126 research outputs found

    Research on the Influence of Mobile Media on College Students’ Ideological and Political Education

    Get PDF
    With the rapid development of information technology, the form of mobile media has been continuously updated, and its social penetration rate is rapidly increasing. As a fashion leader, college students are keen to follow new things and show high enthusiasm and dependence on mobile media. Mobile media has been used in the continuous innovation of information technology, opening up new teaching methods in the field of education and becoming a new carrier of ideological and political education. At the same time, mobile media is also a double-edged sword, bringing many challenges to ideological and political education. It is an important research direction of ideological and political education in colleges and universities to put forward practical and feasible implementation plans to make full use of the advantages of mobile media to promote the development of ideological and political education and to guide college students to form a correct outlook on life and values

    China’s Experience in Reform and Opening up for Forty Years

    Get PDF
    In December 1978, after the Third Plenary Session of the 11th Central Committee of the Party, China entered a new era of reform and opening up. It has been for forty years, and has accumulated richly in the process of exploration and development in these forty years. Faced with the new tasks and new demands put forward by the new era, China has embarked on a new journey. The construction of socialism with Chinese characteristics needs to be further promoted. Reform and opening up is still the source of vitality for the development of socialism with Chinese characteristics in the new era. We should profoundly summarize and give full play to the experience of the fortieth anniversary of reform and opening up, hold high the great banner of socialism with Chinese characteristics, implement new development concepts, and constantly promote the development of the cause of reform and opening up

    Research on the Influencing Factors and Safeguard Mechanism of Farmers’ Income Growth in the New Era

    Get PDF
    As an important indicator to measure the degree of general social affluence and economic development in a country or region, peasant income has become an important focus of rural development under the new era rural revitalization strategy. The issue of farmers’ income is the core and key to the issue of “agriculture, rural areas and farmers”. Under the rural revitalization strategy, the traditional rural areas have undergone tremendous changes, and the wages of farmers’ wages, operating income, and transfer income are insufficient. Farmers’ continued income growth is facing enormous challenges. In the face of difficulties, the 19th National Congress of the Communist Party of China proposed that “the second round of land contracting will be extended for another 30 years”. It can be seen that the party and the state have profoundly recognized the importance of peasant income for increasing farmers’ income

    Learning a Dilated Residual Network for SAR Image Despeckling

    Full text link
    In this paper, to break the limit of the traditional linear models for synthetic aperture radar (SAR) image despeckling, we propose a novel deep learning approach by learning a non-linear end-to-end mapping between the noisy and clean SAR images with a dilated residual network (SAR-DRN). SAR-DRN is based on dilated convolutions, which can both enlarge the receptive field and maintain the filter size and layer depth with a lightweight structure. In addition, skip connections and residual learning strategy are added to the despeckling model to maintain the image details and reduce the vanishing gradient problem. Compared with the traditional despeckling methods, the proposed method shows superior performance over the state-of-the-art methods on both quantitative and visual assessments, especially for strong speckle noise.Comment: 18 pages, 13 figures, 7 table

    Analysis of Additives in Milk Powders with SPE-HPLC or 2D-HPLC Method

    Get PDF
    Dairy products are beneficial to human health, especially for formula-fed newborns. According to the regulation of FDA and China national food safety standard, food additives such as benzoic acid, sorbic acid, natamycin, lysozyme, saccharin sodium, and aspartame are not permitted to be added to milk powder. So, the establishment of accurate and convenient methods for the analysis of these food additives in milk powder is critical to people’s health. For the reason of the complex matrix of infant milk powders, we compared six sample pretreatment methods (liquid-liquid extraction, organic precipitation, heavy precipitation, and three different solid-phase extraction (SPE) methods (C18, HLB, MAX)) from recovery, easy operation, time cost, and organic solvent usage aspects. Finally, Poly-Sery HLB cartridge was confirmed as the most appropriate material for its high recovery and time cost merits. We are also introducing two-dimensional liquid chromatography (2DLC) method for the simultaneous determination of five major proteins and seven food additives in milk powders. Optimization of switching mode, choice of columns, mobile phase, and flow speed was discussed. We also compared limit of detection (LOD), recovery, and sample treatment with the results of high-performance liquid chromatography (HPLC). Results show that 2DLC is simpler, faster, and more accurate than the HPLC method

    Cost-effective secure e-health cloud system using identity based cryptographic techniques

    Get PDF
    Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage.Peer ReviewedPostprint (author's final draft

    An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization

    Full text link
    Recently, diffusion models have achieved remarkable success in generating tasks, including image and audio generation. However, like other generative models, diffusion models are prone to privacy issues. In this paper, we propose an efficient query-based membership inference attack (MIA), namely Proximal Initialization Attack (PIA), which utilizes groundtruth trajectory obtained by ϵ\epsilon initialized in t=0t=0 and predicted point to infer memberships. Experimental results indicate that the proposed method can achieve competitive performance with only two queries on both discrete-time and continuous-time diffusion models. Moreover, previous works on the privacy of diffusion models have focused on vision tasks without considering audio tasks. Therefore, we also explore the robustness of diffusion models to MIA in the text-to-speech (TTS) task, which is an audio generation task. To the best of our knowledge, this work is the first to study the robustness of diffusion models to MIA in the TTS task. Experimental results indicate that models with mel-spectrogram (image-like) output are vulnerable to MIA, while models with audio output are relatively robust to MIA. {Code is available at \url{https://github.com/kong13661/PIA}}

    Related-Key Differential Attack on Round Reduced RECTANGLE-80

    Get PDF
    RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bit block size and a 80-bit or 128-bit key size. Until now, the results on analyzing the cipher are not too much, which includes an attack on the 18-round reduced version proposed by the designers themselves. In this paper, we find all 15-round differential characteristics with 26--30 active S-boxes for given input, output and round subkey differences, which have a total probability 260.52^{-60.5}. Based on these differential characteristics, we extend the corresponding distinguisher to 2 rounds backward and forward respectively, and propose an attack on the 19-round reduced RECTANGLE-80 with data complexity of 2622^{62} plaintexts, time complexity of about 267.422^{67.42} encryptions and memory complexity of 2722^{72}. TThese data and time complexities are much lower than that of the designers for the 18-round reduced RECTANGLE-80

    Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

    Get PDF
    SIMON is a family of lightweight block ciphers designed by the U.S. National Security Agency (NSA) that has attracted much attention since its publication in 2013. In this paper, we thoroughly investigate the properties of linear approximations of the bitwise AND operation with dependent input bits. By using a Mixed-integer Linear Programming based technique presented in Aasicrypt 2014 for automatic search for characteristics, we obtain improved linear characteristics for several versions of the SIMON family. Moreover, by employing a recently published method for automatic enumeration of differential and linear characteristics by Sun et. al., we present an improved linear hull analysis of some versions of the SIMON family, which are the best results for linear cryptanalysis of SIMON published so far. Specifically, for SIMON128128, where the number denotes the block length, a 34-round linear characteristic with correlation 2612^{-61} is found, which is the longest linear characteristic that can be used in a key-recovery attack for SIMON128128 published so far. Besides, several linear hulls superior to the best ones known previously are presented as follows: linear hulls for the 13-round SIMON3232 with potential 228.992^{-28.99} versus previous 231.692^{-31.69}, for the 15-round SIMON4848 with potential 242.282^{-42.28} versus previous 244.112^{-44.11} and linear hulls for the 21-round SIMON6464 with potential 260.722^{-60.72} versus previous 262.532^{-62.53}
    corecore