Green building is a manifestation of the response to the national“dual carbon”strategy.With the large-scale promotion of green buildings,the country has successively issued multiple evaluation standards for green bu...Green building is a manifestation of the response to the national“dual carbon”strategy.With the large-scale promotion of green buildings,the country has successively issued multiple evaluation standards for green buildings.Schools are places for preaching,teaching,and solving doubts,and the campus environment plays an important role in improving students’learning efficiency and promoting their physical and mental health.This article is based on the“Green Building Evaluation Standards”GB/T 50378-2019,analyzing and exploring the integration and application of key technologies in green schools,providing reference for green building designers.展开更多
Identifying the factors influencing farmers’adoption of low-carbon technologies(FA)and understanding their impacts are essential for shaping effective agricultural policies amied at emission reduction and carbon sequ...Identifying the factors influencing farmers’adoption of low-carbon technologies(FA)and understanding their impacts are essential for shaping effective agricultural policies amied at emission reduction and carbon sequestration in China.This study employs a meta-analysis of 122 empirical studies,delves into 23 driving factors affecting FA and addresses the inconsistencies present in the existing literature.We systematically examine the effect size,source of heterogeneity,and time-accumulation effect of the driving factors on FA.We find that significant heterogeneity in the factors influencing FA,except for farming experience,sources of heterogeneity from the survey zone,methodology model,technological attributes,report source,financial support,and the sampling year.Additionally,age,farming experience,and adoption cost negatively correlate with FA.In contrast,educational level,health status,technical training,economic and welfare cognition,land contract,soil quality,terrain,information accessibility,demonstration,government promotion,government regulation,government support,agricultural cooperatives member,peer effect,and agricultural income ratio demonstrate a positive correlation.Especially,demonstration and age show a particularly strong correlation.Finally,the effect of demonstration,age,economic and welfare cognition,farming experience,land contract,soil quality,information accessibility,government promotion,and support,as well as agricultural cooperative membership and peer effects on FA,are generally stable but exhibit varying degrees of attenuation over time.The effect of village cadre,family income,farm scale,gender,health status,technical training,and off-farm work on FA show notable temporal shifts and maintain a weak correlation with FA.This study contributes to shaping China’s current low-carbon agriculture policies across various regions.It encourages policymakers to comprehensively consider the stability of key factors,other potential factors,technological attributes,rural socio-economic context,and their interrelations.展开更多
In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications su...In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications such as forecast of marine environment,prevention and mitigation of disaster,exploitation of marine resources,marine environmental protection,and management of transportation safety.In this paper,we summarise the composition,development courses,and present operational status of three systems of operational in-situ marine monitoring,namely coastal marine automated network station,ocean data buoy and voluntary observing ship measuring and reporting system.Additionally,we discuss the technical development in these in-situ systems and achievements in the key generic technologies along with future development trends.展开更多
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new...Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.展开更多
On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In ...On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In view of the inherent inadequacy of carbon emission reduction technologies in Chinese food system,starting from carbon labeling technologies and ESG system of the food industry,the unsoundness of the carbon emission reduction evaluation system and the high cost of related technology promotion,countermeasures such as strengthening top-level design,encouraging and supporting the development of new carbon emission reduction technologies,and improving carbon emission reduction technology subsidies were proposed by drawing on domestic and international experiences.展开更多
Carbon neutrality(or climate neutrality)has been a global consensus,and international experience exchange is essential.Given the differences in the degree of social development,resource endowment and technological lev...Carbon neutrality(or climate neutrality)has been a global consensus,and international experience exchange is essential.Given the differences in the degree of social development,resource endowment and technological level,each country should build a carbon-neutral plan based on its national conditions.Compared with other major developed countries(e.g.,Germany,the United States and Japan),China's carbon neutrality has much bigger challenges,including a heavy and time-pressured carbon reduction task and the current energy structure that is over-dependent on fossil fuels.Here we provide a comprehensive review of the status and prospects of the key technologies for low-carbon,near-zero carbon,and negative carbon emissions.Technological innovations associated with coal,oil-gas and hydrogen industries and their future potential in reducing carbon emissions are particularly explained and assessed.Based on integrated analysis of international experience from the world's major developed countries,in-depth knowledge of the current and future technologies,and China's energy and ecological resources potential,five lessons for the implementation of China's carbon neutrality are proposed:(1)transformation of energy production pattern from a coal-dominated pattern to a diversified renewable energy pattern;(2)renewable power-to-X and large-scale underground energy storage;(3)integration of green hydrogen production,storage,transport and utilization;(4)construction of clean energy systems based on smart sector coupling(ENSYSCO);(5)improvement of ecosystem carbon sinks both in nationwide forest land and potential desert in Northwest China.This paper provides an international perspective for a better understanding of the challenges and opportunities of carbon neutrality in China,and can serve as a theoretical foundation for medium-long term carbon neutral policy formulation.展开更多
This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT w...This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT was the Center for Display Research(CDR)which was started in 1995.Thus display research has a long history at HKUST.展开更多
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env...Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.展开更多
The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its ch...The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its characteristics.Based on the perspective of participants,this paper summarizes the influencing factors of key core technology breakthroughs in enterprises:internal and external enterprises,universities and scientific research institutions,and government.This paper expands the relevant research on key core technology breakthroughs and provides inspiration for enterprises to carry out key core technology research and breakthrough practices.展开更多
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi...Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
The coupling effect of heat absorption and release exists in the thermal decomposition of a few chemical materials.However,the impact of the above coupling on thermal hazard assessment is not considered in the literat...The coupling effect of heat absorption and release exists in the thermal decomposition of a few chemical materials.However,the impact of the above coupling on thermal hazard assessment is not considered in the literature studies.In this work,nitroguanidine(NQ)and 1,3,5-trinitro-1,3,5-triazine(RDX)are selected as representative materials to explore the influence of the coupling effect on the thermal hazard assessment of chemical materials.The linear heating experiments of NQ and RDX are carried out by a microcalorimeter and synchronous thermal analyser.The thermal decomposition curves are decoupled by advanced thermokinetics software.The thermal decomposition and kinetic parameters before and after decoupling are calculated.The results of TG experiment show that both NQ and RDX began to lose mass during the endothermic stage.The endothermic melting and exothermic decomposition of NQ and RDX are coupled within this stage.The coupling effect has different degrees of influence on its initial decomposition temperature and safety parameters.Compared with the parameters in the coupling state,the initial decomposition temperature and adiabatic induction period after decoupling decrease.The self-accelerating decomposition temperature increases,and internal thermal runaway time decreases.In the thermal hazard assessment of chemical materials with coupling effects,the calculated parameters after decoupling should be taken as an important safety index。展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T...Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal.展开更多
In response to global carbon neutrality targets,there is an urgent need for large-scale,clean hydrogen production technologies to supplant fossil fuels and underpin the establishment of a‘hydrogen economy’.The prosp...In response to global carbon neutrality targets,there is an urgent need for large-scale,clean hydrogen production technologies to supplant fossil fuels and underpin the establishment of a‘hydrogen economy’.The prospect of large-scale on-site green hydrolysis of Mg-based materials for hydrogen production has attracted wide attention.Aiming at the problems of easy formation of inert oxide layer on its surface and the production of Mg(OH)_(2) to hinder the hydrolysis process,it is urgent to explore efficient,low-cost and green modification strategies.In this work,the green modification strategy for hydrolyzing hydrogen production of Mg-based materials was summarized,and the fast initial kinetics and high hydrogen production rate could be achieved by adjusting hydrolysis medium conditions and modifying Mg-based material.The significance of hydrolytic hydrogen production technology and device development for the realization of Mg-based hydrolytic hydrogen production was evaluated.Meanwhile,this work looks forward to the future direction of hydrogen production modification by hydrolysis of Mg-based alloy,and gradually optimizes the hydrolysis performance of industrial multi-component waste Mg alloy under the premise of green hydrogen production,and proposes the goal of efficient modification of waste Mg alloy,high-quality utilization of seawater,and low-cost and controllable hydrogen production process.展开更多
文摘Green building is a manifestation of the response to the national“dual carbon”strategy.With the large-scale promotion of green buildings,the country has successively issued multiple evaluation standards for green buildings.Schools are places for preaching,teaching,and solving doubts,and the campus environment plays an important role in improving students’learning efficiency and promoting their physical and mental health.This article is based on the“Green Building Evaluation Standards”GB/T 50378-2019,analyzing and exploring the integration and application of key technologies in green schools,providing reference for green building designers.
基金supported by the National Social Science Fund of China(19BGL152)the Sichuan Technology Planning Project,China(2022JDTD0022)the Provincial College Student Innovation and Entrepreneurship Training Program of Sichuan Province,China(S202310626018).
文摘Identifying the factors influencing farmers’adoption of low-carbon technologies(FA)and understanding their impacts are essential for shaping effective agricultural policies amied at emission reduction and carbon sequestration in China.This study employs a meta-analysis of 122 empirical studies,delves into 23 driving factors affecting FA and addresses the inconsistencies present in the existing literature.We systematically examine the effect size,source of heterogeneity,and time-accumulation effect of the driving factors on FA.We find that significant heterogeneity in the factors influencing FA,except for farming experience,sources of heterogeneity from the survey zone,methodology model,technological attributes,report source,financial support,and the sampling year.Additionally,age,farming experience,and adoption cost negatively correlate with FA.In contrast,educational level,health status,technical training,economic and welfare cognition,land contract,soil quality,terrain,information accessibility,demonstration,government promotion,government regulation,government support,agricultural cooperatives member,peer effect,and agricultural income ratio demonstrate a positive correlation.Especially,demonstration and age show a particularly strong correlation.Finally,the effect of demonstration,age,economic and welfare cognition,farming experience,land contract,soil quality,information accessibility,government promotion,and support,as well as agricultural cooperative membership and peer effects on FA,are generally stable but exhibit varying degrees of attenuation over time.The effect of village cadre,family income,farm scale,gender,health status,technical training,and off-farm work on FA show notable temporal shifts and maintain a weak correlation with FA.This study contributes to shaping China’s current low-carbon agriculture policies across various regions.It encourages policymakers to comprehensively consider the stability of key factors,other potential factors,technological attributes,rural socio-economic context,and their interrelations.
基金The National Key Research and Development Program of China under contract No.2022YFC3104200the Key R&D Program of Shandong Province,China under contract No.2023ZLYS01+3 种基金the Consulting and Research Project of the Chinese Academy of Engineering under contract Nos 2022-XY-21,2022-DFZD-35,2023-XBZD-09 and 2021-XBZD-13the Major Innovation Special Project of Qilu University of Technology(Shandong Academy of Sciences),Science Education Industry Integration Pilot Project under contract No.2023HYZX01Special Funds for“Mount Taishan Scholars”Construction Projectthe Special Funds of Laoshan Laboratory.
文摘In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications such as forecast of marine environment,prevention and mitigation of disaster,exploitation of marine resources,marine environmental protection,and management of transportation safety.In this paper,we summarise the composition,development courses,and present operational status of three systems of operational in-situ marine monitoring,namely coastal marine automated network station,ocean data buoy and voluntary observing ship measuring and reporting system.Additionally,we discuss the technical development in these in-situ systems and achievements in the key generic technologies along with future development trends.
基金This work was supported in part by the National Natural Science Foundation of China under Grant 62203468Young Elite Scientist Sponsorship Program by CAST under Grant 2022QNRC001+1 种基金Foundation of China State Railway Group Co.,Ltd.under Grant K2021X001Foundation of China Academy of Railway Sciences Corporation Limited under Grant 2021YJ315.
文摘Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.
基金Supported by the Fundamental Research Funds for the Central Universities(CZY23014)Major Project of the National Social Science Foundation(19ZDA085)。
文摘On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In view of the inherent inadequacy of carbon emission reduction technologies in Chinese food system,starting from carbon labeling technologies and ESG system of the food industry,the unsoundness of the carbon emission reduction evaluation system and the high cost of related technology promotion,countermeasures such as strengthening top-level design,encouraging and supporting the development of new carbon emission reduction technologies,and improving carbon emission reduction technology subsidies were proposed by drawing on domestic and international experiences.
基金supported by the Henan Institute for Chinese Development Strategy of Engineering&Technology(Grant No.2022HENZDA02)by the Science&Technology Department of Sichuan Province Project(Grant No.2021YFH0010).
文摘Carbon neutrality(or climate neutrality)has been a global consensus,and international experience exchange is essential.Given the differences in the degree of social development,resource endowment and technological level,each country should build a carbon-neutral plan based on its national conditions.Compared with other major developed countries(e.g.,Germany,the United States and Japan),China's carbon neutrality has much bigger challenges,including a heavy and time-pressured carbon reduction task and the current energy structure that is over-dependent on fossil fuels.Here we provide a comprehensive review of the status and prospects of the key technologies for low-carbon,near-zero carbon,and negative carbon emissions.Technological innovations associated with coal,oil-gas and hydrogen industries and their future potential in reducing carbon emissions are particularly explained and assessed.Based on integrated analysis of international experience from the world's major developed countries,in-depth knowledge of the current and future technologies,and China's energy and ecological resources potential,five lessons for the implementation of China's carbon neutrality are proposed:(1)transformation of energy production pattern from a coal-dominated pattern to a diversified renewable energy pattern;(2)renewable power-to-X and large-scale underground energy storage;(3)integration of green hydrogen production,storage,transport and utilization;(4)construction of clean energy systems based on smart sector coupling(ENSYSCO);(5)improvement of ecosystem carbon sinks both in nationwide forest land and potential desert in Northwest China.This paper provides an international perspective for a better understanding of the challenges and opportunities of carbon neutrality in China,and can serve as a theoretical foundation for medium-long term carbon neutral policy formulation.
文摘This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT was the Center for Display Research(CDR)which was started in 1995.Thus display research has a long history at HKUST.
基金Project supported by the Natural Science Foundation of Jilin Province of China(Grant No.20210101417JC).
文摘Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
文摘The breakthrough of key core technology is a theoretical and practical strategic issue to realize the rise of the country.This paper analyzes the concept of key core technology and its breakthrough and analyzes its characteristics.Based on the perspective of participants,this paper summarizes the influencing factors of key core technology breakthroughs in enterprises:internal and external enterprises,universities and scientific research institutions,and government.This paper expands the relevant research on key core technology breakthroughs and provides inspiration for enterprises to carry out key core technology research and breakthrough practices.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12074194,12104240,and 62101285)the Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key Research and Development Program(Grant No.BE2022071)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20192001 and BK20210582).
文摘Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金the project of the Open Research Fund Program of Science and Technology on Aerospace Chemical Power Laboratory(Grant No.STACPL320221B04)Key Laboratory of Explosion Science and Technology(Beijing Institute of Technology)The project number is ZDKT21-01.
文摘The coupling effect of heat absorption and release exists in the thermal decomposition of a few chemical materials.However,the impact of the above coupling on thermal hazard assessment is not considered in the literature studies.In this work,nitroguanidine(NQ)and 1,3,5-trinitro-1,3,5-triazine(RDX)are selected as representative materials to explore the influence of the coupling effect on the thermal hazard assessment of chemical materials.The linear heating experiments of NQ and RDX are carried out by a microcalorimeter and synchronous thermal analyser.The thermal decomposition curves are decoupled by advanced thermokinetics software.The thermal decomposition and kinetic parameters before and after decoupling are calculated.The results of TG experiment show that both NQ and RDX began to lose mass during the endothermic stage.The endothermic melting and exothermic decomposition of NQ and RDX are coupled within this stage.The coupling effect has different degrees of influence on its initial decomposition temperature and safety parameters.Compared with the parameters in the coupling state,the initial decomposition temperature and adiabatic induction period after decoupling decrease.The self-accelerating decomposition temperature increases,and internal thermal runaway time decreases.In the thermal hazard assessment of chemical materials with coupling effects,the calculated parameters after decoupling should be taken as an important safety index。
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金financially supported by the National Natural Science Foundation of China(32001728,32172248)the Taishan Industrial Experts Program+1 种基金the Guizhou High-level Innovative Talent Training Project(Qianke Cooperation Platform Talent number[2016]5662)Guizhou Science and Technology Innovation Talent Team of Ecological Characteristic Meat Products.(QKHPTRC[2020]5004)。
文摘Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal.
基金supported by Yulin Science and Technology Bureau (Grant No 2023-CXY-202)Scientific Research Program Funded by Shaanxi Provincial Education Department (Grant No 23JP008)Key Research and Development Projects of Shaanxi Province (Grant No 2024GXYBXM-213) and (Grant No 52102109)
文摘In response to global carbon neutrality targets,there is an urgent need for large-scale,clean hydrogen production technologies to supplant fossil fuels and underpin the establishment of a‘hydrogen economy’.The prospect of large-scale on-site green hydrolysis of Mg-based materials for hydrogen production has attracted wide attention.Aiming at the problems of easy formation of inert oxide layer on its surface and the production of Mg(OH)_(2) to hinder the hydrolysis process,it is urgent to explore efficient,low-cost and green modification strategies.In this work,the green modification strategy for hydrolyzing hydrogen production of Mg-based materials was summarized,and the fast initial kinetics and high hydrogen production rate could be achieved by adjusting hydrolysis medium conditions and modifying Mg-based material.The significance of hydrolytic hydrogen production technology and device development for the realization of Mg-based hydrolytic hydrogen production was evaluated.Meanwhile,this work looks forward to the future direction of hydrogen production modification by hydrolysis of Mg-based alloy,and gradually optimizes the hydrolysis performance of industrial multi-component waste Mg alloy under the premise of green hydrogen production,and proposes the goal of efficient modification of waste Mg alloy,high-quality utilization of seawater,and low-cost and controllable hydrogen production process.