With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed...With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.展开更多
A new compact torus injector(KTX-CTI)has been built for injection experiments on the Keda Torus eXperiment(KTX)reversed field pinch(RFP).The aim is to study the fundamental physics governing the compact torus(CT)centr...A new compact torus injector(KTX-CTI)has been built for injection experiments on the Keda Torus eXperiment(KTX)reversed field pinch(RFP).The aim is to study the fundamental physics governing the compact torus(CT)central fueling processes.In experiments conducted under the sole influence of a 0.1 T toroidal magnetic field,the injected CT successfully penetrated the entire toroidal magnetic field,reaching the inner wall of the KTX vacuum vessel.Upon reaching the inner wall,the CT diffused both radially outward and toroidally within the vessel at a discernible diffusion speed.Moreover,the inherent helicity within the CT induced a modest KTX plasma current of 200 A,consistent with predictions based on helicity conservation.CT injection demonstrated the capability to initiate KTX discharges at low loop voltages,suggesting its potential as a pre-ionization and current startup technique.During RFP discharges featuring CT injection,the central plasma density was found to exceed the Greenwald density limit,with more peaked density profiles,indicating the predominant confinement of CT plasma within the core region of the KTX bulk plasma.展开更多
Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radia...Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radial compression.Hence,we propose a new fusion approach based on axial compression of a large-sized FRC.The axial compression can be made by plasma jets or plasmoids converging onto the axial ends of the FRC.The parameter space that can reach the ignition condition while preserving the FRC's overall quality is studied using a numerical model based on different FRC confinement scalings.It is found that ignition is possible for a large FRC that can be achieved with the current FRC formation techniques if compression ratio is greater than 50.A more realistic compression is to combine axial with moderate radial compression,which is also presented and calculated in this work.展开更多
The interaction between metal and support is critical in oxygen catalysis as it governs the charge transfer between these two entities,influences the electronic structures of the supported metal,affects the adsorption...The interaction between metal and support is critical in oxygen catalysis as it governs the charge transfer between these two entities,influences the electronic structures of the supported metal,affects the adsorption energies of reaction intermediates,and ultimately impacts the catalytic performance.In this study,we discovered a unique charge transfer reversal phenomenon in a metal/carbon nanohybrid system.Specifically,electrons were transferred from the metal-based species to N-doped carbon,while the carbon support reciprocally donated electrons to the metal domain upon the introduction of nickel.This led to the exceptional electrocatalytic performances of the resulting Ni-Fe/Mo_(2)C@nitrogen-doped carbon catalyst,with a half-wave potential of 0.91 V towards oxygen reduction reaction(ORR)and a low overpotential of 290 m V at 10 mA cm^(-2)towards oxygen evolution reaction(OER)under alkaline conditions.Additionally,the Fe-Ni/Mo_(2)C@carbon heterojunction catalyst demonstrated high specific capacity(794 mA h g_(Zn)~(-1))and excellent cycling stability(200 h)in a Zn-air battery.Theoretical calculations revealed that Mo_(2)C effectively inhibited charge transfer from Fe to the support,while secondary doping of Ni induced a charge transfer reversal,resulting in electron accumulation in the Fe-Ni alloy region.This local electronic structure modulation significantly reduced energy barriers in the oxygen catalysis process,enhancing the catalytic efficiency of both ORR and OER.Consequently,our findings underscore the potential of manipulating charge transfer reversal between the metal and support as a promising strategy for developing highly-active and durable bi-functional oxygen electrodes.展开更多
This work reports an exceptional reversed yield strength asymmetry at room temperature for a rare-earth free magnesium alloy containing a mass of fine dispersed quasicrystal(I-phase)precipitates.Although exhibiting tr...This work reports an exceptional reversed yield strength asymmetry at room temperature for a rare-earth free magnesium alloy containing a mass of fine dispersed quasicrystal(I-phase)precipitates.Although exhibiting traditional basal texture,it owns an exceptional CYS/TYS as high as~1.17.Electron back-scattered diffraction(EBSD)and transmission electron microscopy(TEM)examinations indicate pyramidal and prismatic dislocations plus tensile twinning being activated after immediate yielding in compression while basal and non-basal dislocations in tension.I-phase particles transferred the concentrated stress by self-twinning to provide the driving force for tensile twin initiating in neighboring grains,thereby significantly increasing the critical resolved shear stress of tensile twinning to possibly the level of pyramidal slip,finally leading to the dominance of pyramidal slip plus tensile twinning in texture grains.This results in a higher contribution on yield strength by~55 MPa in compression than in tension,which reasonably agrees with the experimental yield strength difference(~38 MPa).It can be concluded that I-phase particles influence deformation modes in tension and in compression,finally result in reversed yield strength asymmetry.展开更多
In a tokamak fusion reactor operated at steady state,the equilibrium magnetic field is likely to have reversed shear in the core region,as the noninductive bootstrap current profile generally peaks off-axis.The revers...In a tokamak fusion reactor operated at steady state,the equilibrium magnetic field is likely to have reversed shear in the core region,as the noninductive bootstrap current profile generally peaks off-axis.The reversed shear Alfvén eigenmode(RSAE)as a unique branch of the shear Alfvén wave in this equilibrium,can exist with a broad spectrum in wavenumber and frequency,and be resonantly driven unstable by energetic particles(EP).After briefly discussing the RSAE linear properties in burning plasma condition,we review several key topics of the nonlinear dynamics for the RSAE through both wave-EP resonance and wave-wave coupling channels,and illustrate their potentially important role in reactor-scale fusion plasmas.By means of simplified hybrid MHD-kinetic simulations,the RSAEs are shown to have typically broad phase space resonance structure with both circulating and trapped EP,as results of weak/vanishing magnetic shear and relatively low frequency.Through the route of wave-EP nonlinearity,the dominant saturation mechanism is mainly due to the transported resonant EP radially decoupling with the localized RSAE mode structure,and the resultant EP transport generally has a convective feature.The saturated RSAEs also undergo various nonlinear couplings with other collective oscillations.Two typical routes as parametric decay and modulational instability are studied using nonlinear gyrokinetic theory,and applied to the scenario of spontaneous excitation by a finite amplitude pump RSAE.Multiple RSAEs could naturally couple and induce the spectral energy cascade into a low frequency Alfvénic mode,which may effectively transfer the EP energy to fuel ions via collisionless Landau damping.Moreover,zero frequency zonal field structure could be spontaneously excited by modulation of the pump RSAE envelope,and may also lead to saturation of the pump RSAE by both scattering into stable domain and local distortion of the continuum structure.展开更多
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ...Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases.展开更多
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ...Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally.展开更多
Exploiting modification direction(EMD)based data hiding techniques(DHTs)provide moderate data hiding capacity and high-quality stego images.The overflow problem and the cyclic nature of the extraction function essenti...Exploiting modification direction(EMD)based data hiding techniques(DHTs)provide moderate data hiding capacity and high-quality stego images.The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary.Thus far,the few EMD reversible DHTs are complex and numerically demanding.This paper presents a novel EMD-based reversible DHT using dual-image.Two novel 2×4 modification lookup tables are introduced,replacing the 256×256 reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques.In the embedding step,one of the modification tables modifies a pixel in odd columns in the first cover image and keeps its image in the second cover image intact.The other modification table modifies a pixel in even columns in the second cover image and keeps its image in the first cover image intact.This embedding strategy enables direct reversibility at almost zero computational cost.This technique embeds one 4−ary secret digit into each pixel in the first cover image and its image in the second cover image resulting in one bit per pixel(bpp)data embedding rate.The use of the 4−ary numbering system enables direct and numerically efficient conversion of the binary secret message to the 4−ary and vice versa.The advantages of the proposed algorithm are straightforward reversibility,simplicity,numerical efficiency,direct conversion of the binary secret message to 4−ary and vice versa,and elimination of the need for the 256×256 reference matrix by replacing it with two 2×4 lookup tables.Simulation results show that the embedding rate of the proposed technique is one bpp.It achieved more than 49 dB average Peak to Signal Noise Ratio(PSNR)over all test images.展开更多
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs...Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well.展开更多
Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being e...Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being easily noticed.The recipient of the image must receive the two stego-images before the secret message can be completely retrieved.Imperceptibility is one of the main advantages of data hiding technology;to increase the imperceptibility,the quality requirements of the stego-images are relatively important.A dual ste-ganographic image RDH method,called a DS-CF scheme that can achieve a bet-ter steganographic image quality using the center folding(CF)strategy.In this paper,we developed a translocation and switching strategy(TaS)to shorten the distances between the stego-pixel coordinates and the cover pixel coordinates after information being hidden.Compared with the DS-CF scheme,our proposed DS-TaS scheme can effectively improve the quality of the steganographic images at the same level of embedding capability.The experimental results show that the PSNR of our DS-TaS scheme at k=1 was 55.66 dB,which is an increase of 1.5 dB,and is 51.43 dB for k=2,46.66 dB for k=3,and 40.91 dB for k=4.In addition,the PSNR values of the stego images was increased by 1.5,0.29,0.29,and 0.19 dB,respectively.This shows that our proposed dual-image RDH method can optimize the visual quality of the stego-images and is better than many other dual-image RDH techniques.展开更多
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.展开更多
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose...In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.展开更多
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal depende...Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight.展开更多
Mg alloys possess an inherent plastic anisotropy owing to the selective activation of deformation mechanisms depending on the loading condition.This characteristic results in a diverse range of flow curves that vary w...Mg alloys possess an inherent plastic anisotropy owing to the selective activation of deformation mechanisms depending on the loading condition.This characteristic results in a diverse range of flow curves that vary with a deformation condition.This study proposes a novel approach for accurately predicting an anisotropic deformation behavior of wrought Mg alloys using machine learning(ML)with data augmentation.The developed model combines four key strategies from data science:learning the entire flow curves,generative adversarial networks(GAN),algorithm-driven hyperparameter tuning,and gated recurrent unit(GRU)architecture.The proposed model,namely GAN-aided GRU,was extensively evaluated for various predictive scenarios,such as interpolation,extrapolation,and a limited dataset size.The model exhibited significant predictability and improved generalizability for estimating the anisotropic compressive behavior of ZK60 Mg alloys under 11 annealing conditions and for three loading directions.The GAN-aided GRU results were superior to those of previous ML models and constitutive equations.The superior performance was attributed to hyperparameter optimization,GAN-based data augmentation,and the inherent predictivity of the GRU for extrapolation.As a first attempt to employ ML techniques other than artificial neural networks,this study proposes a novel perspective on predicting the anisotropic deformation behaviors of wrought Mg alloys.展开更多
Intrinsic attenuation of the earth causes energy loss and phase distortion in seismic wave propagation.To obtain high-resolution imaging results,these negative effects must be considered during reverse time migration(...Intrinsic attenuation of the earth causes energy loss and phase distortion in seismic wave propagation.To obtain high-resolution imaging results,these negative effects must be considered during reverse time migration(RTM).We can easily implement attenuation-compensated RTM using the constant Q viscoacoustic wave equation with decoupled amplitude attenuation and phase dispersion terms.However,the nonphysical amplitude-compensation process will inevitably amplify the high-frequency noise in the wavefield in an exponential form,causing the numerical simulation to become unstable.This is due to the fact that the amplitude of the compensation grows exponentially with frequency.In order to achieve stable attenuation-compensated RTM,we modify the analytic expression of the attenuation compensation extrapolation operator and make it only compensate for amplitude loss within the effective frequency band.Based on this modified analytic formula,we then derive an explicit time-space domain attenuation compensation extrapolation operator.Finally,the implementation procedure of stable attenuation-compensated RTM is presented.In addition to being simple to implement,the newly proposed attenuation-compensated extrapolation operator is superior to the conventional low-pass filter in suppressing random noise,which will further improve the imaging resolution.We use two synthetic and one land seismic datasets to verify the stability and effectiveness of the proposed attenuationcompensated RTM in improving imaging resolution in viscous media.展开更多
In this work,several key scaling laws of the quasi-static magnetic compression of field reversed configuration(FRC)plasma(Spencer et al 1983 Phys.Fluids 261564)are amended from a series of two-dimensional FRC MHD equi...In this work,several key scaling laws of the quasi-static magnetic compression of field reversed configuration(FRC)plasma(Spencer et al 1983 Phys.Fluids 261564)are amended from a series of two-dimensional FRC MHD equilibriums numerically obtained using the Grad–Shafranov equation solver NIMEQ.Based on the new scaling for the elongation and the magnetic fields at the separatrix and the wall,the empirically stable limits for the compression ratio,the fusion gain,and the neutron yield are evaluated,which may serve as a more accurate estimate for the upper ceiling of performance from the magnetic compression of FRC plasma as a potential fusion energy as well as neutron source devices.展开更多
There are challenges to the reliability evaluation for insulated gate bipolar transistors(IGBT)on electric vehicles,such as junction temperature measurement,computational and storage resources.In this paper,a junction...There are challenges to the reliability evaluation for insulated gate bipolar transistors(IGBT)on electric vehicles,such as junction temperature measurement,computational and storage resources.In this paper,a junction temperature estimation approach based on neural network without additional cost is proposed and the lifetime calculation for IGBT using electric vehicle big data is performed.The direct current(DC)voltage,operation current,switching frequency,negative thermal coefficient thermistor(NTC)temperature and IGBT lifetime are inputs.And the junction temperature(T_(j))is output.With the rain flow counting method,the classified irregular temperatures are brought into the life model for the failure cycles.The fatigue accumulation method is then used to calculate the IGBT lifetime.To solve the limited computational and storage resources of electric vehicle controllers,the operation of IGBT lifetime calculation is running on a big data platform.The lifetime is then transmitted wirelessly to electric vehicles as input for neural network.Thus the junction temperature of IGBT under long-term operating conditions can be accurately estimated.A test platform of the motor controller combined with the vehicle big data server is built for the IGBT accelerated aging test.Subsequently,the IGBT lifetime predictions are derived from the junction temperature estimation by the neural network method and the thermal network method.The experiment shows that the lifetime prediction based on a neural network with big data demonstrates a higher accuracy than that of the thermal network,which improves the reliability evaluation of system.展开更多
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ...As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.展开更多
基金the National Natural Science Foundation of China(Grant Numbers 622724786210245062102451).
文摘With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.
基金supported by the National Magnetic Confinement Fusion Science Program of China(Nos.2022YFE03100000 and 2017YFE0301701)National Natural Science Foundation of China(Nos.12375226,11875255,11635008,11375188 and 11975231)the Fundamental Research Funds for the Central Universities(No.wk34200000022)。
文摘A new compact torus injector(KTX-CTI)has been built for injection experiments on the Keda Torus eXperiment(KTX)reversed field pinch(RFP).The aim is to study the fundamental physics governing the compact torus(CT)central fueling processes.In experiments conducted under the sole influence of a 0.1 T toroidal magnetic field,the injected CT successfully penetrated the entire toroidal magnetic field,reaching the inner wall of the KTX vacuum vessel.Upon reaching the inner wall,the CT diffused both radially outward and toroidally within the vessel at a discernible diffusion speed.Moreover,the inherent helicity within the CT induced a modest KTX plasma current of 200 A,consistent with predictions based on helicity conservation.CT injection demonstrated the capability to initiate KTX discharges at low loop voltages,suggesting its potential as a pre-ionization and current startup technique.During RFP discharges featuring CT injection,the central plasma density was found to exceed the Greenwald density limit,with more peaked density profiles,indicating the predominant confinement of CT plasma within the core region of the KTX bulk plasma.
基金supported by National Natural Science Foundation of China(No.12175226)。
文摘Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radial compression.Hence,we propose a new fusion approach based on axial compression of a large-sized FRC.The axial compression can be made by plasma jets or plasmoids converging onto the axial ends of the FRC.The parameter space that can reach the ignition condition while preserving the FRC's overall quality is studied using a numerical model based on different FRC confinement scalings.It is found that ignition is possible for a large FRC that can be achieved with the current FRC formation techniques if compression ratio is greater than 50.A more realistic compression is to combine axial with moderate radial compression,which is also presented and calculated in this work.
基金financially supported by the Outstanding Youth Scientific Research Project for Colleges and Universities of Anhui Province of China (2022AH020054)the Anhui Provincial Natural Science Foundation (2208085Y06)+2 种基金the National Natural Science Foundation of China (Nos.21975001 and U2002213)the Support Program of Excellent Young Talents in Anhui Provincial Colleges and Universities (gxyq ZD2022034)the Double Tops Joint Fund of the Yunnan Science and Technology Bureau and Yunnan University (2019FY003025)。
文摘The interaction between metal and support is critical in oxygen catalysis as it governs the charge transfer between these two entities,influences the electronic structures of the supported metal,affects the adsorption energies of reaction intermediates,and ultimately impacts the catalytic performance.In this study,we discovered a unique charge transfer reversal phenomenon in a metal/carbon nanohybrid system.Specifically,electrons were transferred from the metal-based species to N-doped carbon,while the carbon support reciprocally donated electrons to the metal domain upon the introduction of nickel.This led to the exceptional electrocatalytic performances of the resulting Ni-Fe/Mo_(2)C@nitrogen-doped carbon catalyst,with a half-wave potential of 0.91 V towards oxygen reduction reaction(ORR)and a low overpotential of 290 m V at 10 mA cm^(-2)towards oxygen evolution reaction(OER)under alkaline conditions.Additionally,the Fe-Ni/Mo_(2)C@carbon heterojunction catalyst demonstrated high specific capacity(794 mA h g_(Zn)~(-1))and excellent cycling stability(200 h)in a Zn-air battery.Theoretical calculations revealed that Mo_(2)C effectively inhibited charge transfer from Fe to the support,while secondary doping of Ni induced a charge transfer reversal,resulting in electron accumulation in the Fe-Ni alloy region.This local electronic structure modulation significantly reduced energy barriers in the oxygen catalysis process,enhancing the catalytic efficiency of both ORR and OER.Consequently,our findings underscore the potential of manipulating charge transfer reversal between the metal and support as a promising strategy for developing highly-active and durable bi-functional oxygen electrodes.
基金financially supported by the Scientific and Technological Developing Scheme of Jilin Province under grants no.20220402012GHthe National Natural Science Foundation of China under grants no.U21A20323+3 种基金the Capital Construction Fund within the Budget of Jilin Province no.2021C038-1the Special high-tech industrialization project of science and technology cooperation between Jilin Province and Chinese Academy of Sciences under grant no.2021SYHZ0043 and 2022SYHZ0038the Major science and technology projects of Jilin Province and Changchun City under grant no.20210301024GXthe Project for Jilin provincial department of education under grant no.JJKH20220760KJ。
文摘This work reports an exceptional reversed yield strength asymmetry at room temperature for a rare-earth free magnesium alloy containing a mass of fine dispersed quasicrystal(I-phase)precipitates.Although exhibiting traditional basal texture,it owns an exceptional CYS/TYS as high as~1.17.Electron back-scattered diffraction(EBSD)and transmission electron microscopy(TEM)examinations indicate pyramidal and prismatic dislocations plus tensile twinning being activated after immediate yielding in compression while basal and non-basal dislocations in tension.I-phase particles transferred the concentrated stress by self-twinning to provide the driving force for tensile twin initiating in neighboring grains,thereby significantly increasing the critical resolved shear stress of tensile twinning to possibly the level of pyramidal slip,finally leading to the dominance of pyramidal slip plus tensile twinning in texture grains.This results in a higher contribution on yield strength by~55 MPa in compression than in tension,which reasonably agrees with the experimental yield strength difference(~38 MPa).It can be concluded that I-phase particles influence deformation modes in tension and in compression,finally result in reversed yield strength asymmetry.
基金supported by National Natural Science Foundation of China (Nos. 12205251, 12275236 and 12261131622)Italian Ministry for Foreign Affairs and International Cooperation Project (No. CN23GR02)+2 种基金the National Key Research and Development Program of China (Nos. 2019YFE03020003 and 2017YFE0301900)Users of Excellence program of Hefei Science Center CAS (No. 2021HSC-UE016)funded by the European Union via the Euratom Research and Training Programme (No. 101052200–EUROfusion)
文摘In a tokamak fusion reactor operated at steady state,the equilibrium magnetic field is likely to have reversed shear in the core region,as the noninductive bootstrap current profile generally peaks off-axis.The reversed shear Alfvén eigenmode(RSAE)as a unique branch of the shear Alfvén wave in this equilibrium,can exist with a broad spectrum in wavenumber and frequency,and be resonantly driven unstable by energetic particles(EP).After briefly discussing the RSAE linear properties in burning plasma condition,we review several key topics of the nonlinear dynamics for the RSAE through both wave-EP resonance and wave-wave coupling channels,and illustrate their potentially important role in reactor-scale fusion plasmas.By means of simplified hybrid MHD-kinetic simulations,the RSAEs are shown to have typically broad phase space resonance structure with both circulating and trapped EP,as results of weak/vanishing magnetic shear and relatively low frequency.Through the route of wave-EP nonlinearity,the dominant saturation mechanism is mainly due to the transported resonant EP radially decoupling with the localized RSAE mode structure,and the resultant EP transport generally has a convective feature.The saturated RSAEs also undergo various nonlinear couplings with other collective oscillations.Two typical routes as parametric decay and modulational instability are studied using nonlinear gyrokinetic theory,and applied to the scenario of spontaneous excitation by a finite amplitude pump RSAE.Multiple RSAEs could naturally couple and induce the spectral energy cascade into a low frequency Alfvénic mode,which may effectively transfer the EP energy to fuel ions via collisionless Landau damping.Moreover,zero frequency zonal field structure could be spontaneously excited by modulation of the pump RSAE envelope,and may also lead to saturation of the pump RSAE by both scattering into stable domain and local distortion of the continuum structure.
基金funded by National Science Council,Taiwan,the Grant Number is NSC 111-2410-H-167-005-MY2.
文摘Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases.
文摘Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally.
文摘Exploiting modification direction(EMD)based data hiding techniques(DHTs)provide moderate data hiding capacity and high-quality stego images.The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary.Thus far,the few EMD reversible DHTs are complex and numerically demanding.This paper presents a novel EMD-based reversible DHT using dual-image.Two novel 2×4 modification lookup tables are introduced,replacing the 256×256 reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques.In the embedding step,one of the modification tables modifies a pixel in odd columns in the first cover image and keeps its image in the second cover image intact.The other modification table modifies a pixel in even columns in the second cover image and keeps its image in the first cover image intact.This embedding strategy enables direct reversibility at almost zero computational cost.This technique embeds one 4−ary secret digit into each pixel in the first cover image and its image in the second cover image resulting in one bit per pixel(bpp)data embedding rate.The use of the 4−ary numbering system enables direct and numerically efficient conversion of the binary secret message to the 4−ary and vice versa.The advantages of the proposed algorithm are straightforward reversibility,simplicity,numerical efficiency,direct conversion of the binary secret message to 4−ary and vice versa,and elimination of the need for the 256×256 reference matrix by replacing it with two 2×4 lookup tables.Simulation results show that the embedding rate of the proposed technique is one bpp.It achieved more than 49 dB average Peak to Signal Noise Ratio(PSNR)over all test images.
文摘Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well.
文摘Dual-image reversible data hiding(RDH)is a technique for hiding important messages.This technology can be used to safely deliver secret mes-sages to the recipient through dual images in an open network without being easily noticed.The recipient of the image must receive the two stego-images before the secret message can be completely retrieved.Imperceptibility is one of the main advantages of data hiding technology;to increase the imperceptibility,the quality requirements of the stego-images are relatively important.A dual ste-ganographic image RDH method,called a DS-CF scheme that can achieve a bet-ter steganographic image quality using the center folding(CF)strategy.In this paper,we developed a translocation and switching strategy(TaS)to shorten the distances between the stego-pixel coordinates and the cover pixel coordinates after information being hidden.Compared with the DS-CF scheme,our proposed DS-TaS scheme can effectively improve the quality of the steganographic images at the same level of embedding capability.The experimental results show that the PSNR of our DS-TaS scheme at k=1 was 55.66 dB,which is an increase of 1.5 dB,and is 51.43 dB for k=2,46.66 dB for k=3,and 40.91 dB for k=4.In addition,the PSNR values of the stego images was increased by 1.5,0.29,0.29,and 0.19 dB,respectively.This shows that our proposed dual-image RDH method can optimize the visual quality of the stego-images and is better than many other dual-image RDH techniques.
基金supported by China’s National Natural Science Foundation(Nos.62072249,62072056)This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
文摘With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
文摘In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.
基金This research was financially supported by the Ministry of Trade,Industry,and Energy(MOTIE),Korea,under the“Project for Research and Development with Middle Markets Enterprises and DNA(Data,Network,AI)Universities”(AI-based Safety Assessment and Management System for Concrete Structures)(ReferenceNumber P0024559)supervised by theKorea Institute for Advancement of Technology(KIAT).
文摘Time-series data provide important information in many fields,and their processing and analysis have been the focus of much research.However,detecting anomalies is very difficult due to data imbalance,temporal dependence,and noise.Therefore,methodologies for data augmentation and conversion of time series data into images for analysis have been studied.This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to noise.The method of data augmentation is set as the addition of noise.It involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the model.In addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into images.It enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the data.For anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat maps.It allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies occur.The performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to images.Additionally,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training time.The proposed method can provide an important springboard for research in the field of anomaly detection using time series data.Besides,it helps solve problems such as analyzing complex patterns in data lightweight.
基金Korea Institute of Energy Technology Evaluation and Planning(KETEP)grant funded by the Korea government(Grant No.20214000000140,Graduate School of Convergence for Clean Energy Integrated Power Generation)Korea Basic Science Institute(National Research Facilities and Equipment Center)grant funded by the Ministry of Education(2021R1A6C101A449)the National Research Foundation of Korea grant funded by the Ministry of Science and ICT(2021R1A2C1095139),Republic of Korea。
文摘Mg alloys possess an inherent plastic anisotropy owing to the selective activation of deformation mechanisms depending on the loading condition.This characteristic results in a diverse range of flow curves that vary with a deformation condition.This study proposes a novel approach for accurately predicting an anisotropic deformation behavior of wrought Mg alloys using machine learning(ML)with data augmentation.The developed model combines four key strategies from data science:learning the entire flow curves,generative adversarial networks(GAN),algorithm-driven hyperparameter tuning,and gated recurrent unit(GRU)architecture.The proposed model,namely GAN-aided GRU,was extensively evaluated for various predictive scenarios,such as interpolation,extrapolation,and a limited dataset size.The model exhibited significant predictability and improved generalizability for estimating the anisotropic compressive behavior of ZK60 Mg alloys under 11 annealing conditions and for three loading directions.The GAN-aided GRU results were superior to those of previous ML models and constitutive equations.The superior performance was attributed to hyperparameter optimization,GAN-based data augmentation,and the inherent predictivity of the GRU for extrapolation.As a first attempt to employ ML techniques other than artificial neural networks,this study proposes a novel perspective on predicting the anisotropic deformation behaviors of wrought Mg alloys.
基金supported by the Marine S&T Fund of Shandong Province for Pilot National Laboratory for Marine Science and Technology(Qingdao)(No.2021QNLM020001)the Major Scientific and Technological Projects of Shandong Energy Group(No.SNKJ2022A06-R23)the Major Scientific and Technological Projects of CNPC(No.ZD2019-183-003).
文摘Intrinsic attenuation of the earth causes energy loss and phase distortion in seismic wave propagation.To obtain high-resolution imaging results,these negative effects must be considered during reverse time migration(RTM).We can easily implement attenuation-compensated RTM using the constant Q viscoacoustic wave equation with decoupled amplitude attenuation and phase dispersion terms.However,the nonphysical amplitude-compensation process will inevitably amplify the high-frequency noise in the wavefield in an exponential form,causing the numerical simulation to become unstable.This is due to the fact that the amplitude of the compensation grows exponentially with frequency.In order to achieve stable attenuation-compensated RTM,we modify the analytic expression of the attenuation compensation extrapolation operator and make it only compensate for amplitude loss within the effective frequency band.Based on this modified analytic formula,we then derive an explicit time-space domain attenuation compensation extrapolation operator.Finally,the implementation procedure of stable attenuation-compensated RTM is presented.In addition to being simple to implement,the newly proposed attenuation-compensated extrapolation operator is superior to the conventional low-pass filter in suppressing random noise,which will further improve the imaging resolution.We use two synthetic and one land seismic datasets to verify the stability and effectiveness of the proposed attenuationcompensated RTM in improving imaging resolution in viscous media.
基金supported by the National Magnetic Confinement Fusion Program of China (No. 2017YFE0301805)National Natural Science Foundation of China (No. 51821005)+3 种基金the Fundamental Research Funds for the Central Universities at Huazhong University of Science and Technology (No. 2019kfy XJJS193)the U.S. Department of Energy (Nos. DE-FG02-86ER53218 and DE-SC0018001)the supports from the NIMROD teamthe support from the Chinese Government Scholarship.
文摘In this work,several key scaling laws of the quasi-static magnetic compression of field reversed configuration(FRC)plasma(Spencer et al 1983 Phys.Fluids 261564)are amended from a series of two-dimensional FRC MHD equilibriums numerically obtained using the Grad–Shafranov equation solver NIMEQ.Based on the new scaling for the elongation and the magnetic fields at the separatrix and the wall,the empirically stable limits for the compression ratio,the fusion gain,and the neutron yield are evaluated,which may serve as a more accurate estimate for the upper ceiling of performance from the magnetic compression of FRC plasma as a potential fusion energy as well as neutron source devices.
文摘There are challenges to the reliability evaluation for insulated gate bipolar transistors(IGBT)on electric vehicles,such as junction temperature measurement,computational and storage resources.In this paper,a junction temperature estimation approach based on neural network without additional cost is proposed and the lifetime calculation for IGBT using electric vehicle big data is performed.The direct current(DC)voltage,operation current,switching frequency,negative thermal coefficient thermistor(NTC)temperature and IGBT lifetime are inputs.And the junction temperature(T_(j))is output.With the rain flow counting method,the classified irregular temperatures are brought into the life model for the failure cycles.The fatigue accumulation method is then used to calculate the IGBT lifetime.To solve the limited computational and storage resources of electric vehicle controllers,the operation of IGBT lifetime calculation is running on a big data platform.The lifetime is then transmitted wirelessly to electric vehicles as input for neural network.Thus the junction temperature of IGBT under long-term operating conditions can be accurately estimated.A test platform of the motor controller combined with the vehicle big data server is built for the IGBT accelerated aging test.Subsequently,the IGBT lifetime predictions are derived from the junction temperature estimation by the neural network method and the thermal network method.The experiment shows that the lifetime prediction based on a neural network with big data demonstrates a higher accuracy than that of the thermal network,which improves the reliability evaluation of system.
基金supported by the Meteorological Soft Science Project(Grant No.2023ZZXM29)the Natural Science Fund Project of Tianjin,China(Grant No.21JCYBJC00740)the Key Research and Development-Social Development Program of Jiangsu Province,China(Grant No.BE2021685).
文摘As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards.