In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long ...
详细信息
In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long short-term memory(Chaos-LSTM) model is constructed by combining chaotic systems with LSTM neural networks. The chaos sequence proliferation(CSP) algorithm is constructed to address the problem that the limited computational accuracy of computers can lead to periodicity in long chaotic sequences, making them unsuitable for encrypting objects with large amounts of data. By combining the Chaos-LSTM model and CSP algorithm, a geographicinformation encryption system is proposed. First, the Chaos-LSTM model is used to output chaotic sequences with high spectral entropy(SE) complexity. Then, a shorter chaotic sequence is selected and proliferated using the CSP algorithm to generate chaotic proliferation sequences that match the encrypted object;a randomness analysis is conducted and testing is performed on it. Finally, using geographic images as encryption objects, the chaotic proliferation sequence, along with the scrambling and diffusion algorithms, are combined to form the encryption system, which is implemented on the ZYNQ platform. The system's excellent confidentiality performance and scalability are proved by software testing and hardware experiments, making it suitable for the confidentiality peers of various encryption objects with outstanding application value.
Selective encryption technology is a data security protection method that can balance encryption security and efficiency. Currently, there is ongoing research on applying this technology to vector geographic data. How...
详细信息
To identify the influences of various built environment factors on ridership at urban rail transit stations, a case study was conducted on the Changsha Metro. First, spatial and temporal distributions of the station-l...
详细信息
Poverty threatens human development especially for developing countries,so ending poverty has become one of the most important United Nations Sustainable Development Goals(SDGs).This study aims to explore China's ...
详细信息
Poverty threatens human development especially for developing countries,so ending poverty has become one of the most important United Nations Sustainable Development Goals(SDGs).This study aims to explore China's progress in poverty reduction from 2016 to 2019 through time-series multi-source geospatial data and a deep learning *** poverty reduction efficiency(PRE)is measured by the difference in the out-of-poverty rates(which measures the probability of being not poor)of 2016 and *** study shows that the probability of poverty in all regions of China has shown an overall decreasing trend(PRE=0.264),which indicates that the progress in poverty reduction during this period is *** Hu Huanyong Line(Hu Line)shows an uneven geographical pattern of out-of-poverty rate between Southeast and Northwest *** 2016 to 2019,the centroid of China's out-of-poverty rate moved 105.786 km to the northeast while the standard deviation ellipse of the out-of-poverty rate moved 3 degrees away from the Hu Line,indicating that the regions with high out-of-poverty rates are more concentrated on the east side of the Hu Line from 2016 to *** results imply that the government's future poverty reduction policies should pay attention to the infrastructure construction in poor areas and appropriately increase the population density in poor *** study fills the gap in the research on poverty reduction under multiple scales and provides useful implications for the government's poverty reduction policy.
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E...
详细信息
ISBN:
(数字)9798331506209
ISBN:
(纸本)9798331506216
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. Existing cross-chain methods impose limitations, e.g., hash lock technology exhibits low scalability, side-chain technology is overly complex, and notary schemes pose centralization risks. In order to address these issues, we propose a cross-chain transaction solution based on proxy re-signature technology. To tackle the centralization concerns, we employ proxy re-signature technology to decentralize the authority of notaries among transaction participants, minimizing the potential for centralization at a low cost. We further present an extended scheme that can guarantee more requirements such as higher transaction amount and shorter transaction time. Furthermore, we analyze and compare the signature technologies used in the proposed solution and provide a systematic proof of our approach’s security.
暂无评论