Timestamps play a key role in process mining because it determines the chronology of which events occurred and subsequently how they are ordered in process modelling.The timestamp in process mining gives an insight on...
funded by National Natural Science Foundation of China(No.62272347,62072343,and 61802284);National Key Research Development Program of China(No.2019QY(Y)0206).
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)...
This work was supported by the National Key R&D Program of China(Nos.2023YFA1606403 and 2023YFE0101600);the National Natural Science Foundation of China(Nos.12027809,11961141003,U1967201,11875073 and 11875074).
A digital data-acquisition system based on XIA LLC products was used in a complex nuclear reaction experiment using radioactive ion beams.A flexible trigger system based on a field-programmable gate array(FPGA)paramet...
supported by the National Natural Science Foundation of China (Nos. 11975293 and 12105338);the Strategic Priority Research Program of Chinese Academy of Science (Nos. XDB 34040200 and XPB 23);the Technology Innovation Project of Instrument and Equipment Function Development of Chinese Academy of Sciences (No. 2023g102)。
HFRS(HIAF FRagment Separator) will be the radioactive secondary beam separation line on High-Intensity heavy-ion Accelerator Facility(HIAF) in China. Several TPC detectors, with high count rates, are planned for parti...
supported by National Key R&D Program of China(Grant Nos.2021YF B2700503,2020YF B1005900);supported by the National Natural Science Foundation of China(No.62072249)。
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most i...
The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applicat...
This research was funded by science and technology project of State Grid JiangSu Electric Power Co.,Ltd.(Research on Key Technologies of power network security digital identity authentication and management and control based on blockchain,Grant No.is J2021021).
The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult ...
supported by the National Key R&D Program of China(2018YFB1004401);the National Natural Science Foundation of China Key Project(Grant No.61732014).
Serializable snapshot isolation(SSI)is a promising technique to exploit parallelism for multi-core databases.However,SSI suffers from excessive transaction aborts.Existing remedies have three drawbacks:1)tracking proh...
A method of cooperative relay selection based on network coding security is proposed for relay selection problem of cooperative communication system security in networked multi-relay scenarios, which is different from...
National Natural Science Foundation of China(No.61271120/F010508);National Science and Technology Support Program(No.2014BAK02BO2,No.2014BAK02BO5);National Science and Technology Major Projects(broadband wireless2015ZX03001011-002)
A measurement method of optical fiber length using timestamp technique is demonstrated. Based on IEEE1588 precise clock synchronization protocol, the principle that time delay asymmetry on two path results in synchr...