To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) ...To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test.展开更多
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo...BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value.展开更多
P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)...P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π.展开更多
We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization fact...We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signature...The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA - by completing the Harn's schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Siggnature Algorithm protocol.展开更多
Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estim...Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estimating biomass carbon storage and reference level,certification standards, the national methodology of REDD+ activities,and financial support if measurable,reportable and verifiable REDD+ activities are developed in China. Based on the results of the analysis,the different types for REDD+ activities that adapt to Chinese situation are put forward,and it was designed that the framework on Measuring,Reporting and Verifying System for REDD+ activities in China including general indicator such as objectives, implementation,contribution to sustainable development and poverty eradication,environment effectiveness,sustainability and cost-effectiveness.展开更多
The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a ...The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. .展开更多
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra...Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.展开更多
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle...Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.展开更多
The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but t...The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but the cascaded transcriptional machinery of upstream transcriptional regulators implicated in the ethylene biosynthesis pathway is still poorly understood.Here we report that ethylene biosynthesis genes,including MaACS1,MaACO1,MaACO4,MaACO5,and MaACO8,were upregulated in ripening bananas.NAC(NAM,ATAF,CUC)transcription factor,MaNAC083,a ripening and ethylene-inhibited gene,was discovered as a potential binding protein to the MaACS1 promoter by yeast one-hybrid screening.Further in vitro and in vivo experiments indicated that MaNAC083 bound directly to promoters of the five ethylene biosynthesis genes,thereby transcriptionally repressing their expression,which was further verified by transient overexpression experiments,where ethylene production was inhibited through MaNAC083-modulated transcriptional repression of ethylene biosynthesis genes in banana fruits.Strikingly,MaMADS1,a ripening-induced MADS(MCM1,AGAMOUS,DEFICIENS,SRF4)transcription factor,was found to directly repress the expression of MaNAC083,inhibiting trans-repression of MaNAC083 to ethylene biosynthesis genes,thereby attenuating MaNAC083-repressed ethylene production in bananas.These findings collectively illustrated the mechanistic basis of a MaMADS1-MaNAC083-MaACS1/MaACOs regulatory cascade controlling ethylene biosynthesis during banana fruit ripening.These findings increase our knowledge of the transcriptional regulatory mechanisms of ethylene biosynthesis at the transcriptional level and are expected to help develop molecular approaches to control ripening and improve fruit storability.展开更多
In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable univer...In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.展开更多
Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applicat...Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applications. Replacing liquid electrolytes with solidstate electrolytes(SSEs) is expected to fundamentally overcome the safety issues. In this work, we focus on the development and challenge of solid-state Li-air batteries(SSLABs). The rise of different types of SSEs, interfacial compatibility and verifiability in SSLABs are presented. The corresponding strategies and prospects of SSLABs are also proposed. In particular, combining machine learning method with experiment and in situ(or operando)techniques is imperative to accelerate the development of SSLABs.展开更多
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w...To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.展开更多
We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the un...We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the unknown first-order spatial derivatives involved in the CESE method are computed with a finite volume scheme that uses the solution of the derivative Riemann problem with limited reconstruction to evaluate the numerical flux at cell interface position.To show the validation and capacity of its application to 2D MHD problems,we study several benchmark problems.Numerical results verify that the hybrid scheme not only performs well,but also can retain the solution quality even if the Courant number ranges from close to 1 to less than 0.01.展开更多
We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D c...We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.展开更多
Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitti...Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitting method based on an improved mathematic model is proposed,which can be used to remove the phase aberrations without any pre-knowledge of the setup or manual operation.The improved mathematic model includes not only the usual terms but also the cross terms and the high order terms to describe the phase aberrations with high accuracy.Meanwhile,a non-iterative algorithm is used to solve the parametersand thus less computational load is imposed.The proposed method is applied to the live imaging of cells.The experimental results verify its validity.展开更多
The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drill...The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drilled into 120 elm samples that differed in the number of holes to verify the validity of the method. Wavelet energy moment can reflect the distribution of energy along the time axis and the amount of energy in each frequency band,which can effectively extract the energy distribution characteristics of signals in each frequency band; therefore,wavelet energy moment can replace the wavelet frequency band energy and constitute wood defect feature vectors. A principal component analysis was used to normalize and reduce the dimension of the feature vectors. A total of 16 principal component features were then obtained, which can effectively extract the defect features of the different number of holes in the elm samples.展开更多
文摘To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test.
文摘BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value.
基金supported by the National Natural Science Foundation of China(Grant Nos.12175239,12135011,and 12221005)the National Key Research and Development Program of China(Grant No.2020YFA0406400)+1 种基金the Chinese Academy of Sciences(Grant No.YSBR-101)the Xiaomi Foundation/Xiaomi Young Talents Program。
文摘P_(c)(4457)has been discovered over five years,but the parity of this particle remains undetermined.We propose a new interpretation for P_(c)(4457),which is the state generated from the coupled-channel D^(0)Ac+(2595)andπ^(0)P_(c)(4312)since they can exchange an almost on-shell∑_(c)^(+).In this scenario,the parity of P_(c)(4457)will be positive,which is different from the candidate of the bound state of D*∑_(c).The main decay channel of P_(c)(4457)in this model is Pc(4312)π.We propose three processes∧_(b)^(0)→J/ψKapπ^(-),∧_(b)^(0)→J/ψK-pπ^(0),and∧_(b)^(0)→J/ψpπ^(-)π^(+)k^(-)to verify Pc(4457)→Pc(4312)π.
基金supported by the National Natural Science Foundation of China(Grant Nos.12375234,12005012,and U1930402)the Laboratory Youth Fund of Institute of Applied Physics and Computational Mathematics(Grant No.6142A05QN21005)。
文摘We propose an ansatz without adjustable parameters for the calculation of a dynamical structure factor.The ansatz combines the quasi-particle Green’s function,especially the contribution from the renormalization factor,and the exchange-correlation kernel from time-dependent density functional theory together,verified for typical metals and semiconductors from a plasmon excitation regime to the Compton scattering regime.It has the capability to reconcile both small-angle and large-angle inelastic x-ray scattering(IXS)signals with muchimproved accuracy,which can be used as the theoretical base model,in inversely inferring electronic structures of condensed matter from IXS experimental signals directly.It may also be used to diagnose thermal parameters,such as temperature and density,of dense plasmas in x-ray Thomson scattering experiments.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
文摘The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA - by completing the Harn's schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Siggnature Algorithm protocol.
文摘Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estimating biomass carbon storage and reference level,certification standards, the national methodology of REDD+ activities,and financial support if measurable,reportable and verifiable REDD+ activities are developed in China. Based on the results of the analysis,the different types for REDD+ activities that adapt to Chinese situation are put forward,and it was designed that the framework on Measuring,Reporting and Verifying System for REDD+ activities in China including general indicator such as objectives, implementation,contribution to sustainable development and poverty eradication,environment effectiveness,sustainability and cost-effectiveness.
文摘The author introduces a new hypnotherapeutic technique termed “Mental Access/Somatosensory Access” (MASSA). MASSA is designed to utilize an external somatosensory stimulus in the context of hypnotherapy, based on a Bottom-Up/Top-Down Paradigm, which complements and mutually reinforces hypnotic inductions by using imbedded suggestions. The intervention’s algorithm includes a combination of real-time stimulation through one of the following somatosensory modalities: sensorimotor activation of the palms, visual, auditory, vibration, thermal, olfaction or oropharyngeal. These modalities are accompanied by guided hypnotic dissociation and suggestions. Somatosensory stimulation amplifies patients’ engagement in the procedure, focusing their attention on a stimulus and on the hypnotic experience during the intervention. A stream of closed questions with imbedded suggestions, presented by the therapist, is designed using suggestive presuppositions, termed by the author “The Create and Verify Principle” (CVP). This principle facilitates effective pacing and helps transform patients’ sensory and mental experiences. Imbedded suggestions followed by real-time stimulation, maintain a focus on the somatosensory content, boost the hypnotic experience, and gradually combine awareness of the somatosensory stimulation experience (Bottom-Up regulation) with memory, imagination, emotions and meanings, for mental access of resources and adaptive coping (Top-Down regulation). In the first part of this article, the author briefly introduces the neurophysiological mechanism behind the suggestive, somatosensory, attention-management intervention and provides an example of a basic algorithm of the MASSA technique. The second part includes clinical samples with scripts of successfully treated patients, who experienced tension headache, psychogenic balance disorder, tinnitus. .
基金supported by the National Natural Science Foundation of China(No.62206238)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220562)the Natural Science Research Project of Universities in Jiangsu Province(No.22KJB520010).
文摘Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy.
基金supported by the Tang Scholar Project of Soochow Universitythe National Natural Science Foundation of China(Grant No.61873162)+1 种基金the Fund from Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication NetworkSuzhou Key Laboratory of Advanced Optical Communication Network Technology。
文摘Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.
基金This study was supported by the National Key Research and Development Program of China(grant no.2022YFD2100103)the National Natural Science Foundation of China(grant no.32072279)the China Agriculture Research System of MOF and MARA(grant no.CARS-31).
文摘The hormone ethylene is crucial in the regulation of ripening in climacteric fruit,such as bananas.The transcriptional regulation of ethylene biosynthesis throughout banana fruit ripening has received much study,but the cascaded transcriptional machinery of upstream transcriptional regulators implicated in the ethylene biosynthesis pathway is still poorly understood.Here we report that ethylene biosynthesis genes,including MaACS1,MaACO1,MaACO4,MaACO5,and MaACO8,were upregulated in ripening bananas.NAC(NAM,ATAF,CUC)transcription factor,MaNAC083,a ripening and ethylene-inhibited gene,was discovered as a potential binding protein to the MaACS1 promoter by yeast one-hybrid screening.Further in vitro and in vivo experiments indicated that MaNAC083 bound directly to promoters of the five ethylene biosynthesis genes,thereby transcriptionally repressing their expression,which was further verified by transient overexpression experiments,where ethylene production was inhibited through MaNAC083-modulated transcriptional repression of ethylene biosynthesis genes in banana fruits.Strikingly,MaMADS1,a ripening-induced MADS(MCM1,AGAMOUS,DEFICIENS,SRF4)transcription factor,was found to directly repress the expression of MaNAC083,inhibiting trans-repression of MaNAC083 to ethylene biosynthesis genes,thereby attenuating MaNAC083-repressed ethylene production in bananas.These findings collectively illustrated the mechanistic basis of a MaMADS1-MaNAC083-MaACS1/MaACOs regulatory cascade controlling ethylene biosynthesis during banana fruit ripening.These findings increase our knowledge of the transcriptional regulatory mechanisms of ethylene biosynthesis at the transcriptional level and are expected to help develop molecular approaches to control ripening and improve fruit storability.
基金Project supported by the National Science Foundation of Sichuan Province (Grant No. 2022NSFSC0534)the Central Guidance on Local Science and Technology Development Fund of Sichuan Province (Grant No. 22ZYZYTS0064)+1 种基金the Chengdu Key Research and Development Support Program (Grant No. 2021-YF09-0016-GX)the Key Project of Sichuan Normal University (Grant No. XKZX-02)。
文摘In the field of single-server blind quantum computation(BQC), a major focus is to make the client as classical as possible. To achieve this goal, we propose two single-server BQC protocols to achieve verifiable universal quantum computation. In these two protocols, the client only needs to perform either the gate T(in the first protocol) or the gates H and X(in the second protocol). With assistance from a single server, the client can utilize his quantum capabilities to generate some single-qubit states while keeping the actual state of these qubits confidential from others. By using these single-qubit states, the verifiable universal quantum computation can be achieved.
基金supported by National Key Research and Development Program of China (No.2021YFF0500600)NSFC (22279120)Key R&D projects in Henan Province (221111240100)。
文摘Li-air batteries have attracted extensive attention because of their ultrahigh theoretical energy density. However, the potential safety hazard of flammable organic liquid electrolytes hinders their practical applications. Replacing liquid electrolytes with solidstate electrolytes(SSEs) is expected to fundamentally overcome the safety issues. In this work, we focus on the development and challenge of solid-state Li-air batteries(SSLABs). The rise of different types of SSEs, interfacial compatibility and verifiability in SSLABs are presented. The corresponding strategies and prospects of SSLABs are also proposed. In particular, combining machine learning method with experiment and in situ(or operando)techniques is imperative to accelerate the development of SSLABs.
基金The National High Technology Research and Development Program of China(863Program)(No.2001AA115300)the Natural Science Foundation of Liaoning Province(No.20031018,20062023)
文摘To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.
基金Supported by the National Basic Research Program of China under Grant No 2012CB825601the National Natural Science Foundation of China under Grant Nos 40921063,41031066,40890162,40904050,41074121 and 41074122the Specialized Research Fund for State Key Laboratories.
文摘We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the unknown first-order spatial derivatives involved in the CESE method are computed with a finite volume scheme that uses the solution of the derivative Riemann problem with limited reconstruction to evaluate the numerical flux at cell interface position.To show the validation and capacity of its application to 2D MHD problems,we study several benchmark problems.Numerical results verify that the hybrid scheme not only performs well,but also can retain the solution quality even if the Courant number ranges from close to 1 to less than 0.01.
基金Supported by the Natural Science Foundation of Shandong Province under Grant No ZR2010GL013.
文摘We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.
基金by the National Natural Science Foundation of China under Grant No 61077004the Science Foundation of Education Commission of Beijing under Grant No KZ200910005001Innovative Talent and Team Development for Serving Beijing.
文摘Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitting method based on an improved mathematic model is proposed,which can be used to remove the phase aberrations without any pre-knowledge of the setup or manual operation.The improved mathematic model includes not only the usual terms but also the cross terms and the high order terms to describe the phase aberrations with high accuracy.Meanwhile,a non-iterative algorithm is used to solve the parametersand thus less computational load is imposed.The proposed method is applied to the live imaging of cells.The experimental results verify its validity.
基金financially supported by the Fundamental Research Funds for the Central Universities(2572016CB11 and 2572014CB35)Natural Science Foundation of Heilongjiang Province(F2015036 and QC2014C010)948 Project(2014-4-78)
文摘The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drilled into 120 elm samples that differed in the number of holes to verify the validity of the method. Wavelet energy moment can reflect the distribution of energy along the time axis and the amount of energy in each frequency band,which can effectively extract the energy distribution characteristics of signals in each frequency band; therefore,wavelet energy moment can replace the wavelet frequency band energy and constitute wood defect feature vectors. A principal component analysis was used to normalize and reduce the dimension of the feature vectors. A total of 16 principal component features were then obtained, which can effectively extract the defect features of the different number of holes in the elm samples.