The role of dispersions in the numerical solutions of hydrodynamic equation systems has been realized for long time.It is only during the last two decades that extensive studies on the dispersion-controlled dissipativ...The role of dispersions in the numerical solutions of hydrodynamic equation systems has been realized for long time.It is only during the last two decades that extensive studies on the dispersion-controlled dissipative(DCD)schemes were reported.The studies have demonstrated that this kind of the schemes is distinct from conventional dissipation-based schemes in which the dispersion term of the modified equation is not considered in scheme construction to avoid nonphysical oscillation occurring in shock wave simulations.The principle of the dispersion controlled aims at removing nonphysical oscillations by making use of dispersion characteristics instead of adding artificial viscosity to dissipate the oscillation as the conventional schemes do.Research progresses on the dispersion- controlled principles are reviewed in this paper,including the exploration of the role of dispersions in numerical simulations,the development of the dispersion-controlled principles,efforts devoted to high-order dispersion-controlled dissipative schemes,the extension to both the finite volume and the finite element methods,scheme verification and solution validation,and comments on several aspects of the schemes from author's viewpoint.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do ...Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.展开更多
We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the...We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.展开更多
The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable re...The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2) reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2) into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].展开更多
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector ...Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector that transmits signals.Smooth deployment is essential for duty services;therefore,accurate and efficient dynamic modeling and analysis of the deployment process are essential.One major challenge is depicting time-varying resistance of the cable network and capturing the cable-truss coupling behavior during the deployment process.This paper proposes a general dynamic analysis methodology for cable-truss coupling.Considering the topological diversity and geometric nonlinearity,the cable network's equilibrium equation is derived,and an explicit expression of the time-varying tension of the boundary cables,which provides the main resistance in truss deployment,is obtained.The deployment dynamic model is established,which considers the coupling effect between the soft cables and deployable truss.The effects of the antenna's driving modes and parameters on the dynamic deployment performance were investigated.A scaled prototype was manufactured,and the deployment experiment was conducted to verify the accuracy of the proposed modeling method.The proposed methodology is suitable for general cable antennas with arbitrary topologies and parameters,providing theoretical guidance for the dynamic performance evaluation of antenna driving schemes.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the...For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.展开更多
Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat...Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
The breakage and bending of ducts result in a difficulty to cope with ventilation issues in bidirectional excavation tunnels with a long inclined shaft using a single ventilation method based on ducts.To discuss the h...The breakage and bending of ducts result in a difficulty to cope with ventilation issues in bidirectional excavation tunnels with a long inclined shaft using a single ventilation method based on ducts.To discuss the hybrid ventilation system applied in bidirectional excavation tunnels with a long inclined shaft,this study has established a full-scale computational fluid dynamics model based on field tests,the Poly-Hexcore method,and the sliding mesh technique.The distribution of wind speed,temperature field,and CO in the tunnel are taken as indices to compare the ventilation efficiency of three ventilation systems(duct,duct-ventilation shaft,duct–ventilated shaft-axial fan).The results show that the hybrid ventilation scheme based on duct-ventilation shaft–axial fan performs the best among the three ventilation systems.Compared to the duct,the wind speed and cooling rate in the tunnel are enhanced by 7.5%–30.6%and 14.1%–17.7%,respectively,for the duct-vent shaft-axial fan condition,and the volume fractions of CO are reduced by 26.9%–73.9%.This contributes to the effective design of combined ventilation for bidirectional excavation tunnels with an inclined shaft,ultimately improving the air quality within the tunnel.展开更多
Higher order finite difference weighted essentially non-oscillatory(WENO)schemes have been constructed for conservation laws.For multidimensional problems,they offer a high order accuracy at a fraction of the cost of ...Higher order finite difference weighted essentially non-oscillatory(WENO)schemes have been constructed for conservation laws.For multidimensional problems,they offer a high order accuracy at a fraction of the cost of a finite volume WENO or DG scheme of the comparable accuracy.This makes them quite attractive for several science and engineering applications.But,to the best of our knowledge,such schemes have not been extended to non-linear hyperbolic systems with non-conservative products.In this paper,we perform such an extension which improves the domain of the applicability of such schemes.The extension is carried out by writing the scheme in fluctuation form.We use the HLLI Riemann solver of Dumbser and Balsara(J.Comput.Phys.304:275-319,2016)as a building block for carrying out this extension.Because of the use of an HLL building block,the resulting scheme has a proper supersonic limit.The use of anti-diffusive fluxes ensures that stationary discontinuities can be preserved by the scheme,thus expanding its domain of the applicability.Our new finite difference WENO formulation uses the same WENO reconstruction that was used in classical versions,making it very easy for users to transition over to the present formulation.For conservation laws,the new finite difference WENO is shown to perform as well as the classical version of finite difference WENO,with two major advantages:(i)It can capture jumps in stationary linearly degenerate wave families exactly.(i)It only requires the reconstruction to be applied once.Several examples from hyperbolic PDE systems with non-conservative products are shown which indicate that the scheme works and achieves its design order of the accuracy for smooth multidimensional flows.Stringent Riemann problems and several novel multidimensional problems that are drawn from compressible Baer-Nunziato multiphase flow,multiphase debris flow and twolayer shallow water equations are also shown to document the robustness of the method.For some test problems that require well-balancing we have even been able to apply the scheme without any modification and obtain good results.Many useful PDEs may have stiff relaxation source terms for which the finite difference formulation of WENO is shown to provide some genuine advantages.展开更多
This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary ...This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.展开更多
In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the g...In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.展开更多
As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been c...As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.展开更多
基金The project supported by the National Natural Science Foundation of China(90205027)
文摘The role of dispersions in the numerical solutions of hydrodynamic equation systems has been realized for long time.It is only during the last two decades that extensive studies on the dispersion-controlled dissipative(DCD)schemes were reported.The studies have demonstrated that this kind of the schemes is distinct from conventional dissipation-based schemes in which the dispersion term of the modified equation is not considered in scheme construction to avoid nonphysical oscillation occurring in shock wave simulations.The principle of the dispersion controlled aims at removing nonphysical oscillations by making use of dispersion characteristics instead of adding artificial viscosity to dissipate the oscillation as the conventional schemes do.Research progresses on the dispersion- controlled principles are reviewed in this paper,including the exploration of the role of dispersions in numerical simulations,the development of the dispersion-controlled principles,efforts devoted to high-order dispersion-controlled dissipative schemes,the extension to both the finite volume and the finite element methods,scheme verification and solution validation,and comments on several aspects of the schemes from author's viewpoint.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金supported by Grant PID2020-117211GB-I00funded by MCIN/AEI/10.13039/501100011033+4 种基金by Grant CIAICO/2021/227funded by the Generalitat Valencianasupported by the Ministerio de Ciencia e Innovacion of Spain(Grant Ref.PID2021-125709OB-C21)funded by MCIN/AEI/10.13039/501100011033/FEDER,UEby the Generalitat Valenciana(CIAICO/2021/224).
文摘Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.
基金funded by the SNF project 200020_204917 entitled"Structure preserving and fast methods for hyperbolic systems of conservation laws".
文摘We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions.
文摘The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2) reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2) into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6].
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金Supported by National Key R&D Program of China (Grant No.2023YFB3407103)National Natural Science Foundation of China (Grant Nos.52175242,52175027)Young Elite Scientists Sponsorship Program by CAST (Grant No.2022QNRC001)。
文摘Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector that transmits signals.Smooth deployment is essential for duty services;therefore,accurate and efficient dynamic modeling and analysis of the deployment process are essential.One major challenge is depicting time-varying resistance of the cable network and capturing the cable-truss coupling behavior during the deployment process.This paper proposes a general dynamic analysis methodology for cable-truss coupling.Considering the topological diversity and geometric nonlinearity,the cable network's equilibrium equation is derived,and an explicit expression of the time-varying tension of the boundary cables,which provides the main resistance in truss deployment,is obtained.The deployment dynamic model is established,which considers the coupling effect between the soft cables and deployable truss.The effects of the antenna's driving modes and parameters on the dynamic deployment performance were investigated.A scaled prototype was manufactured,and the deployment experiment was conducted to verify the accuracy of the proposed modeling method.The proposed methodology is suitable for general cable antennas with arbitrary topologies and parameters,providing theoretical guidance for the dynamic performance evaluation of antenna driving schemes.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(62033010)Qing Lan Project of Jiangsu Province(R2023Q07)。
文摘For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment.
基金supported by the National Science Foundation of China(Grant No.42230606)。
文摘Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
基金Project(N2022G031)supported by the Science and Technology Research and Development Program Project of China RailwayProjects(2022-Key-23,2021-Special-01A)supported by the Science and Technology Research and Development Program Project of China Railway Group LimitedProject(52308419)supported by the National Natural Science Foundation of China。
文摘The breakage and bending of ducts result in a difficulty to cope with ventilation issues in bidirectional excavation tunnels with a long inclined shaft using a single ventilation method based on ducts.To discuss the hybrid ventilation system applied in bidirectional excavation tunnels with a long inclined shaft,this study has established a full-scale computational fluid dynamics model based on field tests,the Poly-Hexcore method,and the sliding mesh technique.The distribution of wind speed,temperature field,and CO in the tunnel are taken as indices to compare the ventilation efficiency of three ventilation systems(duct,duct-ventilation shaft,duct–ventilated shaft-axial fan).The results show that the hybrid ventilation scheme based on duct-ventilation shaft–axial fan performs the best among the three ventilation systems.Compared to the duct,the wind speed and cooling rate in the tunnel are enhanced by 7.5%–30.6%and 14.1%–17.7%,respectively,for the duct-vent shaft-axial fan condition,and the volume fractions of CO are reduced by 26.9%–73.9%.This contributes to the effective design of combined ventilation for bidirectional excavation tunnels with an inclined shaft,ultimately improving the air quality within the tunnel.
基金support via NSF grants NSF-19-04774,NSF-AST-2009776,NASA-2020-1241NASA grant 80NSSC22K0628.DSB+3 种基金HK acknowledge support from a Vajra award,VJR/2018/00129a travel grant from Notre Dame Internationalsupport via AFOSR grant FA9550-20-1-0055NSF grant DMS-2010107.
文摘Higher order finite difference weighted essentially non-oscillatory(WENO)schemes have been constructed for conservation laws.For multidimensional problems,they offer a high order accuracy at a fraction of the cost of a finite volume WENO or DG scheme of the comparable accuracy.This makes them quite attractive for several science and engineering applications.But,to the best of our knowledge,such schemes have not been extended to non-linear hyperbolic systems with non-conservative products.In this paper,we perform such an extension which improves the domain of the applicability of such schemes.The extension is carried out by writing the scheme in fluctuation form.We use the HLLI Riemann solver of Dumbser and Balsara(J.Comput.Phys.304:275-319,2016)as a building block for carrying out this extension.Because of the use of an HLL building block,the resulting scheme has a proper supersonic limit.The use of anti-diffusive fluxes ensures that stationary discontinuities can be preserved by the scheme,thus expanding its domain of the applicability.Our new finite difference WENO formulation uses the same WENO reconstruction that was used in classical versions,making it very easy for users to transition over to the present formulation.For conservation laws,the new finite difference WENO is shown to perform as well as the classical version of finite difference WENO,with two major advantages:(i)It can capture jumps in stationary linearly degenerate wave families exactly.(i)It only requires the reconstruction to be applied once.Several examples from hyperbolic PDE systems with non-conservative products are shown which indicate that the scheme works and achieves its design order of the accuracy for smooth multidimensional flows.Stringent Riemann problems and several novel multidimensional problems that are drawn from compressible Baer-Nunziato multiphase flow,multiphase debris flow and twolayer shallow water equations are also shown to document the robustness of the method.For some test problems that require well-balancing we have even been able to apply the scheme without any modification and obtain good results.Many useful PDEs may have stiff relaxation source terms for which the finite difference formulation of WENO is shown to provide some genuine advantages.
基金supported by the NSFC grant 11801143J.Lu’s research is partially supported by the NSFC grant 11901213+3 种基金the National Key Research and Development Program of China grant 2021YFA1002900supported by the NSFC grant 11801140,12171177the Young Elite Scientists Sponsorship Program by Henan Association for Science and Technology of China grant 2022HYTP0009the Program for Young Key Teacher of Henan Province of China grant 2021GGJS067.
文摘This paper considers the finite difference(FD)approximations of diffusion operators and the boundary treatments for different boundary conditions.The proposed schemes have the compact form and could achieve arbitrary even order of accuracy.The main idea is to make use of the lower order compact schemes recursively,so as to obtain the high order compact schemes formally.Moreover,the schemes can be implemented efficiently by solving a series of tridiagonal systems recursively or the fast Fourier transform(FFT).With mathematical induction,the eigenvalues of the proposed differencing operators are shown to be bounded away from zero,which indicates the positive definiteness of the operators.To obtain numerical boundary conditions for the high order schemes,the simplified inverse Lax-Wendroff(SILW)procedure is adopted and the stability analysis is performed by the Godunov-Ryabenkii method and the eigenvalue spectrum visualization method.Various numerical experiments are provided to demonstrate the effectiveness and robustness of our algorithms.
基金supported by the Simons Foundation:Collaboration Grantssupported by the AFOSR grant FA9550-18-1-0383.
文摘In this paper,we consider the high order method for solving the linear transport equations under diffusive scaling and with random inputs.To tackle the randomness in the problem,the stochastic Galerkin method of the generalized polynomial chaos approach has been employed.Besides,the high order implicit-explicit scheme under the micro-macro decomposition framework and the discontinuous Galerkin method have been employed.We provide several numerical experiments to validate the accuracy and the stochastic asymptotic-preserving property.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000)Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
文摘The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.
基金supported by the National Natural Science Foundation of China(Nos.41876077,41376085).
文摘As a river with more than 3000 reservoirs in its watershed,the Yellow River has been affected by dams not only on the sediment load,but also on the water quality.Water-sediment regulation scheme(WSRS),which has been carried out annually in the Yellow River since 2002,is a typical human activity affecting river water quality.Chromophoric dissolved organic matter(CDOM)in river is susceptible to changes in ecological and environmental conditions as well as human activities.Here,we report variations in dissolved organic carbon concentrations,compositions and sources of CDOM in time series samples in the lower Yellow River during WSRS.In addition,a parallel factor fluorescence analysis(PARAFAC)method is applied to identify different fluorescent components in water samples during WRSR,showing four major components including tryptophan-like component(C1),microbial humic-like component(C2),terrestrial humic-like component(C3)and tyrosine-like component(C4).In general,C1 increased after water regulation,while C2 and C3 increased after sediment regulation,indicating that the water and sediment released by the dam have different effects on CDOM compositions.Under the impacts of the dam,source of CDOM in the lower Yellow River is mainly autochthonous related to microbial activities,and is regulated by the terrestrial input during WSRS period.Sediment resuspension inhibits microbial activities and reduces the production of autochthonous CDOM.Overall,human activities especially WSRS,as exemplified here,significantly alter the quality and quantity of CDOM in the lower Yellow River,affecting CDOM dynamics and biogeochemical processes in the estuarine environment.