Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
666 result(s) for "Cai, Shuo"
Sort by:
لاو تسي
يجكي الكتاب عندما أصيب الحكيم الصيني لاو تسي بالإحباط من الجو السياسي المسيطر في ذلك الحين، فحزم كتبه على ظهر ثور واتجه غربا نحو البراري حيث انفرد يكتب بحرية ما يجول في ضميره من حكمة مبنية على فلسفة \"الداو\" التي تعني \"السبيل\" وهدفها قيادة الإنسان نحو السلام والطمأنينة وتعليم الحكام كيف يسوسون رعيتهم وإعادة الحضارة إلى أحضان الطبيعة واليوم، فإن حكمة لاو تسي تعتبر كنسمة باردة في صيف السياسة الحار جداً. إن حكمة وفلسفة لاو تسي لا تزال منذ 500 عاما كشجرة خضراء باسقة يتفيأها الإنسان لينعم براحة النفس والذهن.
Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on. Over the past decade or so, logic locking has been developed as an important method to prevent or mitigate the above security issues in ICs throughout their lifecycles. However, most published logic locking schemes are vulnerable to the SAT attack and its variants. Existing SAT-resilient locking schemes always entail a trade-off between security and effectiveness and incur significant hardware overhead. In this paper, we propose a new replacement-based key-controlled circuit (called RKC), the application of which changes the underlying framework of traditional logic locking designs, making the SAT attack and its variants infeasible in the framework. To achieve stronger functional and structural obfuscation and to validate the extensibility of the proposed method within the modified logic-locking design framework, we develop a new multi-input key-controlled circuit (called MKC) via vertical extension, also based on replacement applied to the locking design. In addition, we expand the two proposed circuits horizontally by varying the design parameter m, yielding four logic-locking design circuits. Relevant experiments performed on six selected benchmark circuits from ISCAS’85 and MCNC benchmarks show that the proposed method demonstrates superior/less hardware overhead compared to four recently published locking methods, i.e., GateLock, SKG-Lock, SKG-Lock+, and CAS-Lock.
تشوانغ تسي
فيلسوف ملهم وأديب متنور طرح فكرة عدم مقدرى بني البشر على تحقيق السعادة الحقيقية والحرية في الحياة دون التبصر في \"سبيل الحياة-الداو\" ورغم عرض الإمبراطور على هذا الحكيم مركز رئيس للوزراء ولكنه رفض ذلك لإيمانه بضرورة الابتعاد عن الأنانية في جميع أشكالها أكانت شهرة أو جاهاً أو مركزا مهما وإن حكمة تشوانغ تسي تدعو إلى السلام والتحرر الروحي والتي يمكن تحقيقها عبر معرفة مقدرة وحدود الفرد وتناغمها مع الكون حوله.
A Survey on True Random Number Generators Based on Chaos
With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. Random numbers are used in many cryptographic protocols, key management, identity authentication, image encryption, and so on. True random numbers (TRNs) have better randomness and unpredictability in encryption and key than pseudorandom numbers (PRNs). Chaos has good features of sensitive dependence on initial conditions, randomness, periodicity, and reproduction. These demands coincide with the rise of TRNs generating approaches in chaos field. This survey paper intends to provide a systematic review of true random number generators (TRNGs) based on chaos. Firstly, the two kinds of popular chaotic systems for generating TRNs based on chaos, including continuous time chaotic system and discrete time chaotic system are introduced. The main approaches and challenges are exposed to help researchers decide which are the ones that best suit their needs and goals. Then, existing methods are reviewed, highlighting their contributions and their significance in the field. We also devote a part of the paper to review TRNGs based on current-mode chaos for this problem. Finally, quantitative results are given for the described methods in which they were evaluated, following up with a discussion of the results. At last, we point out a set of promising future works and draw our own conclusions about the state of the art of TRNGs based on chaos.
Health literacy in patients with gout: A latent profile analysis
Understanding the health literacy status of patients with gout diagnosis is essential for improving the health of this population. Our study aimed to investigate the latent profiles of health literacy in patients with gout and to analyze differences in characteristics across potential profiles. This was a cross-sectional study. Eligible participants attended the Shandong Gout Medical Center, from March 2023 to May 2023 and self-reported gout diagnosis. We used the Health Literacy Scale for Patients with Gout designed and validated by our team. The scale had good reliability and validity among patients with gout. 243 patients completed the Demographic Information Questionnaire and the Health Literacy Scale for Patients with Gout. We used latent profile analysis to identify the latent profiles of gout patients' health literacy. We used Chi-square tests with Bonferroni correction to analyze differences in demographics and illness characteristics across identified profiles. Three profiles of patients with gout emerged (prevalence): the low literacy-low critical group (21.81%), the moderate literacy group (42.79%), and the high literacy-stable group (35.39%). The three groups differed in age, education level, monthly income, disease duration, and place of residence (P<0.01). The health literacy of patients with gout was heterogeneous. Healthcare professionals should adopt targeted interventions based on the characteristics of each latent health literacy profile to improve the health literacy level of patients with gout.
A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application
In comparison with dissipative chaos, conservative chaos is better equipped to handle the risks associated with the reconstruction of phase space due to the absence of attractors. This paper proposes a novel five-dimensional (5D) conservative memristive hyperchaotic system (CMHS), by incorporating memristors into a four-dimensional (4D) conservative chaotic system (CCS). We conducted a comprehensive analysis, using Lyapunov exponent diagrams, bifurcation diagrams, phase portraits, equilibrium points, and spectral entropy maps to thoroughly verify the system’s chaotic and conservative properties. The system exhibited characteristics such as hyperchaos and multi-stability over an ultra-wide range of parameters and initial values, accompanied by transient quasi-periodic phenomena. Subsequently, the pseudorandom sequences generated by the new system were tested and demonstrated excellent performance, passing all the tests set by the National Institute of Standards and Technology (NIST). In the final stage of the research, an image-encryption application based on the 5D CMHS was proposed. Through security analysis, the feasibility and security of the image-encryption algorithm were confirmed.
Treatment of Ammonium-Nitrogen–Contaminated Groundwater by Tidal Flow Constructed Wetlands Using Different Substrates: Evaluation of Performance and Microbial Nitrogen Removal Pathways
As a significant oxygen intensified configuration, tidal flow constructed wetlands (TFCWs) are effective for the treatment of water and wastewater rich in NH4+-N. The TFCWs filled with four substrates (gravel, granular active carbon, volcanic rock, and zeolite) were used to treat synthetic groundwater containing NH4+-N. The results showed that higher ammonium removal was achieved in TFCW filled with zeolite (89.20 ± 3.09%) and granular active carbon (53.70 ± 8.91%). The highest accumulation of nitrate was obtained in TFCW filled with volcanic rock, whereas the lowest was obtained in TFCW filled with granular active carbon. The quantitative polymerase chain reactions (qPCR) and high-throughput sequencing of bacterial 16S rRNA pyrosequencing were applied to reveal the involved microbial N removal pathways. The abundance of amoA gene of Nitrospira and anammox gene of unclassified Planctomycetaceae suggested anammox could play a key role in NH4+-N removal in the absence of organic carbon in the simulated groundwater. Besides, the results of adsorption isotherms showed that substrate adsorption coupled with anaerobic ammonium oxidation (anammox) were the major reason for the robust NH4+-N removal performance in TFCW filled with zeolite.
Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization, and Secure Communication Application
By introducing a flux-controlled memristor with quadratic nonlinearity into a 4D hyperchaotic system as a feedback term, a novel 5D hyperchaotic four-wing memristive system (HFWMS) is derived in this paper. The HFWMS with multiline equilibrium and three positive Lyapunov exponents presented very complex dynamic characteristics, such as the existence of chaos, hyperchaos, limit cycles, and periods. The dynamic characteristics of the HFWMS are analyzed by using equilibria, phase portraits, poincare map, Lyapunov exponential spectrum, bifurcation diagram, and spectral entropy. Of particular interest is that this novel system can generate two-wing hyperchaotic attractor under appropriate parameters and initial conditions. Moreover, the FPGA realization of the novel 5D HFWMS is reported, which prove that the system has complex dynamic behavior. Finally, synchronization of the 5D hyperchaotic system with different structures by active control and a secure signal masking application of the HFWMS are implemented based on numerical simulations and FPGA. This research demonstrates that the hardware-based design of the 5D HFWMS can be applied to various chaos-based embedded system applications including random number generation, cryptography, and secure communication.
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
In recent years, the research of chaos theory has developed from simple cognition and analysis to practical engineering application. In particular, hyperchaotic systems with more complex and changeable chaotic characteristics are more sensitive and unpredictable, so they are widely used in more fields. In this paper, two important engineering applications based on hyperchaos pseudorandom number generator (PRNG) and image encryption are studied. Firstly, the coupling 6D memristive hyperchaotic system and a 2D SF-SIMM discrete hyperchaotic mapping are used as the double entropy source structure. The double entropy source structure can realize a new PRNG that meets the security requirements, which can pass the NIST statistical test when the XOR postprocessing method is used. Secondly, based on the double entropy source structure, a new image encryption algorithm is proposed. The algorithm uses the diffusion-scrambling-diffusion encryption scheme to realize the conversion from the original plaintext image to the ciphertext image. Finally, we analyze the security of the proposed PRNG and image encryption mechanism, respectively. The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.
Chaos-Based Application of a Novel Multistable 5D Memristive Hyperchaotic System with Coexisting Multiple Attractors
Novel memristive hyperchaotic system designs and their engineering applications have received considerable critical attention. In this paper, a novel multistable 5D memristive hyperchaotic system and its application are introduced. The interesting aspect of this chaotic system is that it has different types of coexisting attractors, chaos, hyperchaos, periods, and limit cycles. First, a novel 5D memristive hyperchaotic system is proposed by introducing a flux-controlled memristor with quadratic nonlinearity into an existing 4D four-wing chaotic system as a feedback term. Then, the phase portraits, Lyapunov exponential spectrum, bifurcation diagram, and spectral entropy are used to analyze the basic dynamics of the 5D memristive hyperchaotic system. For a specific set of parameters, we find an unusual metastability, which shows the transition from chaotic to periodic (period-2 and period-3) dynamics. Moreover, its circuit implementation is also proposed. By using the chaoticity of the novel hyperchaotic system, we have developed a random number generator (RNG) for practical image encryption applications. Furthermore, security analyses are carried out with the RNG and image encryption designs.