135 research outputs found
Research on the Influence of Mobile Media on College Students’ Ideological and Political Education
With the rapid development of information technology, the form of mobile media has been continuously updated, and its social penetration rate is rapidly increasing. As a fashion leader, college students are keen to follow new things and show high enthusiasm and dependence on mobile media. Mobile media has been used in the continuous innovation of information technology, opening up new teaching methods in the field of education and becoming a new carrier of ideological and political education. At the same time, mobile media is also a double-edged sword, bringing many challenges to ideological and political education. It is an important research direction of ideological and political education in colleges and universities to put forward practical and feasible implementation plans to make full use of the advantages of mobile media to promote the development of ideological and political education and to guide college students to form a correct outlook on life and values
China’s Experience in Reform and Opening up for Forty Years
In December 1978, after the Third Plenary Session of the 11th Central Committee of the Party, China entered a new era of reform and opening up. It has been for forty years, and has accumulated richly in the process of exploration and development in these forty years. Faced with the new tasks and new demands put forward by the new era, China has embarked on a new journey. The construction of socialism with Chinese characteristics needs to be further promoted. Reform and opening up is still the source of vitality for the development of socialism with Chinese characteristics in the new era. We should profoundly summarize and give full play to the experience of the fortieth anniversary of reform and opening up, hold high the great banner of socialism with Chinese characteristics, implement new development concepts, and constantly promote the development of the cause of reform and opening up
Research on the Influencing Factors and Safeguard Mechanism of Farmers’ Income Growth in the New Era
As an important indicator to measure the degree of general social affluence and economic development in a country or region, peasant income has become an important focus of rural development under the new era rural revitalization strategy. The issue of farmers’ income is the core and key to the issue of “agriculture, rural areas and farmers”. Under the rural revitalization strategy, the traditional rural areas have undergone tremendous changes, and the wages of farmers’ wages, operating income, and transfer income are insufficient. Farmers’ continued income growth is facing enormous challenges. In the face of difficulties, the 19th National Congress of the Communist Party of China proposed that “the second round of land contracting will be extended for another 30 years”. It can be seen that the party and the state have profoundly recognized the importance of peasant income for increasing farmers’ income
Learning a Dilated Residual Network for SAR Image Despeckling
In this paper, to break the limit of the traditional linear models for
synthetic aperture radar (SAR) image despeckling, we propose a novel deep
learning approach by learning a non-linear end-to-end mapping between the noisy
and clean SAR images with a dilated residual network (SAR-DRN). SAR-DRN is
based on dilated convolutions, which can both enlarge the receptive field and
maintain the filter size and layer depth with a lightweight structure. In
addition, skip connections and residual learning strategy are added to the
despeckling model to maintain the image details and reduce the vanishing
gradient problem. Compared with the traditional despeckling methods, the
proposed method shows superior performance over the state-of-the-art methods on
both quantitative and visual assessments, especially for strong speckle noise.Comment: 18 pages, 13 figures, 7 table
Analysis of Additives in Milk Powders with SPE-HPLC or 2D-HPLC Method
Dairy products are beneficial to human health, especially for formula-fed newborns. According to the regulation of FDA and China national food safety standard, food additives such as benzoic acid, sorbic acid, natamycin, lysozyme, saccharin sodium, and aspartame are not permitted to be added to milk powder. So, the establishment of accurate and convenient methods for the analysis of these food additives in milk powder is critical to people’s health. For the reason of the complex matrix of infant milk powders, we compared six sample pretreatment methods (liquid-liquid extraction, organic precipitation, heavy precipitation, and three different solid-phase extraction (SPE) methods (C18, HLB, MAX)) from recovery, easy operation, time cost, and organic solvent usage aspects. Finally, Poly-Sery HLB cartridge was confirmed as the most appropriate material for its high recovery and time cost merits. We are also introducing two-dimensional liquid chromatography (2DLC) method for the simultaneous determination of five major proteins and seven food additives in milk powders. Optimization of switching mode, choice of columns, mobile phase, and flow speed was discussed. We also compared limit of detection (LOD), recovery, and sample treatment with the results of high-performance liquid chromatography (HPLC). Results show that 2DLC is simpler, faster, and more accurate than the HPLC method
Cost-effective secure e-health cloud system using identity based cryptographic techniques
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage.Peer ReviewedPostprint (author's final draft
An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization
Recently, diffusion models have achieved remarkable success in generating
tasks, including image and audio generation. However, like other generative
models, diffusion models are prone to privacy issues. In this paper, we propose
an efficient query-based membership inference attack (MIA), namely Proximal
Initialization Attack (PIA), which utilizes groundtruth trajectory obtained by
initialized in and predicted point to infer memberships.
Experimental results indicate that the proposed method can achieve competitive
performance with only two queries on both discrete-time and continuous-time
diffusion models. Moreover, previous works on the privacy of diffusion models
have focused on vision tasks without considering audio tasks. Therefore, we
also explore the robustness of diffusion models to MIA in the text-to-speech
(TTS) task, which is an audio generation task. To the best of our knowledge,
this work is the first to study the robustness of diffusion models to MIA in
the TTS task. Experimental results indicate that models with mel-spectrogram
(image-like) output are vulnerable to MIA, while models with audio output are
relatively robust to MIA. {Code is available at
\url{https://github.com/kong13661/PIA}}
Related-Key Differential Attack on Round Reduced RECTANGLE-80
RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bit block size and a 80-bit or 128-bit key size. Until now, the results on analyzing the cipher are not too much, which includes an attack on the 18-round reduced version proposed by the designers themselves. In this paper, we find all 15-round differential characteristics with 26--30 active S-boxes for given input, output and round subkey differences, which have a total probability . Based on these differential characteristics, we extend the corresponding distinguisher to 2 rounds backward and forward respectively, and propose an attack on the 19-round reduced RECTANGLE-80 with data complexity of plaintexts, time complexity of about encryptions and memory complexity of . TThese data and time complexities are much lower than that of the designers for the 18-round reduced RECTANGLE-80
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
SIMON is a family of lightweight block ciphers designed by the U.S. National Security Agency (NSA) that has attracted much attention since its publication in 2013.
In this paper, we thoroughly investigate the properties of linear approximations of the bitwise AND operation with dependent input bits. By using a Mixed-integer Linear Programming based technique presented in Aasicrypt 2014 for automatic search for characteristics, we obtain improved linear characteristics for several versions of the SIMON family. Moreover, by employing a recently published method for automatic enumeration of differential and linear characteristics by Sun et. al., we present an improved linear hull analysis of some versions of the SIMON family, which are the best results for linear cryptanalysis of SIMON published so far.
Specifically, for SIMON, where the number denotes the block length, a 34-round linear characteristic with correlation is found, which is the longest linear characteristic that can be used in a key-recovery attack for SIMON published so far. Besides, several linear hulls superior to the best ones known previously are presented as follows: linear hulls for the 13-round SIMON with potential versus previous , for the 15-round SIMON with potential versus previous and linear hulls for the 21-round SIMON with potential versus previous
- …