This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary ...This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.展开更多
In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the g...In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.展开更多
Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of ...Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.展开更多
In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the m...In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the main contributor to the stability of the slope.Then,two widening schemes are proposed,which are the steep slope with strong support and the gentle slope with general support schemes.The static/slope module of MIDAS GTS finite element analysis software and the strength reduction method were used to compare the two schemes.The results show that the steep slope with a strong support scheme has obvious advantages in land requisition,environmental protection,and safety and is more suitable for reconstructing and expanding the highway slope.展开更多
Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbase...Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbased methods are believed to be promising for detecting ethereum Ponzi schemes.However,there are still some flaws in current research,e.g.,insufficient feature extraction of Ponzi scheme smart contracts,without considering class imbalance.In addition,there is room for improvement in detection precision.Aiming at the above problems,this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting(AdaBoost)algorithm.Firstly,this paper uses the n-gram algorithm to extract more comprehensive contract opcode features and combine them with contract account features,which helps to improve the feature extraction effect.Meanwhile,adaptive synthetic sampling(ADASYN)is introduced to deal with class imbalanced data,and integrated with the Adaboost classifier.Finally,this paper uses the improved AdaBoost classifier for the identification of Ponzi scheme contracts.Experimentally,this paper tests our model in real-world smart contracts and compares it with representative methods in the aspect of F1-score and precision.Moreover,this article compares and discusses the state of art methods with our method in four aspects:data acquisition,data preprocessing,feature extraction,and classifier design.Both experiment and discussion validate the effectiveness of our model.展开更多
In this paper,a new type of finite difference mapped weighted essentially non-oscillatory(MWENO)schemes with unequal-sized stencils,such as the seventh-order and ninthorder versions,is constructed for solving hyperbol...In this paper,a new type of finite difference mapped weighted essentially non-oscillatory(MWENO)schemes with unequal-sized stencils,such as the seventh-order and ninthorder versions,is constructed for solving hyperbolic conservation laws.For the purpose of designing increasingly high-order finite difference WENO schemes,the equal-sized stencils are becoming more and more wider.The more we use wider candidate stencils,the bigger the probability of discontinuities lies in all stencils.Therefore,one innovation of these new WENO schemes is to introduce a new splitting stencil methodology to divide some fourpoint or five-point stencils into several smaller three-point stencils.By the usage of this new methodology in high-order spatial reconstruction procedure,we get different degree polynomials defined on these unequal-sized stencils,and calculate the linear weights,smoothness indicators,and nonlinear weights as specified in Jiang and Shu(J.Comput.Phys.126:202228,1996).Since the difference between the nonlinear weights and the linear weights is too big to keep the optimal order of accuracy in smooth regions,another crucial innovation is to present the new mapping functions which are used to obtain the mapped nonlinear weights and decrease the difference quantity between the mapped nonlinear weights and the linear weights,so as to keep the optimal order of accuracy in smooth regions.These new MWENO schemes can also be applied to compute some extreme examples,such as the double rarefaction wave problem,the Sedov blast wave problem,and the Leblanc problem with a normal CFL number.Extensive numerical results are provided to illustrate the good performance of the new finite difference MWENO schemes.展开更多
We search for analytical wave solutions of an electronically and biologically important model named as the Fitzhugh–Nagumo model with truncated M-fractional derivative, in which the expafunction and extended sinh-Gor...We search for analytical wave solutions of an electronically and biologically important model named as the Fitzhugh–Nagumo model with truncated M-fractional derivative, in which the expafunction and extended sinh-Gordon equation expansion(ESh GEE) schemes are utilized. The solutions obtained include dark, bright, dark-bright, periodic and other kinds of solitons. These analytical wave solutions are gained and verified with the use of Mathematica software. These solutions do not exist in literature. Some of the solutions are demonstrated by 2D, 3D and contour graphs. This model is mostly used in circuit theory, transmission of nerve impulses, and population genetics. Finally, both the schemes are more applicable, reliable and significant to deal with the fractional nonlinear partial differential equations.展开更多
We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH nume...We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH numerical fluxes have been recently proposed in[Garg et al.J Comput Phys 428,2021]in the context of secondorder semi-discrete finite-volume methods.The proposed adaptive diffusion CURH flux contains a smaller amount of numerical dissipation compared with the adaptive diffusion central numerical flux,which was also developed with the help of the discrete RankineHugoniot conditions and used in the fifth-order A-WENO scheme recently introduced in[Wang et al.SIAM J Sci Comput 42,2020].As in that work,we here use the fifth-order characteristic-wise WENO-Z interpolations to evaluate the fifth-order point values required by the numerical fluxes.The resulting one-and two-dimensional schemes are tested on a number of numerical examples,which clearly demonstrate that the new schemes outperform the existing fifth-order A-WENO schemes without compromising the robustness.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
There are five most widely used contact angle schemes in the pseudopotential lattice Boltzmann(LB)model for simulating the wetting phenomenon:The pseudopotential-based scheme(PB scheme),the improved virtualdensity sch...There are five most widely used contact angle schemes in the pseudopotential lattice Boltzmann(LB)model for simulating the wetting phenomenon:The pseudopotential-based scheme(PB scheme),the improved virtualdensity scheme(IVD scheme),the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the fluid layer density above the wall(MPB-C scheme),the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the weighted average density of surrounding fluid nodes(MPB-W scheme)and the geometric formulation scheme(GF scheme).But the numerical stability and accuracy of the schemes for wetting simulation remain unclear in the past.In this paper,the numerical stability and accuracy of these schemes are clarified for the first time,by applying the five widely used contact angle schemes to simulate a two-dimensional(2D)sessile droplet on wall and capillary imbibition in a 2D channel as the examples of static wetting and dynamic wetting simulations respectively.(i)It is shown that the simulated contact angles by the GF scheme are consistent at different density ratios for the same prescribed contact angle,but the simulated contact angles by the PB scheme,IVD scheme,MPB-C scheme and MPB-W scheme change with density ratios for the same fluid-solid interaction strength.The PB scheme is found to be the most unstable scheme for simulating static wetting at increased density ratios.(ii)Although the spurious velocity increases with the increased liquid/vapor density ratio for all the contact angle schemes,the magnitude of the spurious velocity in the PB scheme,IVD scheme and GF scheme are smaller than that in the MPB-C scheme and MPB-W scheme.(iii)The fluid density variation near the wall in the PB scheme is the most significant,and the variation can be diminished in the IVD scheme,MPB-C scheme andMPBWscheme.The variation totally disappeared in the GF scheme.(iv)For the simulation of capillary imbibition,the MPB-C scheme,MPB-Wscheme and GF scheme simulate the dynamics of the liquid-vapor interface well,with the GF scheme being the most accurate.The accuracy of the IVD scheme is low at a small contact angle(44 degrees)but gets high at a large contact angle(60 degrees).However,the PB scheme is the most inaccurate in simulating the dynamics of the liquid-vapor interface.As a whole,it is most suggested to apply the GF scheme to simulate static wetting or dynamic wetting,while it is the least suggested to use the PB scheme to simulate static wetting or dynamic wetting.展开更多
In this paper,we present a semi-Lagrangian(SL)method based on a non-polynomial function space for solving the Vlasov equation.We fnd that a non-polynomial function based scheme is suitable to the specifcs of the targe...In this paper,we present a semi-Lagrangian(SL)method based on a non-polynomial function space for solving the Vlasov equation.We fnd that a non-polynomial function based scheme is suitable to the specifcs of the target problems.To address issues that arise in phase space models of plasma problems,we develop a weighted essentially non-oscillatory(WENO)scheme using trigonometric polynomials.In particular,the non-polynomial WENO method is able to achieve improved accuracy near sharp gradients or discontinuities.Moreover,to obtain a high-order of accuracy in not only space but also time,it is proposed to apply a high-order splitting scheme in time.We aim to introduce the entire SL algorithm with high-order splitting in time and high-order WENO reconstruction in space to solve the Vlasov-Poisson system.Some numerical experiments are presented to demonstrate robustness of the proposed method in having a high-order of convergence and in capturing non-smooth solutions.A key observation is that the method can capture phase structure that require twice the resolution with a polynomial based method.In 6D,this would represent a signifcant savings.展开更多
In Mobile Communication Systems, inter-cell interference becomes one of the challenges that degrade the system’s performance, especially in the region with massive mobile users. The linear precoding schemes were prop...In Mobile Communication Systems, inter-cell interference becomes one of the challenges that degrade the system’s performance, especially in the region with massive mobile users. The linear precoding schemes were proposed to mitigate interferences between the base stations (inter-cell). These schemes are categorized into linear and non-linear;this study focused on linear precoding schemes, which are grounded into three types, namely Zero Forcing (ZF), Block Diagonalization (BD), and Signal Leakage Noise Ratio (SLNR). The study included the Cooperative Multi-cell Multi Input Multi Output (MIMO) System, whereby each Base Station serves more than one mobile station and all Base Stations on the system are assisted by each other by shared the Channel State Information (CSI). Based on the Multi-Cell Multiuser MIMO system, each Base Station on the cell is intended to maximize the data transmission rate by its mobile users by increasing the Signal Interference to Noise Ratio after the interference has been mitigated due to the usefully of linear precoding schemes on the transmitter. Moreover, these schemes used different approaches to mitigate interference. This study mainly concentrates on evaluating the performance of these schemes through the channel distribution models such as Ray-leigh and Rician included in the presence of noise errors. The results show that the SLNR scheme outperforms ZF and BD schemes overall scenario. This implied that when the value of SNR increased the performance of SLNR increased by 21.4% and 45.7% for ZF and BD respectively.展开更多
Sediment transport can be modelled using hydrodynamic models based on shallow water equations coupled with the sediment concentration conservation equation and the bed con-servation equation.The complete system of equ...Sediment transport can be modelled using hydrodynamic models based on shallow water equations coupled with the sediment concentration conservation equation and the bed con-servation equation.The complete system of equations is made up of the energy balance law and the Exner equations.The numerical solution for this complete system is done in a seg-regated manner.First,the hyperbolic part of the system of balance laws is solved using a finite volume scheme.Three ways to compute the numerical flux have been considered,the Q-scheme of van Leer,the HLLCS approximate Riemann solver,and the last one takes into account the presence of non-conservative products in the model.The discretisation of the source terms is carried out according to the numerical flux chosen.In the second stage,the bed conservation equation is solved by using the approximation computed for the system of balance laws.The numerical schemes have been validated making comparisons between the obtained numerical results and the experimental data for some physical experiments.The numerical results show a good agreement with the experimental data.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the...For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.展开更多
Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat...Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
基金supported by the NSFC grant 11801143J.Lu’s research is partially supported by the NSFC grant 11901213+3 种基金the National Key Research and Development Program of China grant 2021YFA1002900supported by the NSFC grant 11801140,12171177the Young Elite Scientists Sponsorship Program by Henan Association for Science and Technology of China grant 2022HYTP0009the Program for Young Key Teacher of Henan Province of China grant 2021GGJS067.
文摘This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.
基金supported by the Simons Foundation:Collaboration Grantssupported by the AFOSR grant FA9550-18-1-0383.
文摘In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.
文摘Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids.
文摘In this paper,the geological condition of the right-side slope of the K114+694–K115+162 section of Yong-tai-wen Expressway is investigated and analyzed with the results showing that the strength of rock mass is the main contributor to the stability of the slope.Then,two widening schemes are proposed,which are the steep slope with strong support and the gentle slope with general support schemes.The static/slope module of MIDAS GTS finite element analysis software and the strength reduction method were used to compare the two schemes.The results show that the steep slope with a strong support scheme has obvious advantages in land requisition,environmental protection,and safety and is more suitable for reconstructing and expanding the highway slope.
基金This work was supported by National Key R&D Program of China(Grant Numbers 2020YFB1005900,2022YFB3305802).
文摘Due to the anonymity of blockchain,frequent security incidents and attacks occur through it,among which the Ponzi scheme smart contract is a classic type of fraud resulting in huge economic losses.Machine learningbased methods are believed to be promising for detecting ethereum Ponzi schemes.However,there are still some flaws in current research,e.g.,insufficient feature extraction of Ponzi scheme smart contracts,without considering class imbalance.In addition,there is room for improvement in detection precision.Aiming at the above problems,this paper proposes an ethereum Ponzi scheme detection scheme through opcode context analysis and adaptive boosting(AdaBoost)algorithm.Firstly,this paper uses the n-gram algorithm to extract more comprehensive contract opcode features and combine them with contract account features,which helps to improve the feature extraction effect.Meanwhile,adaptive synthetic sampling(ADASYN)is introduced to deal with class imbalanced data,and integrated with the Adaboost classifier.Finally,this paper uses the improved AdaBoost classifier for the identification of Ponzi scheme contracts.Experimentally,this paper tests our model in real-world smart contracts and compares it with representative methods in the aspect of F1-score and precision.Moreover,this article compares and discusses the state of art methods with our method in four aspects:data acquisition,data preprocessing,feature extraction,and classifier design.Both experiment and discussion validate the effectiveness of our model.
基金the NSFC grant 11872210 and the Science Challenge Project,No.TZ2016002the NSFC Grant 11926103 when he visited Tianyuan Mathematical Center in Southeast China,Xiamen 361005,Fujian,Chinathe NSFC Grant 12071392 and the Science Challenge Project,No.TZ2016002.
文摘In this paper,a new type of finite difference mapped weighted essentially non-oscillatory(MWENO)schemes with unequal-sized stencils,such as the seventh-order and ninthorder versions,is constructed for solving hyperbolic conservation laws.For the purpose of designing increasingly high-order finite difference WENO schemes,the equal-sized stencils are becoming more and more wider.The more we use wider candidate stencils,the bigger the probability of discontinuities lies in all stencils.Therefore,one innovation of these new WENO schemes is to introduce a new splitting stencil methodology to divide some fourpoint or five-point stencils into several smaller three-point stencils.By the usage of this new methodology in high-order spatial reconstruction procedure,we get different degree polynomials defined on these unequal-sized stencils,and calculate the linear weights,smoothness indicators,and nonlinear weights as specified in Jiang and Shu(J.Comput.Phys.126:202228,1996).Since the difference between the nonlinear weights and the linear weights is too big to keep the optimal order of accuracy in smooth regions,another crucial innovation is to present the new mapping functions which are used to obtain the mapped nonlinear weights and decrease the difference quantity between the mapped nonlinear weights and the linear weights,so as to keep the optimal order of accuracy in smooth regions.These new MWENO schemes can also be applied to compute some extreme examples,such as the double rarefaction wave problem,the Sedov blast wave problem,and the Leblanc problem with a normal CFL number.Extensive numerical results are provided to illustrate the good performance of the new finite difference MWENO schemes.
文摘We search for analytical wave solutions of an electronically and biologically important model named as the Fitzhugh–Nagumo model with truncated M-fractional derivative, in which the expafunction and extended sinh-Gordon equation expansion(ESh GEE) schemes are utilized. The solutions obtained include dark, bright, dark-bright, periodic and other kinds of solitons. These analytical wave solutions are gained and verified with the use of Mathematica software. These solutions do not exist in literature. Some of the solutions are demonstrated by 2D, 3D and contour graphs. This model is mostly used in circuit theory, transmission of nerve impulses, and population genetics. Finally, both the schemes are more applicable, reliable and significant to deal with the fractional nonlinear partial differential equations.
基金The work of B.S.Wang and W.S.Don was partially supported by the Ocean University of China through grant 201712011The work of A.Kurganov was supported in part by NSFC grants 11771201 and 1201101343by the fund of the Guangdong Provincial Key Laboratory of Computational Science and Material Design(No.2019B030301001).
文摘We construct new fifth-order alternative WENO(A-WENO)schemes for the Euler equations of gas dynamics.The new scheme is based on a new adaptive diffusion centralupwind Rankine-Hugoniot(CURH)numerical flux.The CURH numerical fluxes have been recently proposed in[Garg et al.J Comput Phys 428,2021]in the context of secondorder semi-discrete finite-volume methods.The proposed adaptive diffusion CURH flux contains a smaller amount of numerical dissipation compared with the adaptive diffusion central numerical flux,which was also developed with the help of the discrete RankineHugoniot conditions and used in the fifth-order A-WENO scheme recently introduced in[Wang et al.SIAM J Sci Comput 42,2020].As in that work,we here use the fifth-order characteristic-wise WENO-Z interpolations to evaluate the fifth-order point values required by the numerical fluxes.The resulting one-and two-dimensional schemes are tested on a number of numerical examples,which clearly demonstrate that the new schemes outperform the existing fifth-order A-WENO schemes without compromising the robustness.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金sponsored by the National Natural Science Foundation of China under Grant No.52206101Shanghai Sailing Program under Grant No.20YF1431200the Experiments for Space Exploration Program and the Qian Xuesen Laboratory,China Academy of Space Technology under Grant No.TKTSPY-2020-01-01.
文摘There are five most widely used contact angle schemes in the pseudopotential lattice Boltzmann(LB)model for simulating the wetting phenomenon:The pseudopotential-based scheme(PB scheme),the improved virtualdensity scheme(IVD scheme),the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the fluid layer density above the wall(MPB-C scheme),the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the weighted average density of surrounding fluid nodes(MPB-W scheme)and the geometric formulation scheme(GF scheme).But the numerical stability and accuracy of the schemes for wetting simulation remain unclear in the past.In this paper,the numerical stability and accuracy of these schemes are clarified for the first time,by applying the five widely used contact angle schemes to simulate a two-dimensional(2D)sessile droplet on wall and capillary imbibition in a 2D channel as the examples of static wetting and dynamic wetting simulations respectively.(i)It is shown that the simulated contact angles by the GF scheme are consistent at different density ratios for the same prescribed contact angle,but the simulated contact angles by the PB scheme,IVD scheme,MPB-C scheme and MPB-W scheme change with density ratios for the same fluid-solid interaction strength.The PB scheme is found to be the most unstable scheme for simulating static wetting at increased density ratios.(ii)Although the spurious velocity increases with the increased liquid/vapor density ratio for all the contact angle schemes,the magnitude of the spurious velocity in the PB scheme,IVD scheme and GF scheme are smaller than that in the MPB-C scheme and MPB-W scheme.(iii)The fluid density variation near the wall in the PB scheme is the most significant,and the variation can be diminished in the IVD scheme,MPB-C scheme andMPBWscheme.The variation totally disappeared in the GF scheme.(iv)For the simulation of capillary imbibition,the MPB-C scheme,MPB-Wscheme and GF scheme simulate the dynamics of the liquid-vapor interface well,with the GF scheme being the most accurate.The accuracy of the IVD scheme is low at a small contact angle(44 degrees)but gets high at a large contact angle(60 degrees).However,the PB scheme is the most inaccurate in simulating the dynamics of the liquid-vapor interface.As a whole,it is most suggested to apply the GF scheme to simulate static wetting or dynamic wetting,while it is the least suggested to use the PB scheme to simulate static wetting or dynamic wetting.
基金AFOSR and NSF for their support of this work under grants FA9550-19-1-0281 and FA9550-17-1-0394 and NSF grant DMS 191218。
文摘In this paper,we present a semi-Lagrangian(SL)method based on a non-polynomial function space for solving the Vlasov equation.We fnd that a non-polynomial function based scheme is suitable to the specifcs of the target problems.To address issues that arise in phase space models of plasma problems,we develop a weighted essentially non-oscillatory(WENO)scheme using trigonometric polynomials.In particular,the non-polynomial WENO method is able to achieve improved accuracy near sharp gradients or discontinuities.Moreover,to obtain a high-order of accuracy in not only space but also time,it is proposed to apply a high-order splitting scheme in time.We aim to introduce the entire SL algorithm with high-order splitting in time and high-order WENO reconstruction in space to solve the Vlasov-Poisson system.Some numerical experiments are presented to demonstrate robustness of the proposed method in having a high-order of convergence and in capturing non-smooth solutions.A key observation is that the method can capture phase structure that require twice the resolution with a polynomial based method.In 6D,this would represent a signifcant savings.
文摘In Mobile Communication Systems, inter-cell interference becomes one of the challenges that degrade the system’s performance, especially in the region with massive mobile users. The linear precoding schemes were proposed to mitigate interferences between the base stations (inter-cell). These schemes are categorized into linear and non-linear;this study focused on linear precoding schemes, which are grounded into three types, namely Zero Forcing (ZF), Block Diagonalization (BD), and Signal Leakage Noise Ratio (SLNR). The study included the Cooperative Multi-cell Multi Input Multi Output (MIMO) System, whereby each Base Station serves more than one mobile station and all Base Stations on the system are assisted by each other by shared the Channel State Information (CSI). Based on the Multi-Cell Multiuser MIMO system, each Base Station on the cell is intended to maximize the data transmission rate by its mobile users by increasing the Signal Interference to Noise Ratio after the interference has been mitigated due to the usefully of linear precoding schemes on the transmitter. Moreover, these schemes used different approaches to mitigate interference. This study mainly concentrates on evaluating the performance of these schemes through the channel distribution models such as Ray-leigh and Rician included in the presence of noise errors. The results show that the SLNR scheme outperforms ZF and BD schemes overall scenario. This implied that when the value of SNR increased the performance of SLNR increased by 21.4% and 45.7% for ZF and BD respectively.
基金supported by the Spanish MICINN project MTM2013-43745-R and MTM2017-86459-Rthe Xunta de Galicia+1 种基金the FEDER under research project ED431C 2017/60-014supported by PRODEP project UAM-PTC-669
文摘Sediment transport can be modelled using hydrodynamic models based on shallow water equations coupled with the sediment concentration conservation equation and the bed con-servation equation.The complete system of equations is made up of the energy balance law and the Exner equations.The numerical solution for this complete system is done in a seg-regated manner.First,the hyperbolic part of the system of balance laws is solved using a finite volume scheme.Three ways to compute the numerical flux have been considered,the Q-scheme of van Leer,the HLLCS approximate Riemann solver,and the last one takes into account the presence of non-conservative products in the model.The discretisation of the source terms is carried out according to the numerical flux chosen.In the second stage,the bed conservation equation is solved by using the approximation computed for the system of balance laws.The numerical schemes have been validated making comparisons between the obtained numerical results and the experimental data for some physical experiments.The numerical results show a good agreement with the experimental data.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(62033010)Qing Lan Project of Jiangsu Province(R2023Q07)。
文摘For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.
基金supported by the National Science Foundation of China(Grant No.42230606)。
文摘Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.