- Cryptography and Data Security
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Microbial metabolism and enzyme function
- Microbial bioremediation and biosurfactants
- Environmental remediation with nanomaterials
- Phytase and its Applications
- Protein Hydrolysis and Bioactive Peptides
- Wound Healing and Treatments
- Fungal Biology and Applications
- Methane Hydrates and Related Phenomena
- Advancements in Battery Materials
- Diabetic Foot Ulcer Assessment and Management
- Microbial Community Ecology and Physiology
- Privacy-Preserving Technologies in Data
- Atmospheric and Environmental Gas Dynamics
- Coccidia and coccidiosis research
- Thermochemical Biomass Conversion Processes
- Chromium effects and bioremediation
- Diverse Topics in Contemporary Research
- Consumer Perception and Purchasing Behavior
- Identification and Quantification in Food
- Chemical Synthesis and Analysis
- Creativity in Education and Neuroscience
- Aquaculture disease management and microbiota
South China Agricultural University
2023-2024
Wuhan University
2017-2023
Guilin University of Electronic Technology
2023
Chongqing University of Technology
2009-2022
Beijing University of Technology
2022
Peng Cheng Laboratory
2020
Nanjing University of Posts and Telecommunications
2018
Nanchang University
2011
Hanoi Open University
2004
Internet of Things (IoT) and cloud computing are increasingly integrated, in the sense that data collected from IoT devices (generally with limited computational storage resources) being sent to for processing, etc., order inform decision making facilitate other operational business activities. However, may not be a fully trusted entity, like leaking user or compromising privacy. Thus, we propose privacy‐preserving user‐controlled sharing architecture fine‐grained access control, based on...
An edge-cloud Industrial Internet of Things (IIoT) can help meet the computing requirements industrial applications, particularly in time and latency-sensitive services. Ensuring security privacy (sensitive) information collected by IIoT end devices is crucial, has an important impact on decision making as well operational safety. However, these are energy constrained vulnerable to corruption. The authentication schemes suitable for this environment need be lightweight, efficient, concise....
A novel phenol-degrading strain was isolated and identified as Rhodococcus ruber C1. The degradation analysis shows that 1806 mg/L of phenol can be completely degraded by C1 within 38 h, the maximum specific growth rate (μmax=1.527 h-1) (qmax=3.674 indicate its excellent metabolism capability. More importantly, in temperature range 20-45 °C 72 with longer time, even at 10, 15 50 °C. whole genome sequenced, a comparative 36 other genomes performed. remarkable gene family expansion occurred...
Summary The e‐commerce has got great development in the past decades and brings convenience to people. Users can obtain all kinds of services through platform with mobile device from anywhere at anytime. To make it work well, must be secure provide privacy preserving. achieve this goal, Islam et al. proposed a dynamic identity‐based remote user mutual authentication scheme smart card using Elliptic Curve Cryptography(ECC). al claimed that security their was good enough resist various...
As self-organizing, highly heterogeneous and multi-interactive networks, vehicular ad-hoc networks (VANETs) are rapidly improving the efficiency of modern traffic. This promising technology is significant for supporting current intelligent transportation by cooperative data sharing processing. Considering requirements secure interactions limitation resources in VANETs, protecting authenticity while enhancing computational has become main challenge. A certificateless aggregate signature...
In wastewater treatment plants, petrochemical sludge is generated during the of oily industrial wastewaters produced in production. Although most oil floats on wastewater, a portion carried into with settling solids. The gasification supercritical water was investigated reactor at temperatures 530–650°C, pressures 26–42 MPa and residence times 200–360 s. Pressure change found to have no significant influence efficiency. Higher longer enhanced efficiency, lower favoured hydrogen addition...
The cometabolism mechanism of chlorinated hydrocarbon solvents (CHSs) in mixed consortia remains largely unknown. CHS biodegradation characteristics and microbial networks methanotrophic were studied for the first time. results showed that all CHSs can efficiently be degraded via with a maximum degradation rate 4.8 mg/(h·gcell). Chloroalkane chloroethylene more easily than chlorobenzenes by consortia, especially nonfully aliphatic hydrocarbons, which converted to Cl- production 0.29-0.36 In...
Key agreement protocol is an important cryptographic primitive, which allows 2 parties to establish a secure session in open network environment. A various of key protocols were proposed. Nowadays, there still exists some other security flaws waiting be solved. Owing reduce the computational and communication costs improve security, chaotic map has been studied in-depth treated as good solution. Recently, Liu et al proposed chaos-based 2-party demonstrated that it can defend...
A wireless sensor network(WSN) is usually deployed in a harsh physical environments to gather data that can be delivered the remotely located base station. Sensor nodes have irreplaceable energy source, limited computational capability and memory. Since communications consume significant amounts of battery power, should spend as little possible receiving transmitting data. It challenge maximize use these extend network lifetime. Development efficient power aware protocol need WSN. After...
In a typical single-server architecture, when user wishes to access multiple servers obtain different services, the needs register with every single server. This results in identities and password pairs. To eliminate limitation of having possess remember pairs, number multiserver authentication protocols have been proposed where only once. However, most existing are subsequently found be insecure this topic remains one ongoing research interests. Thus, paper, we present key agreement...
Abstract Cadmium (Cd 2+ ) has carcinogenic and teratogenic toxicity, which can be accumulated in the human body through food chain, endangering health life. In this study, a fungus named Beauveria bassiana Z1 was isolated identified to absorb Cd , its absorption rate 85.1 % when concentration 1 mM. Furthermore, of activated strain significantly higher than that inactivated, especially with high concentration. The genetic response results show expression Reactive Oxygen Species (ROS)...
본 연구는 웹사이트 디자인 분야에서 대칭과 비대칭적 구조에 따른 사용자에게 미적 인식(Aesthetic perception)에 대한 영향을 분석한다. 또한 대칭 디자인과 비대칭 디자인이 인식에서 각각 어떤 미적(고전 미학/표현 미학)차이가 있는지 심층적으로 검토한다. 이를 위해 비대칭적인 16개 샘플 시안을 101면의 피험자(남성 67명, 여성 30명)를 대상으로 7점을 척도로 하는 설문조사를 실시하였다. 회수된 설문지 97부는 대칭적인 디자인에 선호도를 알아보기 대응표본 t검정(Paired-Samples T Test)을 사용하였다. 이와 동시에 대칭적 디자인을 분석하기 고전 미학과 표현 미학에 성향을 확인한다. 연구 결과를 살펴보면, 디자인은 비해 높은 평가를 받고 있으며 큰 미치고 있다. 연구를 통해 웹 사이트 디자인의 기초자료가 될 수 있으며, 특히 유행과 소비시장에 민감한 패션과 관련된 상품, 브랜드 등을 다루는 사이트에서는 더욱 중요시할 필요성이 제기된다. 오늘날...