Based on the collection of relevant literature and cases,the research and application status of on-line monitoring technology for electromagnetic environment of power transmission and transformation projects at home a...Based on the collection of relevant literature and cases,the research and application status of on-line monitoring technology for electromagnetic environment of power transmission and transformation projects at home and abroad were introduced.Moreover,the problems existing in the on-line monitoring of electromagnetic environment were expounded,and the development prospect was forecasted.展开更多
The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero <em>k</em>-submatrix and theresidual vector of system of hyperpla...The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero <em>k</em>-submatrix and theresidual vector of system of hyperplane intersecting line equations is proposed. Based on certain projective transformations in projective space, a verifiable (<em>t</em>, <em>n</em>)-threshold secret sharing scheme is designed by using the structure of solutions of linear equations and the difficulty of solving discrete logarithm problems. The results show that this scheme can verify the correctness of the subkey provided by each participant before the reconstruction of the master key, and can effectively identify the fraudster. The fraudster can only cheat by guessing and the probability of success is only 1/<em>p</em>. The design of the scheme is exquisite and the calculation complexity is small. Each participant only needs to hold a subkey, which is convenient for management and use. The analysis shows that the scheme in this paper meets the security requirements and rules of secret sharing, and it is a computationally secure and effective scheme with good practical value.展开更多
Relying on the management system for agricultural sci-tech achievement transformation funding project in Zhejiang Province, on the basis of current situations and demand of agricultural sci-tech achievement transforma...Relying on the management system for agricultural sci-tech achievement transformation funding project in Zhejiang Province, on the basis of current situations and demand of agricultural sci-tech achievement transformation funding project management system, we present a B/S-structured and J2EE platform-based system which adopts MVC mode and integrates mainstream open-source frame technologies such as Spring, Struts2, ExtJs, TopLink and FreeMarker, etc. Practice has shown that this system provides an original model for management of sci-tech project application, and various projects can be expanded on this model. With the aid of this system, sci-tech project management personnel can be relieved from trivial manual works, so as to increase working efficiency and improve management level of sci-tech project management.展开更多
基金Supported by the Open Project of Jiangsu Key Laboratory of Environmental Engineering(ZX2017005)
文摘Based on the collection of relevant literature and cases,the research and application status of on-line monitoring technology for electromagnetic environment of power transmission and transformation projects at home and abroad were introduced.Moreover,the problems existing in the on-line monitoring of electromagnetic environment were expounded,and the development prospect was forecasted.
文摘The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero <em>k</em>-submatrix and theresidual vector of system of hyperplane intersecting line equations is proposed. Based on certain projective transformations in projective space, a verifiable (<em>t</em>, <em>n</em>)-threshold secret sharing scheme is designed by using the structure of solutions of linear equations and the difficulty of solving discrete logarithm problems. The results show that this scheme can verify the correctness of the subkey provided by each participant before the reconstruction of the master key, and can effectively identify the fraudster. The fraudster can only cheat by guessing and the probability of success is only 1/<em>p</em>. The design of the scheme is exquisite and the calculation complexity is small. Each participant only needs to hold a subkey, which is convenient for management and use. The analysis shows that the scheme in this paper meets the security requirements and rules of secret sharing, and it is a computationally secure and effective scheme with good practical value.
基金Supported by Scientific and Technological Planning Project of Zhejiang Province (2008D30001)
文摘Relying on the management system for agricultural sci-tech achievement transformation funding project in Zhejiang Province, on the basis of current situations and demand of agricultural sci-tech achievement transformation funding project management system, we present a B/S-structured and J2EE platform-based system which adopts MVC mode and integrates mainstream open-source frame technologies such as Spring, Struts2, ExtJs, TopLink and FreeMarker, etc. Practice has shown that this system provides an original model for management of sci-tech project application, and various projects can be expanded on this model. With the aid of this system, sci-tech project management personnel can be relieved from trivial manual works, so as to increase working efficiency and improve management level of sci-tech project management.