Given that normal filling technology generally cannot be used for mining in the western part of China, as it has only a few sources for filling gangue, the feasibility of instead using cemented filling materials with aeolian sand as the aggregate is discussed in this study. We used laboratory tests to study how the fly ash (FA) content, cement content, lime–slag (LS) content, and concentration influence the transportation and mechanical properties of aeolian-sand-based cemented filling material. The internal microstructures and distributions of the elements in filled objects for curing times of 3 and 7 days are analyzed using scanning electron microscopy (SEM) and energy-dispersive spectroscopy (EDS). The experimental results show that: (i) the bleeding rate and slump of the filling-material slurry decrease gradually as the fly ash content, cement content, lime–slag content, and concentration increase, (ii) while the mechanical properties of the filled object increase. The optimal proportions for the aeolian sand-based cemented filling material include a concentration of 76%, a fly ash content of 47.5%, a cement content of 12.5%, a lime–slag content of 5%, and an aeolian sand content of 35%. The SEM observations show that the needle/rod-like ettringite (AFt) and amorphous and flocculent tobermorite (C-S-H) gel are the main early hydration products of a filled object with the above specific proportions. After increasing the curing time from 3 to 7 days, the AFt content decreases gradually, while the C-S-H content and the compactness increase.
This article proposes an event-triggering mechanism (ETM)-based security control strategy for an uncertain networked control system (NCS) to cope with jamming attacks on multiple transmission channels. A structure of the system control block for the attacked uncertain NCS is constructed and a virtual system is designed to cope with the mismatched parametric uncertainty and derive both the optimal control gain and the virtual control gain. Under multiple wireless channels jamming attack, an optimal jamming attack strategy that maximizes the attack power from the attacker's point of view is engineered. Furthermore, an ETM-based control strategy with jamming parameters is designed to ensure the input-to-state stability of NCS under uncertainty and jamming attacks. Finally, the numerical simulation results show the effectiveness of the control algorithm in this article.
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an attractive access control solution that can offer effective, fine-grained and secure medical data sharing, but it has two major drawbacks: Firstly, decryption is computationally expensive for resource-limited data users, especially when the access policy has many attributes, limiting its use in large-scale data-sharing scenarios. Secondly, existing schemes are based on data users’ attributes, which can potentially reveal sensitive information about the users, especially in healthcare data sharing, where strong privacy and security are essential. To address these issues, we designed an improved CP-ABE scheme that provides efficient and verifiable outsourced access control with fully hidden policy named EVOAC-HP. In this paper, we utilize the attribute bloom filter to achieve policy hiding without revealing user privacy. For the purpose of alleviating the decryption burden for data users, we also adopt the technique of outsourced decryption to outsource the heavy computation overhead to the cloud service provider (CSP) with strong computing and storage capabilities, while the transformed ciphertext results can be verified by the data user. Finally, with rigorous security and reliable performance analysis, we demonstrate that EVOAC-HP is both practical and effective with robust privacy protection.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.