frequency microelectromechanical system(RF MEMS)switch integrated on cyclo-olefin polymer(COP)substrate using a modified surface MEMS processing technology,which could be used in the 17-19 GHz frequency band of satellite communication.Through systematic simulation analysis,it is found that flexible RF MEMS switch can achieve certain bending radius by miniaturizing the electronic dimension,without degrading the RF performance.It is demonstrated that the RF characteristics of flexible RF MEMS switch with special anchor structural design,fabricated by modified surface MEMS processing,are not sensitive to bending deformation under the curvature of 0 mm^(-1),0.05 mm^(-1),0.10 mm^(-1).Furthermore,the range of bending curvature which will affect the RF characteristics is given through systematic simulation.The flexible RF MEMS switch with high process compatibility and stable RF performance is believed to be promising candidates for future microwave communications and other consumer electronics. 展开更多
关键词 CURVATURE SWITCH compatibility
原文传递
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
8
作者 Yan Zhu Bingyu Li +3 位作者 Zhenyang Ding Yang Yang qianhong wu Haibin Zheng 《High-Confidence Computing》 2023年第3期50-60,共11页
The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership... The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership in consensus in a blockchain scenario supports dynamic changes,which effectively prevents the corruption of consensus participants.Especially in cross-chain protocols,the dynamic access to different blockchains will inevitably bring about the demand for member dynamic.Most existing threshold cryptography schemes rely on redefined key shares,leading to a static set of secret sharing participants.In this paper,we propose a general approach to coupling blockchain consensus and dynamic secret sharing.The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals.Our scheme facilitates threshold cryptography membership dynamic,thus underlying support for membership dynamic of threshold cryptographybased BFT consensus schemes.We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme.After the correctness and security proof,our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety.Experimental results prove that our scheme obtains dynamic membership with negligible overhead. 展开更多
关键词 Threshold cryptography Byzantine fault tolerant Cross-chain CONSENSUS Dynamic secret sharing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部