Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
The simulation of hypersonic flows with fully unstructured(tetrahedral)grids has severe problems with respect to the prediction of stagnation region heating,due to the random face orientation without alignment to the ...The simulation of hypersonic flows with fully unstructured(tetrahedral)grids has severe problems with respect to the prediction of stagnation region heating,due to the random face orientation without alignment to the bow shock.To improve the accuracy of aero-heating predictions,three multi-dimensional approaches on unstructured grids are coupled in our Reynolds-averaged Navier-Stokes(RANS)solver,including multi-dimensional upwind flux reconstruction(MUP),multi-dimensional limiter(MLP-u2)and multi-dimensional gradient reconstruction(MLR).The coupled multi-dimensional RANS solver is validated by several typical verification and validation(V&V)cases,including hypersonic flows over a cylinder,a blunt biconic,and a double-ellipsoid,with commonly used prism/tetrahedral hybrid grids.Finally,the coupled multi-dimensional solver is applied to simulating the heat flux distribution over a 3D engineering configuration,i.e.a Hermes-like space shuttle model.The obtained numerical results are compared with experimental data.The predicted results demonstrate that the coupled multi-dimensional approach has a good prediction capability on aerodynamic heating over a wide range of complex engineering configurations.展开更多
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in...Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.展开更多
For the two-dimensional(2D)scalar conservation law,when the initial data contain two different constant states and the initial discontinuous curve is a general curve,then complex structures of wave interactions will b...For the two-dimensional(2D)scalar conservation law,when the initial data contain two different constant states and the initial discontinuous curve is a general curve,then complex structures of wave interactions will be generated.In this paper,by proposing and investigating the plus envelope,the minus envelope,and the mixed envelope of 2D non-selfsimilar rarefaction wave surfaces,we obtain and the prove the new structures and classifications of interactions between the 2D non-selfsimilar shock wave and the rarefaction wave.For the cases of the plus envelope and the minus envelope,we get and prove the necessary and sufficient criterion to judge these two envelopes and correspondingly get more general new structures of 2D solutions.展开更多
Hash chain and its generalization—Multi-Dimensional Hash Chain (MDHC) have been widely used in the design of micropayment due to its simplicity and efficiency. In this letter, a more efficient variant of MDHC, called...Hash chain and its generalization—Multi-Dimensional Hash Chain (MDHC) have been widely used in the design of micropayment due to its simplicity and efficiency. In this letter, a more efficient variant of MDHC, called WMDHC, which endows in the structure of MDHC a weight value for each hash value through a well-defined mapping, is proposed. The average hash operation number of WMDHC is log(2 m / t ),which is better than log( m )of MDHC when the parameter t is typically suggested as t = 7.展开更多
According to the standards of engineering education accreditation,the achievement paths and evaluation criteria of course goals are presented,aimed at the objectives of software engineering courses and the characteris...According to the standards of engineering education accreditation,the achievement paths and evaluation criteria of course goals are presented,aimed at the objectives of software engineering courses and the characteristics of hybrid teaching in Kunming University of Science and Technology.Then a multi-dimensional evaluation system for course goal achievement of software engineering is proposed.The practice’s results show that the multi-dimensional course goal achievement evaluation is helpful to the continuous improvement of course teaching,which can effectively support the evaluation of graduation outcomes.展开更多
Predictive Maintenance is a type of condition-based maintenance that assesses the equipment's states and estimates its failure probability and when maintenance should be performed.Although machine learning techniq...Predictive Maintenance is a type of condition-based maintenance that assesses the equipment's states and estimates its failure probability and when maintenance should be performed.Although machine learning techniques have been frequently implemented in this area,the existing studies disregard to the nat-ural order between the target attribute values of the historical sensor data.Thus,these methods cause losing the inherent order of the data that positively affects the prediction performances.To deal with this problem,a novel approach,named Ordinal Multi-dimensional Classification(OMDC),is proposed for estimating the conditions of a hydraulic system's four components by taking into the natural order of class values.To demonstrate the prediction ability of the proposed approach,eleven different multi-dimensional classification algorithms(traditional Binary Relevance(BR),Classifier Chain(CC),Bayesian Classifier Chain(BCC),Monte Carlo Classifier Chain(MCC),Probabilistic Classifier Chain(PCC),Clas-sifier Dependency Network(CDN),Classifier Trellis(CT),Classifier Dependency Trellis(CDT),Label Powerset(LP),Pruned Sets(PS),and Random k-Labelsets(RAKEL))were implemented using the Ordinal Class Classifier(OCC)algorithm.Besides,seven different classification algorithms(Multilayer Perceptron(MLP),Support Vector Machine(SVM),k-Nearest Neighbour(kNN),Decision Tree(C4.5),Bagging,Random Forest(RF),and Adaptive Boosting(AdaBoost))were chosen as base learners for the OCC algorithm.The experimental results present that the proposed OMDC approach using binary relevance multi-dimensional classification methods predicts the conditions of a hydraulic system's multiple components with high accuracy.Also,it is clearly seen from the results that the OMDC models that utilize ensemble-based classification algorithms give more reliable prediction performances with an average Hamming score of 0.853 than the others that use traditional algorithms as base learners.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
Since its inception in the 1970s,multi-dimensional magnetic resonance(MR)has emerged as a powerful tool for non-invasive investigations of structures and molecular interactions.MR spectroscopy beyond one dimension all...Since its inception in the 1970s,multi-dimensional magnetic resonance(MR)has emerged as a powerful tool for non-invasive investigations of structures and molecular interactions.MR spectroscopy beyond one dimension allows the study of the correlation,exchange processes,and separation of overlapping spectral information.The multi-dimensional concept has been re-implemented over the last two decades to explore molecular motion and spin dynamics in porous media.Apart from Fourier transform,methods have been developed for processing the multi-dimensional time-domain data,identifying the fluid components,and estimating pore surface permeability via joint relaxation and diffusion spectra.Through the resolution of spectroscopic signals with spatial encoding gradients,multi-dimensional MR imaging has been widely used to investigate the microscopic environment of living tissues and distinguish diseases.Signals in each voxel are usually expressed as multi-exponential decay,representing microstructures or environments along multiple pore scales.The separation of contributions from different environments is a common ill-posed problem,which can be resolved numerically.Moreover,the inversion methods and experimental parameters determine the resolution of multi-dimensional spectra.This paper reviews the algorithms that have been proposed to process multidimensional MR datasets in different scenarios.Detailed information at the microscopic level,such as tissue components,fluid types and food structures in multi-disciplinary sciences,could be revealed through multi-dimensional MR.展开更多
We address the issue of point value reconstructions from cell averages in the context of third-order finite volume schemes,focusing in particular on the cells close to the boundaries of the domain.In fact,most techniq...We address the issue of point value reconstructions from cell averages in the context of third-order finite volume schemes,focusing in particular on the cells close to the boundaries of the domain.In fact,most techniques in the literature rely on the creation of ghost cells outside the boundary and on some form of extrapolation from the inside that,taking into account the boundary conditions,fills the ghost cells with appropriate values,so that a standard reconstruction can be applied also in the boundary cells.In Naumann et al.(Appl.Math.Comput.325:252–270.https://doi.org/10.1016/j.amc.2017.12.041,2018),motivated by the difficulty of choosing appropriate boundary conditions at the internal nodes of a network,a different technique was explored that avoids the use of ghost cells,but instead employs for the boundary cells a different stencil,biased towards the interior of the domain.In this paper,extending that approach,which does not make use of ghost cells,we propose a more accurate reconstruction for the one-dimensional case and a two-dimensional one for Cartesian grids.In several numerical tests,we compare the novel reconstruction with the standard approach using ghost cells.展开更多
Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do ...Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.展开更多
We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the...We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.展开更多
The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2)emissions.Although solar energy is a clean and renewable res...The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2)emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2)reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2)into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].展开更多
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the...For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.展开更多
Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat...Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.展开更多
The multi-dimensional system of nonlinear partial differential equations is considered. In two-dimensional case, this system describes process of vein formation in higher plants. Variable directions finite difference ...The multi-dimensional system of nonlinear partial differential equations is considered. In two-dimensional case, this system describes process of vein formation in higher plants. Variable directions finite difference scheme is constructed. The stability and convergence of that scheme are studied. Numerical experiments are carried out. The appropriate graphical illustrations and tables are given.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金the National Key Research&Development Program of China(2016YFB020071)the National Natural Science Foundation of China(Grants 11532016 and 11702315).
文摘The simulation of hypersonic flows with fully unstructured(tetrahedral)grids has severe problems with respect to the prediction of stagnation region heating,due to the random face orientation without alignment to the bow shock.To improve the accuracy of aero-heating predictions,three multi-dimensional approaches on unstructured grids are coupled in our Reynolds-averaged Navier-Stokes(RANS)solver,including multi-dimensional upwind flux reconstruction(MUP),multi-dimensional limiter(MLP-u2)and multi-dimensional gradient reconstruction(MLR).The coupled multi-dimensional RANS solver is validated by several typical verification and validation(V&V)cases,including hypersonic flows over a cylinder,a blunt biconic,and a double-ellipsoid,with commonly used prism/tetrahedral hybrid grids.Finally,the coupled multi-dimensional solver is applied to simulating the heat flux distribution over a 3D engineering configuration,i.e.a Hermes-like space shuttle model.The obtained numerical results are compared with experimental data.The predicted results demonstrate that the coupled multi-dimensional approach has a good prediction capability on aerodynamic heating over a wide range of complex engineering configurations.
文摘Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.
基金supported in part by the NSFC(Grant No.11471332)The research of Gao-wei Cao was supported in part by the NSFC(Grant No.11701551).
文摘For the two-dimensional(2D)scalar conservation law,when the initial data contain two different constant states and the initial discontinuous curve is a general curve,then complex structures of wave interactions will be generated.In this paper,by proposing and investigating the plus envelope,the minus envelope,and the mixed envelope of 2D non-selfsimilar rarefaction wave surfaces,we obtain and the prove the new structures and classifications of interactions between the 2D non-selfsimilar shock wave and the rarefaction wave.For the cases of the plus envelope and the minus envelope,we get and prove the necessary and sufficient criterion to judge these two envelopes and correspondingly get more general new structures of 2D solutions.
基金Supported by the National Natural Science Foundation of China (No.60373041 & 90104034) and the Research Foundation for Outstanding Young Teachers, China University of Geosciences (Wuhan).
文摘Hash chain and its generalization—Multi-Dimensional Hash Chain (MDHC) have been widely used in the design of micropayment due to its simplicity and efficiency. In this letter, a more efficient variant of MDHC, called WMDHC, which endows in the structure of MDHC a weight value for each hash value through a well-defined mapping, is proposed. The average hash operation number of WMDHC is log(2 m / t ),which is better than log( m )of MDHC when the parameter t is typically suggested as t = 7.
基金supported by the Undergraduate Education and Teaching Reform Research Project of Yunnan Province(JG2023157)Support Program for Yunnan Talents(CA23138L010A)+2 种基金Yunnan Higher Education Undergraduate Teaching Achievement Project(202246)National First class Undergraduate Course Construction Project of Software Engineering(109620210004)Software Engineering Virtual Teaching and Research Office Construction Project of Kunming University of Science and Technology(109620220031)。
文摘According to the standards of engineering education accreditation,the achievement paths and evaluation criteria of course goals are presented,aimed at the objectives of software engineering courses and the characteristics of hybrid teaching in Kunming University of Science and Technology.Then a multi-dimensional evaluation system for course goal achievement of software engineering is proposed.The practice’s results show that the multi-dimensional course goal achievement evaluation is helpful to the continuous improvement of course teaching,which can effectively support the evaluation of graduation outcomes.
文摘Predictive Maintenance is a type of condition-based maintenance that assesses the equipment's states and estimates its failure probability and when maintenance should be performed.Although machine learning techniques have been frequently implemented in this area,the existing studies disregard to the nat-ural order between the target attribute values of the historical sensor data.Thus,these methods cause losing the inherent order of the data that positively affects the prediction performances.To deal with this problem,a novel approach,named Ordinal Multi-dimensional Classification(OMDC),is proposed for estimating the conditions of a hydraulic system's four components by taking into the natural order of class values.To demonstrate the prediction ability of the proposed approach,eleven different multi-dimensional classification algorithms(traditional Binary Relevance(BR),Classifier Chain(CC),Bayesian Classifier Chain(BCC),Monte Carlo Classifier Chain(MCC),Probabilistic Classifier Chain(PCC),Clas-sifier Dependency Network(CDN),Classifier Trellis(CT),Classifier Dependency Trellis(CDT),Label Powerset(LP),Pruned Sets(PS),and Random k-Labelsets(RAKEL))were implemented using the Ordinal Class Classifier(OCC)algorithm.Besides,seven different classification algorithms(Multilayer Perceptron(MLP),Support Vector Machine(SVM),k-Nearest Neighbour(kNN),Decision Tree(C4.5),Bagging,Random Forest(RF),and Adaptive Boosting(AdaBoost))were chosen as base learners for the OCC algorithm.The experimental results present that the proposed OMDC approach using binary relevance multi-dimensional classification methods predicts the conditions of a hydraulic system's multiple components with high accuracy.Also,it is clearly seen from the results that the OMDC models that utilize ensemble-based classification algorithms give more reliable prediction performances with an average Hamming score of 0.853 than the others that use traditional algorithms as base learners.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金supported by the National Natural Science Foundation of China(No.61901465,82222032,82172050).
文摘Since its inception in the 1970s,multi-dimensional magnetic resonance(MR)has emerged as a powerful tool for non-invasive investigations of structures and molecular interactions.MR spectroscopy beyond one dimension allows the study of the correlation,exchange processes,and separation of overlapping spectral information.The multi-dimensional concept has been re-implemented over the last two decades to explore molecular motion and spin dynamics in porous media.Apart from Fourier transform,methods have been developed for processing the multi-dimensional time-domain data,identifying the fluid components,and estimating pore surface permeability via joint relaxation and diffusion spectra.Through the resolution of spectroscopic signals with spatial encoding gradients,multi-dimensional MR imaging has been widely used to investigate the microscopic environment of living tissues and distinguish diseases.Signals in each voxel are usually expressed as multi-exponential decay,representing microstructures or environments along multiple pore scales.The separation of contributions from different environments is a common ill-posed problem,which can be resolved numerically.Moreover,the inversion methods and experimental parameters determine the resolution of multi-dimensional spectra.This paper reviews the algorithms that have been proposed to process multidimensional MR datasets in different scenarios.Detailed information at the microscopic level,such as tissue components,fluid types and food structures in multi-disciplinary sciences,could be revealed through multi-dimensional MR.
基金MIUR-PRIN project 2017KKJP4X“Innovative numerical methods for evolutionary partial differential equations and applications”.Gabriella Puppo acknowledges also the support of 2019 Ateneo Sapienza research project no.RM11916B51CD40E1.
文摘We address the issue of point value reconstructions from cell averages in the context of third-order finite volume schemes,focusing in particular on the cells close to the boundaries of the domain.In fact,most techniques in the literature rely on the creation of ghost cells outside the boundary and on some form of extrapolation from the inside that,taking into account the boundary conditions,fills the ghost cells with appropriate values,so that a standard reconstruction can be applied also in the boundary cells.In Naumann et al.(Appl.Math.Comput.325:252–270.https://doi.org/10.1016/j.amc.2017.12.041,2018),motivated by the difficulty of choosing appropriate boundary conditions at the internal nodes of a network,a different technique was explored that avoids the use of ghost cells,but instead employs for the boundary cells a different stencil,biased towards the interior of the domain.In this paper,extending that approach,which does not make use of ghost cells,we propose a more accurate reconstruction for the one-dimensional case and a two-dimensional one for Cartesian grids.In several numerical tests,we compare the novel reconstruction with the standard approach using ghost cells.
基金supported by Grant PID2020-117211GB-I00funded by MCIN/AEI/10.13039/501100011033+4 种基金by Grant CIAICO/2021/227funded by the Generalitat Valencianasupported by the Ministerio de Ciencia e Innovacion of Spain(Grant Ref.PID2021-125709OB-C21)funded by MCIN/AEI/10.13039/501100011033/FEDER,UEby the Generalitat Valenciana(CIAICO/2021/224).
文摘Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.
基金funded by the SNF project 200020_204917 entitled"Structure preserving and fast methods for hyperbolic systems of conservation laws".
文摘We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.
文摘The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2)emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2)reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2)into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(62033010)Qing Lan Project of Jiangsu Province(R2023Q07)。
文摘For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.
基金supported by the National Science Foundation of China(Grant No.42230606)。
文摘Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.
文摘The multi-dimensional system of nonlinear partial differential equations is considered. In two-dimensional case, this system describes process of vein formation in higher plants. Variable directions finite difference scheme is constructed. The stability and convergence of that scheme are studied. Numerical experiments are carried out. The appropriate graphical illustrations and tables are given.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.