Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to ident...Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly.展开更多
To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method ...To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model.展开更多
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt...Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse.展开更多
In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by speciali...In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by specializing certain parameters in the two transformations,four Rogers-Ramanujan type identities associated with moduli 20 are obtained.展开更多
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli an...This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions.展开更多
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ...Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography.展开更多
Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral or...Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral organ identity genes is regulated during flower development.In this study,we identified a gene named SUPER WOMAN 2(SPW2),which is necessary for spikelet/floret development in rice by participating in the regulation of the expression of pistil identity genes such as OsMADS3,OsMADS13,OsMADS58 and DL.In the spw2 mutant,ectopic stigma/ovary-like tissues were observed in the non-pistil organs,including sterile lemma,lemma,palea,lodicule,and stamen,suggesting that the identities of these organs were severely affected by mutations in SPW2.SPW2 was shown to encode a plant-specific EMF1-like protein that is involved in H3K27me3 modification as an important component of the PRC2 complex.Expression analysis showed that the SPW2 mutation led to the ectopic expression of OsMADS3,OsMADS13,OsMADS58,and DL in non-pistil organs of the spikelet.The ChIP-qPCR results showed significant reductions in the levels of H3K27me3 modification on the chromatin of these genes.Thus,we demonstrated that SPW2 can mediate the process of H3K27me3 modification of pistil-related genes to regulate their expression in non-pistil organs of spikelets in rice.The results of this study expand our understanding of the molecular mechanism by which SPW2 regulates floral organ identity genes through epigenetic regulation.展开更多
BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on thei...BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on their gender development.AIM To investigate the current situation of gender identity in lower primary school children by conducting a survey of 202 hospitalized children in the lower grades and to provide a theoretical basis and foundation for the cultivation of gender identity and medical treatment of children based on the results.This study aims to inspire clinical medical staff to scientifically and reasonably arrange hospital wards for lower primary school children and pay attention to gender protection during the medical treatment process and to help children shape a unified and clear gender identity,which will enable them to better integrate into society and promote their personality development.METHODS The gender consciousness scale for elementary and middle school students was RESULTS Gender identity was already present in lower primary school children.The children's gender roles and gender equality consciousness were strong,exceeding the critical value,but their gender characteristics,gender identity,and gender ideal consciousness were weak.Children aged 6 had the weakest gender identity,and girls had significantly stronger gender identity than boys.CONCLUSION Gender identity is already present in lower primary school children,providing a basis and inspiration for the cultivation of gender identity and medical treatment of lower primary school children.Clinical medical staff should be aware of and understand these results and should scientifically and reasonably arrange hospital wards for lower primary school children.展开更多
Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has bec...Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has become an important task in promoting their development.A questionnaire survey was conducted using stratified cluster random sampling on three middle schools by class in Zhejiang Province,China to investigate the impact of exercise atmosphere(EA)on adolescents’exercise behavior and the mediating role of exercise identity(EI)and exercise habit(EH).806 adolescents were investigated by the Exercise Atmosphere Scale(EAS),Exercise-Identity Scale(EIS),Self-Report Habit Index(SRHI),and Physical Activity Rating Scale(PARS-3).The results show that:There is a significant positive correlation between each two of exercise atmosphere,exercise identity,exercise habit,and exercise behavior(p<0.05).Exercise atmosphere could not only directly affect adolescents’physical exercise behavior but can also indirectly affect their physical exercise behavior through the mediating effect of exercise identity and exercise habit,involving three mediating pathways,namely,the mediating path through exercise identity,the mediating pathway through exercise habit and the chain mediating pathway through exercise identity and exercise habit.The direct effect of exercise atmosphere on exercise behavior was 0.459(p<0.01),accounting for 62.62% of the total effect of 0.733,and its indirect effect was 0.274,accounting for 37.28% of the total effect.To a certain extent,the mediating effect model reveals the mechanism of exercise atmosphere affecting exercise behavior and has a certain reference value for promoting adolescents’exercise behavior.We should start by creating an exercise atmosphere,cultivating exercise identity,and enhancing exercise habits to help teenagers form active physical exercise behaviors.展开更多
In this paper,we firstly establish a combinatorial identity with a free parameter x,and then by means of derivative operation,several summation formulae concerning classical and generalized harmonic numbers,as well as...In this paper,we firstly establish a combinatorial identity with a free parameter x,and then by means of derivative operation,several summation formulae concerning classical and generalized harmonic numbers,as well as binomial coefficients are derived.展开更多
The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake...The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake;however,rare work has been devoted to this subject due to lack of attention.In this study,experimental investigations on shear strength weakening of discontinuities with different joint wall material(DDJM)under cyclic loading were conducted by taking the interface between siltstone and mudstone in the Shaba slope of Yunnan Province,China as research objects.A total of 99 pairs of similar material samples of DDJM(81 pairs)and discontinuities with identical joint wall material(DIJM)(18 pairs)were fabricated by inserting plates,engraved with typical surface morphology obtained by performing three-dimensional laser scanning on natural DDJMs sampled from field,into mold boxes.Cyclic shear tests were conducted on these samples to study their shear strength changes with the cyclic number considering the effects of normal stress,joint surface morphology,shear displacement amplitude and shear rate.The results indicate that the shear stress vs.shear displacement curves under each shear cycle and the peak shear strength vs.cyclic number curves of the studied DDJMs are between those of DIJMs with siltstone and mudstone,while closer to those of DIJMs with mudstone.The peak shear strengths of DDJMs exhibit an initial rapid decline followed by a gradual decrease with the cyclic number and the decrease rate varies from 6%to 55.9%for samples with varied surface morphology under different testing conditions.The normal stress,joint surface morphology,shear displacement amplitude and shear rate collectively influence the shear strength deterioration of DDJM under cyclic shear loading,with the degree of influence being greater for larger normal stress,rougher surface morphology,larger shear displacement amplitude and faster shear rate.展开更多
In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,wh...In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,which forecasts individual economic behavior and formulates economic policies based on societal standards of age,is put to the test by this disparity.This study,which draws from the China Longitudinal Aging Society Survey(CLASS),examines the factors,processes,and improvement strategies that affect how older people choose to work.The following are our conclusions:(i)Chinese elderly believe their old age starts from 70 years on average;delaying perceived old age is a denial of aging and raises the likelihood of finding work.Elders who are youthful at heart have a 2.4%higher chance of remaining employed than elders who are old at heart.(ii)In contrast to old-at-heart elders,young-at-heart elders are more likely to maintain their middle-age lifestyles,continue working,become motivated to engage in social activities,and gain the confidence to face challenges and continue in their career.(iii)If the perceived old age is above 70 years,the milestone event of aging is retirement from work,and there are external pressures,particularly pressures from family intergenerational support,the perception of old age will have a more proactive impact on older workers.(iv)Despite rising pension benefits,older people’s decision to remain in the workforce is still heavily influenced by their perception of their age.However,this effect is notably gender-specific,as older women’s decision to remain in the workforce is not greatly influenced by their own perception of their age.展开更多
Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideolog...Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests.展开更多
Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,whi...Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,while outdoor things allow fluid identities;these things reveal Woolf’s dual identity as both a rebel against and a ruler of the hierarchical system.On the intersubjective level,subjects are linked through common aesthetic experience mediated by things,which enjoys a high degree of arbitrariness.With the help of things,subjects form an“imagined community”.Concerning the relationship between things and the mind,things also endow order in the fragmented reality,yet in this sense they are abstract,metaphysical and universal rather than specific in Virginia Woolf’s thoughts.They are the withdrawn things expressed by sensual qualities.These sensual aspects,however,are tools to reveal the essence and meaning of life,secondary to the mind.展开更多
This article’s primary objective is to answer the question of what is the semantic language of identity and interests of Turkey and Georgia?In addition,it analyzes the connotative quotes that exchanged between the tw...This article’s primary objective is to answer the question of what is the semantic language of identity and interests of Turkey and Georgia?In addition,it analyzes the connotative quotes that exchanged between the two countries during diplomatic visits.Because the article concentrated on the remarks that were stressed during visits and meetings that took place between the years 2002 and 2022,it was necessary to search through 150 news on civil.ge site and filter down to 35 news before applying the content analysis.The AntConc corpus analysis was used in order to comprehend the nature of the political conversation between both countries.According to the findings,the constructivism of core theme that claim states view each other via the identity through interaction was verified.The purpose of the research is to provide a contribution to the study of the identities and interests of Georgia and Turkey who are good neighbors.展开更多
Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities a...Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities are placed in relation to it,has been one of the most prominent of these elements of Iranian identity.A second constitutive factor has been the role of the state as a deliberate crafter of cultural,in turn directly influencing the salience,interpretation,extent,and direction of modernity,or its antithesis,in Iran.Equally defining has been the role and significance of religion,which has emerged as a marker of individual and collective,as well as political,identities.Nationalism,and its compelling impulse across Iranian society especially from the early 1900s and continuing until today,has also emerged as an integral and inseparable feature of Iranian identity.Together,these four elements―modernity,a culturally intrusive state,religion and religiosity,and nationalism―constitute fluid yet constant,sometimes complementary and sometimes competing,dimensions of Iranian identity.展开更多
This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s r...This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s representation of sound and its significance on characterization,plot,and theme in Song of Solomon.Morrison’s literary sounds-voices of oral storytelling,the sound of music,and the protagonist Milkman Dead’s listening experiences are deeply rooted in African American sound culture.A close analysis of her sound writing in Song of Solomon helps to give the reader a glimpse of the soundscape of African American culture as well as the vital role listening plays in African American survival,endurance,and cultural identification.展开更多
The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national bo...The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national borders.Among evangelical denominations that stand out in this scenario are Pentecostal churches,which have developed intense missionary activity in several countries,including Europe.In this article,we intend to analyze features and challenges of Brazilian evangelical churches:World Cathedral of Hope(CIME)(Catedral Mundial da Esperança-ICME)and Assembly of God Victory in Christ(ADVEC)(Assembleia de Deus Vitória em Cristo-ADVEC)that operate in Portugal,seeking to understand issues of identity and belonging of these communities,their models of transnationalization,its evangelization strategies and its adaptations to Portuguese context,in the period from 2000 to 2020.展开更多
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac...Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings.展开更多
基金This project was supported by the Talent Foundation of Anhui Province(2004Z025)
文摘Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly.
文摘To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model.
基金supported by“Regional Innovation Strategy(RIS)”through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(MOE)(2021RIS-004)supported by the Technology Development Program(S3230339)funded by the Ministry of SMEs and Startups(MSS,Korea).
文摘Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse.
基金supported by the National Natural Science Foundation of China(12271234)。
文摘In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by specializing certain parameters in the two transformations,four Rogers-Ramanujan type identities associated with moduli 20 are obtained.
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.
基金supported by the Science and Technology Development Fund of Macao SAR(FDCT0128/2022/A,0020/2023/RIB1,0111/2023/AFJ,005/2022/ALC)the Shandong Natural Science Foundation of China(ZR2020MA004)+2 种基金the National Natural Science Foundation of China(12071272)the MYRG 2018-00168-FSTZhejiang Provincial Natural Science Foundation of China(LQ23A010014).
文摘This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions.
基金This work was supported by the Defense Industrial Technology Development Program(Grant No.JCKY2021208B036).
文摘Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography.
基金supported by the Chongqing Modern Agricultural Industry Technology System,China(CQMAITS202301)the National Natural Science Foundation of China(32100287 and 31971919)+2 种基金the Natural Science Foundation of Chongqing,China(cstc2020jcyj-jq X0020 and cstc2021ycjh-bgzxm0066)the China Postdoctoral Science Foundation Funded Project(2020M683219)the Fundamental Research Funds for the Central Universities,China(SWU-XDJH202315)。
文摘Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral organ identity genes is regulated during flower development.In this study,we identified a gene named SUPER WOMAN 2(SPW2),which is necessary for spikelet/floret development in rice by participating in the regulation of the expression of pistil identity genes such as OsMADS3,OsMADS13,OsMADS58 and DL.In the spw2 mutant,ectopic stigma/ovary-like tissues were observed in the non-pistil organs,including sterile lemma,lemma,palea,lodicule,and stamen,suggesting that the identities of these organs were severely affected by mutations in SPW2.SPW2 was shown to encode a plant-specific EMF1-like protein that is involved in H3K27me3 modification as an important component of the PRC2 complex.Expression analysis showed that the SPW2 mutation led to the ectopic expression of OsMADS3,OsMADS13,OsMADS58,and DL in non-pistil organs of the spikelet.The ChIP-qPCR results showed significant reductions in the levels of H3K27me3 modification on the chromatin of these genes.Thus,we demonstrated that SPW2 can mediate the process of H3K27me3 modification of pistil-related genes to regulate their expression in non-pistil organs of spikelets in rice.The results of this study expand our understanding of the molecular mechanism by which SPW2 regulates floral organ identity genes through epigenetic regulation.
文摘BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on their gender development.AIM To investigate the current situation of gender identity in lower primary school children by conducting a survey of 202 hospitalized children in the lower grades and to provide a theoretical basis and foundation for the cultivation of gender identity and medical treatment of children based on the results.This study aims to inspire clinical medical staff to scientifically and reasonably arrange hospital wards for lower primary school children and pay attention to gender protection during the medical treatment process and to help children shape a unified and clear gender identity,which will enable them to better integrate into society and promote their personality development.METHODS The gender consciousness scale for elementary and middle school students was RESULTS Gender identity was already present in lower primary school children.The children's gender roles and gender equality consciousness were strong,exceeding the critical value,but their gender characteristics,gender identity,and gender ideal consciousness were weak.Children aged 6 had the weakest gender identity,and girls had significantly stronger gender identity than boys.CONCLUSION Gender identity is already present in lower primary school children,providing a basis and inspiration for the cultivation of gender identity and medical treatment of lower primary school children.Clinical medical staff should be aware of and understand these results and should scientifically and reasonably arrange hospital wards for lower primary school children.
文摘Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has become an important task in promoting their development.A questionnaire survey was conducted using stratified cluster random sampling on three middle schools by class in Zhejiang Province,China to investigate the impact of exercise atmosphere(EA)on adolescents’exercise behavior and the mediating role of exercise identity(EI)and exercise habit(EH).806 adolescents were investigated by the Exercise Atmosphere Scale(EAS),Exercise-Identity Scale(EIS),Self-Report Habit Index(SRHI),and Physical Activity Rating Scale(PARS-3).The results show that:There is a significant positive correlation between each two of exercise atmosphere,exercise identity,exercise habit,and exercise behavior(p<0.05).Exercise atmosphere could not only directly affect adolescents’physical exercise behavior but can also indirectly affect their physical exercise behavior through the mediating effect of exercise identity and exercise habit,involving three mediating pathways,namely,the mediating path through exercise identity,the mediating pathway through exercise habit and the chain mediating pathway through exercise identity and exercise habit.The direct effect of exercise atmosphere on exercise behavior was 0.459(p<0.01),accounting for 62.62% of the total effect of 0.733,and its indirect effect was 0.274,accounting for 37.28% of the total effect.To a certain extent,the mediating effect model reveals the mechanism of exercise atmosphere affecting exercise behavior and has a certain reference value for promoting adolescents’exercise behavior.We should start by creating an exercise atmosphere,cultivating exercise identity,and enhancing exercise habits to help teenagers form active physical exercise behaviors.
基金Supported by Zhoukou Normal University High-Level Talents Start-Up Funds Research Project(Grant No.ZKNUC2022007)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX240725).
文摘In this paper,we firstly establish a combinatorial identity with a free parameter x,and then by means of derivative operation,several summation formulae concerning classical and generalized harmonic numbers,as well as binomial coefficients are derived.
基金supported by the National Natural Science Foundation of China(Grant Nos.42377182,52079133 and 41931295).
文摘The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake;however,rare work has been devoted to this subject due to lack of attention.In this study,experimental investigations on shear strength weakening of discontinuities with different joint wall material(DDJM)under cyclic loading were conducted by taking the interface between siltstone and mudstone in the Shaba slope of Yunnan Province,China as research objects.A total of 99 pairs of similar material samples of DDJM(81 pairs)and discontinuities with identical joint wall material(DIJM)(18 pairs)were fabricated by inserting plates,engraved with typical surface morphology obtained by performing three-dimensional laser scanning on natural DDJMs sampled from field,into mold boxes.Cyclic shear tests were conducted on these samples to study their shear strength changes with the cyclic number considering the effects of normal stress,joint surface morphology,shear displacement amplitude and shear rate.The results indicate that the shear stress vs.shear displacement curves under each shear cycle and the peak shear strength vs.cyclic number curves of the studied DDJMs are between those of DIJMs with siltstone and mudstone,while closer to those of DIJMs with mudstone.The peak shear strengths of DDJMs exhibit an initial rapid decline followed by a gradual decrease with the cyclic number and the decrease rate varies from 6%to 55.9%for samples with varied surface morphology under different testing conditions.The normal stress,joint surface morphology,shear displacement amplitude and shear rate collectively influence the shear strength deterioration of DDJM under cyclic shear loading,with the degree of influence being greater for larger normal stress,rougher surface morphology,larger shear displacement amplitude and faster shear rate.
基金supported by the General Project of the National Social Science Fund of China(NSSFC)(Grant No.19BRK028)Humanities and Social Science Research Youth Fund Project of the Ministry of Education:“Study on the Trends and Management of Population Outflow in China’s Border Regions”(Grant No.21YJC840021).
文摘In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,which forecasts individual economic behavior and formulates economic policies based on societal standards of age,is put to the test by this disparity.This study,which draws from the China Longitudinal Aging Society Survey(CLASS),examines the factors,processes,and improvement strategies that affect how older people choose to work.The following are our conclusions:(i)Chinese elderly believe their old age starts from 70 years on average;delaying perceived old age is a denial of aging and raises the likelihood of finding work.Elders who are youthful at heart have a 2.4%higher chance of remaining employed than elders who are old at heart.(ii)In contrast to old-at-heart elders,young-at-heart elders are more likely to maintain their middle-age lifestyles,continue working,become motivated to engage in social activities,and gain the confidence to face challenges and continue in their career.(iii)If the perceived old age is above 70 years,the milestone event of aging is retirement from work,and there are external pressures,particularly pressures from family intergenerational support,the perception of old age will have a more proactive impact on older workers.(iv)Despite rising pension benefits,older people’s decision to remain in the workforce is still heavily influenced by their perception of their age.However,this effect is notably gender-specific,as older women’s decision to remain in the workforce is not greatly influenced by their own perception of their age.
文摘Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests.
文摘Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,while outdoor things allow fluid identities;these things reveal Woolf’s dual identity as both a rebel against and a ruler of the hierarchical system.On the intersubjective level,subjects are linked through common aesthetic experience mediated by things,which enjoys a high degree of arbitrariness.With the help of things,subjects form an“imagined community”.Concerning the relationship between things and the mind,things also endow order in the fragmented reality,yet in this sense they are abstract,metaphysical and universal rather than specific in Virginia Woolf’s thoughts.They are the withdrawn things expressed by sensual qualities.These sensual aspects,however,are tools to reveal the essence and meaning of life,secondary to the mind.
文摘This article’s primary objective is to answer the question of what is the semantic language of identity and interests of Turkey and Georgia?In addition,it analyzes the connotative quotes that exchanged between the two countries during diplomatic visits.Because the article concentrated on the remarks that were stressed during visits and meetings that took place between the years 2002 and 2022,it was necessary to search through 150 news on civil.ge site and filter down to 35 news before applying the content analysis.The AntConc corpus analysis was used in order to comprehend the nature of the political conversation between both countries.According to the findings,the constructivism of core theme that claim states view each other via the identity through interaction was verified.The purpose of the research is to provide a contribution to the study of the identities and interests of Georgia and Turkey who are good neighbors.
文摘Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities are placed in relation to it,has been one of the most prominent of these elements of Iranian identity.A second constitutive factor has been the role of the state as a deliberate crafter of cultural,in turn directly influencing the salience,interpretation,extent,and direction of modernity,or its antithesis,in Iran.Equally defining has been the role and significance of religion,which has emerged as a marker of individual and collective,as well as political,identities.Nationalism,and its compelling impulse across Iranian society especially from the early 1900s and continuing until today,has also emerged as an integral and inseparable feature of Iranian identity.Together,these four elements―modernity,a culturally intrusive state,religion and religiosity,and nationalism―constitute fluid yet constant,sometimes complementary and sometimes competing,dimensions of Iranian identity.
文摘This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s representation of sound and its significance on characterization,plot,and theme in Song of Solomon.Morrison’s literary sounds-voices of oral storytelling,the sound of music,and the protagonist Milkman Dead’s listening experiences are deeply rooted in African American sound culture.A close analysis of her sound writing in Song of Solomon helps to give the reader a glimpse of the soundscape of African American culture as well as the vital role listening plays in African American survival,endurance,and cultural identification.
文摘The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national borders.Among evangelical denominations that stand out in this scenario are Pentecostal churches,which have developed intense missionary activity in several countries,including Europe.In this article,we intend to analyze features and challenges of Brazilian evangelical churches:World Cathedral of Hope(CIME)(Catedral Mundial da Esperança-ICME)and Assembly of God Victory in Christ(ADVEC)(Assembleia de Deus Vitória em Cristo-ADVEC)that operate in Portugal,seeking to understand issues of identity and belonging of these communities,their models of transnationalization,its evangelization strategies and its adaptations to Portuguese context,in the period from 2000 to 2020.
基金supported by the National Key Research and Development Program of China under Grant No.2021YFB2700600the National Natural Science Foundation of China under Grant No.62132013+5 种基金the Key Research and Development Programs of Shaanxi under Grant Nos.S2024-YF-YBGY-1540 and 2021ZDLGY06-03the Basic Strengthening Plan Program under Grant No.2023-JCJQ-JJ-0772the Key-Area Research and Development Program of Guangdong Province under Grant No.2021B0101400003Hong Kong RGC Research Impact Fund under Grant Nos.R5060-19 and R5034-18Areas of Excellence Scheme under Grant No.Ao E/E-601/22-RGeneral Research Fund under Grant Nos.152203/20E,152244/21E,152169/22E and152228/23E。
文摘Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings.