Currently,all quantum private comparison protocols based on two-dimensional quantum states can only compare equality,via using high-dimensional quantum states that it is possible to compare the size relation in existi...Currently,all quantum private comparison protocols based on two-dimensional quantum states can only compare equality,via using high-dimensional quantum states that it is possible to compare the size relation in existing work.In addition,it is difficult to manipulate high-dimensional quantum states under the existing conditions of quantum information processing,leading to low practicality and engineering feasibility of protocols for comparing size relation.Considering this situation,we propose an innovative protocol.The proposed protocol can make size comparison by exploiting more manageable two-dimensional Bell states,which significantly enhances its feasibility with current quantum technologies.Simultaneously,the proposed protocol enables multiple participants to compare their privacies with the semi-quantum model.The communication process of the protocol is simulated on the IBM Quantum Experience platform to verify its effectiveness.Security analysis shows that the proposed protocol can withstand common attacks while preserving the privacies of all participants.Thus,the devised protocol may provide an important reference for implementation of quantum private size comparison protocols.展开更多
Due to the practical problems of the high costs and the long development cycle of China’s cabinet production,a computer-aided design method of the cabinet based on style imagery is proposed.According to the principle...Due to the practical problems of the high costs and the long development cycle of China’s cabinet production,a computer-aided design method of the cabinet based on style imagery is proposed.According to the principle of the conjoint analysis method, the rough set theory and the weight coefficient of different components of the cabinet,a multi-dimensional model of style imagery to evaluate the cabinet is built. Then the related constants of style imagery are calculated and the cabinet components library is also built by the three-dimensional modeling.Finally,with recombinant technology and the mapping model between cabinet style and external characteristics,the prototype system based on Visual Studio is proposed.This system actualizes the bidirectional reasoning between product style imagery and the shape features,which can assist designers to produce more creative designs,greatly improve the efficiency of cabinet development and increase the profits of companies.展开更多
In order to understand the vibration characteristic of system structure of electronic equipment cabinet within the particular vibration frequency,the finite element analysis software-ANSYS is used to simulate the test...In order to understand the vibration characteristic of system structure of electronic equipment cabinet within the particular vibration frequency,the finite element analysis software-ANSYS is used to simulate the tests of random vibrations of the cabinet system and obtain the isopleths graph of deformation and stress of the cabinet.It can confirm maximum of deformation and stress of the cabinet and position happened.Through more analysis of the frequency response curve,which can confirm harm- ful consequences random vibrations caused and weak link of the cabinet structure.The numerical simulation results are in good a- greement with the experimental results.It shows that this research provides an efficient method for the anti-seismic design and the dynamic optimization design.展开更多
We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many s...We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simuhaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL.展开更多
1698年,一只庋藏了众多医疗俗物及其他东方博物展品的中国橱柜(The China Cabinet)被捐赠予英国皇家学会,汉斯·斯隆在《哲学汇刊》上发表了对此柜的四篇解说。The China Cabinet内存储的“外科”用刀,修甲、采耳、按摩工具为重构...1698年,一只庋藏了众多医疗俗物及其他东方博物展品的中国橱柜(The China Cabinet)被捐赠予英国皇家学会,汉斯·斯隆在《哲学汇刊》上发表了对此柜的四篇解说。The China Cabinet内存储的“外科”用刀,修甲、采耳、按摩工具为重构明清中国民俗医疗器物史提供了宝贵的一手资料。在《哲学汇刊》大传统指引下,汉斯·斯隆借助“了解”“同情”的活态叙述、细致严谨的图像语言两项叙述技法成功地全景呈现了The China Cabinet所见中国民俗医疗图景。在表达过程中,包容互鉴的文明对话心态起到了基础而积极的效应。展开更多
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio...With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.展开更多
In this study,a novel non-intrusive temperature rise fault-identification method for a distribution cabinet based on tensor block-matching is proposed.Two-stage data repair is used to reconstruct the temperature-field...In this study,a novel non-intrusive temperature rise fault-identification method for a distribution cabinet based on tensor block-matching is proposed.Two-stage data repair is used to reconstruct the temperature-field information to support the demand for temperature rise fault-identification of non-intrusive distribution cabinets.In the coarse-repair stage,this method is based on the outside temperature information of the distribution cabinet,using tensor block-matching technology to search for an appropriate tensor block in the temperature-field tensor dictionary,filling the target space area from the outside to the inside,and realizing the reconstruction of the three-dimensional temperature field inside the distribution cabinet.In the fine-repair stage,tensor super-resolution technology is used to fill the temperature field obtained from coarse repair to realize the smoothing of the temperature-field information inside the distribution cabinet.Non-intrusive temperature rise fault-identification is realized by setting clustering rules and temperature thresholds to compare the location of the heat source with the location of the distribution cabinet components.The simulation results show that the temperature-field reconstruction error is reduced by 82.42%compared with the traditional technology,and the temperature rise fault-identification accuracy is greater than 86%,verifying the feasibility and effectiveness of the temperature-field reconstruction and temperature rise fault-identification.展开更多
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure wa...Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or communication.In this paper,we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model,which is able to be accelerated by quantum algorithms.A novel multi-party phase estimation algorithm and the related quantum circuit are proposed by using a distributed Oracle operator with iterations.The proved theoretical communication complexity of this algorithm shows it can give the phase estimation before applying multi-party computing efficiently without increasing any additional complexity.Moreover,a practical problem of multi-party dating investigated shows it can make a successful estimation of the number of solution in advance with zero communication complexity by utilizing its special statistic feature.Sufficient simulations present the correctness,validity and efficiency of the proposed estimation method.展开更多
We define a new type cryptographical model called secure multi-party proof that allows any players and a verifier to securely compute a function : each of the players learns nothing about other players’ input and abo...We define a new type cryptographical model called secure multi-party proof that allows any players and a verifier to securely compute a function : each of the players learns nothing about other players’ input and about the value of , and the verifier obtains the value of and it’s validity but learns nothing about the input of any of the players. It is implemented by a protocol using oblivious transfer and Yao’s scrambled circuit. We prove that our protocol is secure if the players and the verifier are semi-honest (i.e. they follow the protocol) and polynomial time bounded. The main applications of our protocol are for electronic voting and electronic bidding.展开更多
In this paper, workflow technology is firstly applied to the cabinet dyeing order system for cabinet dyeing unit. The system setup workflow models which conform to the existing system and resource and the system adopt...In this paper, workflow technology is firstly applied to the cabinet dyeing order system for cabinet dyeing unit. The system setup workflow models which conform to the existing system and resource and the system adopts flexible workflow process mechanism to enhance the adaptability and opening and solve the exception and abnormality manipulation. The results show that it can not only provide the better dyeing order process, but also set dyer free from the fussy daily business and predigest task flow and heighten production efficiency.展开更多
Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing...Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing the anti-accident technical measures, improving the installation and debugging level, and strengthening operation inspection, are proposed.展开更多
PLC control cabinet is mainly used in the construction of oil field Internet of things. PLC is short for “programmer logic controller” in English, and we call it the programmable logic controller. The programmable c...PLC control cabinet is mainly used in the construction of oil field Internet of things. PLC is short for “programmer logic controller” in English, and we call it the programmable logic controller. The programmable controller mainly defers to, it which the mature effective black-white control concept and the design concept complete in at present is one kind of new technology, the core electronic device gradual is already invested each domain, became one to have the characteristic series new product that was one can carry on the digital operation and the digital operation computer effectively. So this study control PLC control cabinet in oil , eld application value of construction of the Internet of things, we hope that the content can provide effective reference for the related areas.展开更多
The problem of information comparison is always an important field of SMC.In order to effectively solve the fully equal problem of multi-data for all information,a secure two-party multi-data comparison protocol for e...The problem of information comparison is always an important field of SMC.In order to effectively solve the fully equal problem of multi-data for all information,a secure two-party multi-data comparison protocol for equality(STMC)is proposed with the aid of the NTRU encryption.The protocol converts multi-data comparison problem for equality to polynomials comparison for equality.Analysis shows that the protocol is correct and security in semi-honest model.Being STMC as basic building block,a secure multi-party multi-data comparison protocol for equality(SMMC)is proposed.SMMC provides a solution which n participants hope to determine the equality of their private input sets,on the condition of no information leaked.This protocol is proved to be collusion-resistance security.The last,computational complexity and communication complexity of the two protocols are analyzed.It is shown that new protocols have low complexity.We also give applications in the secure multi-party information comparison problem and secure multi-party polynomial comparison problem.展开更多
Since the nuclear disaster occurred from huge earthquake in Japan 2011, Japanese energy generation system has been expected to prioritize safety and trustworthiness. To meet this requirement, distributed power supply ...Since the nuclear disaster occurred from huge earthquake in Japan 2011, Japanese energy generation system has been expected to prioritize safety and trustworthiness. To meet this requirement, distributed power supply systems are considered to be one of solutions. In this study, we aimed to conserve energy and reduce carbon dioxide emission of supermarket which installed a novel environment-friendly dispersed power. We focused the energy used by refrigerated cabinets. We built small scale model of supermarket which was equipped with dispersed power. From this scale model, the energy conservation effect of supercooling is from 10% to 25% during the summertime and intermediate time. At last, we found that when outside temperature is about 14 ℃ or more, supercooling was effective. In addition, since energy consumption of refrigerated cabinet is influenced by inside enthalpy, we controlled the inside air temperature and humidity by installing desiccant system and examined its effect.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.62161025)the Project of Scientific and Technological Innovation Base of Jiangxi Province(Grant No.20203CCD46008)the Jiangxi Provincial Key Laboratory of Fusion and Information Control(Grant No.20171BCD40005).
文摘Currently,all quantum private comparison protocols based on two-dimensional quantum states can only compare equality,via using high-dimensional quantum states that it is possible to compare the size relation in existing work.In addition,it is difficult to manipulate high-dimensional quantum states under the existing conditions of quantum information processing,leading to low practicality and engineering feasibility of protocols for comparing size relation.Considering this situation,we propose an innovative protocol.The proposed protocol can make size comparison by exploiting more manageable two-dimensional Bell states,which significantly enhances its feasibility with current quantum technologies.Simultaneously,the proposed protocol enables multiple participants to compare their privacies with the semi-quantum model.The communication process of the protocol is simulated on the IBM Quantum Experience platform to verify its effectiveness.Security analysis shows that the proposed protocol can withstand common attacks while preserving the privacies of all participants.Thus,the devised protocol may provide an important reference for implementation of quantum private size comparison protocols.
基金The National Natural Science Foundation of China(No.71271053)the Scientific Innovation Research of College Graduates in Jiangsu Province(No.CXLX13_082)
文摘Due to the practical problems of the high costs and the long development cycle of China’s cabinet production,a computer-aided design method of the cabinet based on style imagery is proposed.According to the principle of the conjoint analysis method, the rough set theory and the weight coefficient of different components of the cabinet,a multi-dimensional model of style imagery to evaluate the cabinet is built. Then the related constants of style imagery are calculated and the cabinet components library is also built by the three-dimensional modeling.Finally,with recombinant technology and the mapping model between cabinet style and external characteristics,the prototype system based on Visual Studio is proposed.This system actualizes the bidirectional reasoning between product style imagery and the shape features,which can assist designers to produce more creative designs,greatly improve the efficiency of cabinet development and increase the profits of companies.
文摘In order to understand the vibration characteristic of system structure of electronic equipment cabinet within the particular vibration frequency,the finite element analysis software-ANSYS is used to simulate the tests of random vibrations of the cabinet system and obtain the isopleths graph of deformation and stress of the cabinet.It can confirm maximum of deformation and stress of the cabinet and position happened.Through more analysis of the frequency response curve,which can confirm harm- ful consequences random vibrations caused and weak link of the cabinet structure.The numerical simulation results are in good a- greement with the experimental results.It shows that this research provides an efficient method for the anti-seismic design and the dynamic optimization design.
基金Supported by the National Natural Science Foun-dation of China (60373068)
文摘We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simuhaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL.
文摘1698年,一只庋藏了众多医疗俗物及其他东方博物展品的中国橱柜(The China Cabinet)被捐赠予英国皇家学会,汉斯·斯隆在《哲学汇刊》上发表了对此柜的四篇解说。The China Cabinet内存储的“外科”用刀,修甲、采耳、按摩工具为重构明清中国民俗医疗器物史提供了宝贵的一手资料。在《哲学汇刊》大传统指引下,汉斯·斯隆借助“了解”“同情”的活态叙述、细致严谨的图像语言两项叙述技法成功地全景呈现了The China Cabinet所见中国民俗医疗图景。在表达过程中,包容互鉴的文明对话心态起到了基础而积极的效应。
文摘With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.
基金supported by the CEPRI project“Key Technologies for Sparse Acquisition of Power Equipment State Sensing Data”(AI83-21-004)National Key R&D Program of China(2020YFB0905900).
文摘In this study,a novel non-intrusive temperature rise fault-identification method for a distribution cabinet based on tensor block-matching is proposed.Two-stage data repair is used to reconstruct the temperature-field information to support the demand for temperature rise fault-identification of non-intrusive distribution cabinets.In the coarse-repair stage,this method is based on the outside temperature information of the distribution cabinet,using tensor block-matching technology to search for an appropriate tensor block in the temperature-field tensor dictionary,filling the target space area from the outside to the inside,and realizing the reconstruction of the three-dimensional temperature field inside the distribution cabinet.In the fine-repair stage,tensor super-resolution technology is used to fill the temperature field obtained from coarse repair to realize the smoothing of the temperature-field information inside the distribution cabinet.Non-intrusive temperature rise fault-identification is realized by setting clustering rules and temperature thresholds to compare the location of the heat source with the location of the distribution cabinet components.The simulation results show that the temperature-field reconstruction error is reduced by 82.42%compared with the traditional technology,and the temperature rise fault-identification accuracy is greater than 86%,verifying the feasibility and effectiveness of the temperature-field reconstruction and temperature rise fault-identification.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61501247,61373131 and 61702277,the Six Talent Peaks Project of Jiangsu Province(Grant No.2015-XXRJ-013)Natural Science Foundation of Jiangsu Province(Grant No.BK20171458)+3 种基金the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(China under Grant No.16KJB520030)the NUIST Research Foundation for Talented Scholars under Grant Nos.2015r014,PAPD and CICAEET fundsfunded in part by the Science and Technology Development Fund,Macao SAR(File No.SKL-IOTSC-2018-2020,0018/2019/AKP,0008/2019/AGJ,and FDCT/194/2017/A3)in part by the University of Macao under Grant Nos.MYRG2018-00248-FST and MYRG2019-0137-FST.
文摘Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks.Quantum computing,theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or communication.In this paper,we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model,which is able to be accelerated by quantum algorithms.A novel multi-party phase estimation algorithm and the related quantum circuit are proposed by using a distributed Oracle operator with iterations.The proved theoretical communication complexity of this algorithm shows it can give the phase estimation before applying multi-party computing efficiently without increasing any additional complexity.Moreover,a practical problem of multi-party dating investigated shows it can make a successful estimation of the number of solution in advance with zero communication complexity by utilizing its special statistic feature.Sufficient simulations present the correctness,validity and efficiency of the proposed estimation method.
文摘We define a new type cryptographical model called secure multi-party proof that allows any players and a verifier to securely compute a function : each of the players learns nothing about other players’ input and about the value of , and the verifier obtains the value of and it’s validity but learns nothing about the input of any of the players. It is implemented by a protocol using oblivious transfer and Yao’s scrambled circuit. We prove that our protocol is secure if the players and the verifier are semi-honest (i.e. they follow the protocol) and polynomial time bounded. The main applications of our protocol are for electronic voting and electronic bidding.
文摘In this paper, workflow technology is firstly applied to the cabinet dyeing order system for cabinet dyeing unit. The system setup workflow models which conform to the existing system and resource and the system adopts flexible workflow process mechanism to enhance the adaptability and opening and solve the exception and abnormality manipulation. The results show that it can not only provide the better dyeing order process, but also set dyer free from the fussy daily business and predigest task flow and heighten production efficiency.
文摘Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing the anti-accident technical measures, improving the installation and debugging level, and strengthening operation inspection, are proposed.
基金the project named: Development of Energy-saving “Contour Environment” Internet of Things System Based on PLC (NO. B2015270).
文摘PLC control cabinet is mainly used in the construction of oil field Internet of things. PLC is short for “programmer logic controller” in English, and we call it the programmable logic controller. The programmable controller mainly defers to, it which the mature effective black-white control concept and the design concept complete in at present is one kind of new technology, the core electronic device gradual is already invested each domain, became one to have the characteristic series new product that was one can carry on the digital operation and the digital operation computer effectively. So this study control PLC control cabinet in oil , eld application value of construction of the Internet of things, we hope that the content can provide effective reference for the related areas.
文摘The problem of information comparison is always an important field of SMC.In order to effectively solve the fully equal problem of multi-data for all information,a secure two-party multi-data comparison protocol for equality(STMC)is proposed with the aid of the NTRU encryption.The protocol converts multi-data comparison problem for equality to polynomials comparison for equality.Analysis shows that the protocol is correct and security in semi-honest model.Being STMC as basic building block,a secure multi-party multi-data comparison protocol for equality(SMMC)is proposed.SMMC provides a solution which n participants hope to determine the equality of their private input sets,on the condition of no information leaked.This protocol is proved to be collusion-resistance security.The last,computational complexity and communication complexity of the two protocols are analyzed.It is shown that new protocols have low complexity.We also give applications in the secure multi-party information comparison problem and secure multi-party polynomial comparison problem.
文摘Since the nuclear disaster occurred from huge earthquake in Japan 2011, Japanese energy generation system has been expected to prioritize safety and trustworthiness. To meet this requirement, distributed power supply systems are considered to be one of solutions. In this study, we aimed to conserve energy and reduce carbon dioxide emission of supermarket which installed a novel environment-friendly dispersed power. We focused the energy used by refrigerated cabinets. We built small scale model of supermarket which was equipped with dispersed power. From this scale model, the energy conservation effect of supercooling is from 10% to 25% during the summertime and intermediate time. At last, we found that when outside temperature is about 14 ℃ or more, supercooling was effective. In addition, since energy consumption of refrigerated cabinet is influenced by inside enthalpy, we controlled the inside air temperature and humidity by installing desiccant system and examined its effect.