Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
666
result(s) for
"Cai, Shuo"
Sort by:
لاو تسي
by
Cai, Xiqin, 1943- مؤلف
,
Cai, Xiqin,. 1943-. Laozi shuo
in
Laozi.
,
الفلاسفة الصينيون تراجم
,
الفلسفة الصينية
2008
يجكي الكتاب عندما أصيب الحكيم الصيني لاو تسي بالإحباط من الجو السياسي المسيطر في ذلك الحين، فحزم كتبه على ظهر ثور واتجه غربا نحو البراري حيث انفرد يكتب بحرية ما يجول في ضميره من حكمة مبنية على فلسفة \"الداو\" التي تعني \"السبيل\" وهدفها قيادة الإنسان نحو السلام والطمأنينة وتعليم الحكام كيف يسوسون رعيتهم وإعادة الحضارة إلى أحضان الطبيعة واليوم، فإن حكمة لاو تسي تعتبر كنسمة باردة في صيف السياسة الحار جداً. إن حكمة وفلسفة لاو تسي لا تزال منذ 500 عاما كشجرة خضراء باسقة يتفيأها الإنسان لينعم براحة النفس والذهن.
Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants
2026
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on. Over the past decade or so, logic locking has been developed as an important method to prevent or mitigate the above security issues in ICs throughout their lifecycles. However, most published logic locking schemes are vulnerable to the SAT attack and its variants. Existing SAT-resilient locking schemes always entail a trade-off between security and effectiveness and incur significant hardware overhead. In this paper, we propose a new replacement-based key-controlled circuit (called RKC), the application of which changes the underlying framework of traditional logic locking designs, making the SAT attack and its variants infeasible in the framework. To achieve stronger functional and structural obfuscation and to validate the extensibility of the proposed method within the modified logic-locking design framework, we develop a new multi-input key-controlled circuit (called MKC) via vertical extension, also based on replacement applied to the locking design. In addition, we expand the two proposed circuits horizontally by varying the design parameter m, yielding four logic-locking design circuits. Relevant experiments performed on six selected benchmark circuits from ISCAS’85 and MCNC benchmarks show that the proposed method demonstrates superior/less hardware overhead compared to four recently published locking methods, i.e., GateLock, SKG-Lock, SKG-Lock+, and CAS-Lock.
Journal Article
تشوانغ تسي
by
Cai, Xiqin, 1943- مؤلف
,
Cai, Xiqin,. 1943-. Zhuangzi shuo
in
Zhuangzi.
,
الفلاسفة الصينيون تراجم
,
الفلسفة الصينية
2008
فيلسوف ملهم وأديب متنور طرح فكرة عدم مقدرى بني البشر على تحقيق السعادة الحقيقية والحرية في الحياة دون التبصر في \"سبيل الحياة-الداو\" ورغم عرض الإمبراطور على هذا الحكيم مركز رئيس للوزراء ولكنه رفض ذلك لإيمانه بضرورة الابتعاد عن الأنانية في جميع أشكالها أكانت شهرة أو جاهاً أو مركزا مهما وإن حكمة تشوانغ تسي تدعو إلى السلام والتحرر الروحي والتي يمكن تحقيقها عبر معرفة مقدرة وحدود الفرد وتناغمها مع الكون حوله.
A Survey on True Random Number Generators Based on Chaos
2019
With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. Random numbers are used in many cryptographic protocols, key management, identity authentication, image encryption, and so on. True random numbers (TRNs) have better randomness and unpredictability in encryption and key than pseudorandom numbers (PRNs). Chaos has good features of sensitive dependence on initial conditions, randomness, periodicity, and reproduction. These demands coincide with the rise of TRNs generating approaches in chaos field. This survey paper intends to provide a systematic review of true random number generators (TRNGs) based on chaos. Firstly, the two kinds of popular chaotic systems for generating TRNs based on chaos, including continuous time chaotic system and discrete time chaotic system are introduced. The main approaches and challenges are exposed to help researchers decide which are the ones that best suit their needs and goals. Then, existing methods are reviewed, highlighting their contributions and their significance in the field. We also devote a part of the paper to review TRNGs based on current-mode chaos for this problem. Finally, quantitative results are given for the described methods in which they were evaluated, following up with a discussion of the results. At last, we point out a set of promising future works and draw our own conclusions about the state of the art of TRNGs based on chaos.
Journal Article
Health literacy in patients with gout: A latent profile analysis
2024
Understanding the health literacy status of patients with gout diagnosis is essential for improving the health of this population. Our study aimed to investigate the latent profiles of health literacy in patients with gout and to analyze differences in characteristics across potential profiles.
This was a cross-sectional study. Eligible participants attended the Shandong Gout Medical Center, from March 2023 to May 2023 and self-reported gout diagnosis. We used the Health Literacy Scale for Patients with Gout designed and validated by our team. The scale had good reliability and validity among patients with gout. 243 patients completed the Demographic Information Questionnaire and the Health Literacy Scale for Patients with Gout. We used latent profile analysis to identify the latent profiles of gout patients' health literacy. We used Chi-square tests with Bonferroni correction to analyze differences in demographics and illness characteristics across identified profiles.
Three profiles of patients with gout emerged (prevalence): the low literacy-low critical group (21.81%), the moderate literacy group (42.79%), and the high literacy-stable group (35.39%). The three groups differed in age, education level, monthly income, disease duration, and place of residence (P<0.01).
The health literacy of patients with gout was heterogeneous. Healthcare professionals should adopt targeted interventions based on the characteristics of each latent health literacy profile to improve the health literacy level of patients with gout.
Journal Article
A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application
2025
In comparison with dissipative chaos, conservative chaos is better equipped to handle the risks associated with the reconstruction of phase space due to the absence of attractors. This paper proposes a novel five-dimensional (5D) conservative memristive hyperchaotic system (CMHS), by incorporating memristors into a four-dimensional (4D) conservative chaotic system (CCS). We conducted a comprehensive analysis, using Lyapunov exponent diagrams, bifurcation diagrams, phase portraits, equilibrium points, and spectral entropy maps to thoroughly verify the system’s chaotic and conservative properties. The system exhibited characteristics such as hyperchaos and multi-stability over an ultra-wide range of parameters and initial values, accompanied by transient quasi-periodic phenomena. Subsequently, the pseudorandom sequences generated by the new system were tested and demonstrated excellent performance, passing all the tests set by the National Institute of Standards and Technology (NIST). In the final stage of the research, an image-encryption application based on the 5D CMHS was proposed. Through security analysis, the feasibility and security of the image-encryption algorithm were confirmed.
Journal Article
Treatment of Ammonium-Nitrogen–Contaminated Groundwater by Tidal Flow Constructed Wetlands Using Different Substrates: Evaluation of Performance and Microbial Nitrogen Removal Pathways
2022
As a significant oxygen intensified configuration, tidal flow constructed wetlands (TFCWs) are effective for the treatment of water and wastewater rich in NH4+-N. The TFCWs filled with four substrates (gravel, granular active carbon, volcanic rock, and zeolite) were used to treat synthetic groundwater containing NH4+-N. The results showed that higher ammonium removal was achieved in TFCW filled with zeolite (89.20 ± 3.09%) and granular active carbon (53.70 ± 8.91%). The highest accumulation of nitrate was obtained in TFCW filled with volcanic rock, whereas the lowest was obtained in TFCW filled with granular active carbon. The quantitative polymerase chain reactions (qPCR) and high-throughput sequencing of bacterial 16S rRNA pyrosequencing were applied to reveal the involved microbial N removal pathways. The abundance of amoA gene of Nitrospira and anammox gene of unclassified Planctomycetaceae suggested anammox could play a key role in NH4+-N removal in the absence of organic carbon in the simulated groundwater. Besides, the results of adsorption isotherms showed that substrate adsorption coupled with anaerobic ammonium oxidation (anammox) were the major reason for the robust NH4+-N removal performance in TFCW filled with zeolite.
Journal Article
Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization, and Secure Communication Application
2019
By introducing a flux-controlled memristor with quadratic nonlinearity into a 4D hyperchaotic system as a feedback term, a novel 5D hyperchaotic four-wing memristive system (HFWMS) is derived in this paper. The HFWMS with multiline equilibrium and three positive Lyapunov exponents presented very complex dynamic characteristics, such as the existence of chaos, hyperchaos, limit cycles, and periods. The dynamic characteristics of the HFWMS are analyzed by using equilibria, phase portraits, poincare map, Lyapunov exponential spectrum, bifurcation diagram, and spectral entropy. Of particular interest is that this novel system can generate two-wing hyperchaotic attractor under appropriate parameters and initial conditions. Moreover, the FPGA realization of the novel 5D HFWMS is reported, which prove that the system has complex dynamic behavior. Finally, synchronization of the 5D hyperchaotic system with different structures by active control and a secure signal masking application of the HFWMS are implemented based on numerical simulations and FPGA. This research demonstrates that the hardware-based design of the 5D HFWMS can be applied to various chaos-based embedded system applications including random number generation, cryptography, and secure communication.
Journal Article
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
2021
In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator (PRNG) and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system and a 2D SF-SIMM discrete hyperchaotic mapping are used as the double entropy source structure. The double entropy source structure can realize a new PRNG that meets the security requirements, which can pass the NIST statistical test when the XOR postprocessing method is used. Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. Finally, we analyze the security of the proposed PRNG and image encryption mechanism, respectively. The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.
Journal Article
Chaos-Based Application of a Novel Multistable 5D Memristive Hyperchaotic System with Coexisting Multiple Attractors
2020
Novel memristive hyperchaotic system designs and their engineering applications have received considerable critical attention. In this paper, a novel multistable 5D memristive hyperchaotic system and its application are introduced. The interesting aspect of this chaotic system is that it has different types of coexisting attractors, chaos, hyperchaos, periods, and limit cycles. First, a novel 5D memristive hyperchaotic system is proposed by introducing a flux-controlled memristor with quadratic nonlinearity into an existing 4D four-wing chaotic system as a feedback term. Then, the phase portraits, Lyapunov exponential spectrum, bifurcation diagram, and spectral entropy are used to analyze the basic dynamics of the 5D memristive hyperchaotic system. For a specific set of parameters, we find an unusual metastability, which shows the transition from chaotic to periodic (period-2 and period-3) dynamics. Moreover, its circuit implementation is also proposed. By using the chaoticity of the novel hyperchaotic system, we have developed a random number generator (RNG) for practical image encryption applications. Furthermore, security analyses are carried out with the RNG and image encryption designs.
Journal Article