Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A mul...Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.展开更多
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser...In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.展开更多
Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational ...Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C...Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol.展开更多
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their...The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.展开更多
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani...In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.展开更多
Implementing a new energy-saving electrochemical synthesis system with high commercial value is a strategy of the sustainable development for upgrading the bulk chemicals preparation technology in the future.Here,we r...Implementing a new energy-saving electrochemical synthesis system with high commercial value is a strategy of the sustainable development for upgrading the bulk chemicals preparation technology in the future.Here,we report a multiple redox-mediated linear paired electrolysis system,combining the hydrogen peroxide mediated cathode process with the I2 mediated anode process,and realize the conversion of furfural to furoic acid in both side of the dividedflow cell simultaneously.By reasonably controlling the cathode potential,the undesired water splitting reaction and furfural reduction side reactions are avoided.Under the galvanostatic electrolysis,the two-mediated electrode processes have good compatibility,which reduce the energy consumption by about 22%while improving the electronic efficiency by about 125%.This system provides a green electrochemical synthesis route with commercial prospects.展开更多
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistic...The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.展开更多
Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pair...Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pairing forces,as well as a combination of these two forces,were used for the Hartree–Fock–Bogoliubov approximation.Variations in the least-energy fission path,fission barrier,pairing energy,total kinetic energy,scission line,and mass distribution of the fission fragments based on the different forms of the pairing forces were analyzed and discussed.The fission dynamics were studied based on the timedependent generator coordinate method plus the Gaussian overlap approximation.The results demonstrated a sensitivity of the mass and charge distributions of the fission fragments on the form of the pairing force.Based on the investigation of the neutron-induced fission of^(239)Pu,among the volume,mixed,and surface pairing forces,the mixed pairing force presented a good reproduction of the experimental data.展开更多
The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with...The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.展开更多
Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering t...Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering the threat from the key exposure, it is desirable to incorporate the idea of key-insulated cryptosystem into the certificateless encryption. In this paper, we have designed an efficient certificateless keyinsulated encryption(CL-KIE) scheme to achieve this goal. By our approach, the computational performance of our scheme has been improved significantly in terms of reduction on running time and storage. We also gave the security proof of the new CL-KIE scheme against the chosen plaintext attacks(CPAs) in the random oracle, considering the assumption of the computational Diffie-Hellman(CDH) problem.展开更多
A recently discovered family of kagome lattice materials,AV_(3)Sb_(5)(A=K,Rb,Cs),has attracted great interest,especiallyin the debate over their dominant superconducting pairing symmetry.To explore this issue,we study...A recently discovered family of kagome lattice materials,AV_(3)Sb_(5)(A=K,Rb,Cs),has attracted great interest,especiallyin the debate over their dominant superconducting pairing symmetry.To explore this issue,we study the superconductingpairing behavior within the kagome-lattice Hubbard model through the constrained path Monte Carlo method.It isfound that doping around the Dirac point generates a dominant next-nearest-neighbor-d pairing symmetry driven by on-siteCoulomb interaction U.However,when considering the nearest-neighbor interaction V,it may induce nearest-neighbor-ppairing to become the preferred pairing symmetry.Our results provide useful information to identify the dominant superconductingpairing symmetry in the AV_(3)Sb_(5)family.展开更多
By utilizing the fluctuation exchange approximation method,we perform a study on the superconducting pairing symmetry in a t_(2g) three-orbital model on the square lattice.Although the tight-binding parameters of the ...By utilizing the fluctuation exchange approximation method,we perform a study on the superconducting pairing symmetry in a t_(2g) three-orbital model on the square lattice.Although the tight-binding parameters of the model are based on Sr_(2)RuO_(4),we have systematically studied the evolution of superconducting pairing symmetry with the carrier density and interactions,making our findings relevant to a broader range of material systems.Under a moderate Hund’s coupling,we find that spin fluctuations dominate the superconducting pairing,leading to a prevalent spin-singlet pairing with a d_(x^(2)-y^(2))-wave symmetry for the carrier density within the range of n=1.5-4 per site.By reducing the Hund’s coupling,the charge fluctuations are enhanced and play a crucial role in determining the pairing symmetry,leading to a transition of the pairing symmetry from the spin-singlet d_(x^(2)-y^(2))-wave to the spin-triplet p-wave.Furthermore,we find that the superconducting pairings are orbital dependent.As the carrier density changes from n=4 to n=1.5,the active orbitals for superconducting pairing shift from the quasi-two-dimensional orbital dxy to the quasi-one-dimensional orbitals d_(xz) and d_(yz).展开更多
Recent experimental findings have demonstrated the occurrence of superconductivity in Bernal bilayer graphene when induced by a magnetic field.In this study,we conduct a theoretical investigation of the potential pair...Recent experimental findings have demonstrated the occurrence of superconductivity in Bernal bilayer graphene when induced by a magnetic field.In this study,we conduct a theoretical investigation of the potential pairing symmetry within this superconducting system.By developing a theoretical model,we primarily calculate the free energy of the system with p+ip-wave parallel spin pairing,p+ip-wave anti-parallel spin pairing and d+i d-wave pairing symmetry.Our results confirm that the magnetic field is indeed essential for generating the superconductivity.We discover that the p+ip-wave parallel spin pairing leads to a lower free energy for the system.The numerical calculations of the energy band structure,zero-energy spectral function and density of states for each of the three pairing symmetries under consideration show a strong consistency with the free energy results.展开更多
Electrochemical co-reduction of nitrate(NO_(3)^(-))and carbon dioxide(CO_(2))has been widely regarded as a promising route to produce urea under ambient conditions,however the yield rate of urea has remained limited.H...Electrochemical co-reduction of nitrate(NO_(3)^(-))and carbon dioxide(CO_(2))has been widely regarded as a promising route to produce urea under ambient conditions,however the yield rate of urea has remained limited.Here,we report an atomically ordered intermetallic pallium-zinc(PdZn)electrocatalyst comprising a high density of PdZn pairs for boosting urea electrosynthesis.It is found that Pd and Zn are responsible for the adsorption and activation of NO_(3)^(-)and CO_(2),respectively,and thus the co-adsorption and co-activation NO_(3)^(-)and CO_(2) are achieved in ordered PdZn pairs.More importantly,the ordered and well-defined PdZn pairs provide a dual-site geometric structure conducive to the key C-N coupling with a low kinetical barrier,as demonstrated on both operando measurements and theoretical calculations.Consequently,the PdZn electrocatalyst displays excellent performance for the co-reduction to generate urea with a maximum urea Faradaic efficiency of 62.78%and a urea yield rate of 1274.42μg mg^(-1) h^(-1),and the latter is 1.5-fold larger than disordered pairs in PdZn alloys.This work paves new pathways to boost urea electrosynthesis via constructing ordered dual-metal pairs.展开更多
The operational rating system in building energy performance certificates(EPCs) has been used for systematically monitoring and diagnosing the energy performance in the operation and maintenance phases of existing bui...The operational rating system in building energy performance certificates(EPCs) has been used for systematically monitoring and diagnosing the energy performance in the operation and maintenance phases of existing buildings. However, there are several limitations of the conventional operational rating system,which can be subdivided into three aspects:(i) building category;(i i) region category; and(iii) space unit size. To overcome these challenges, this study conducted the problem analysis of the conventional operational rating system for existing buildings by using the statistical and geostatistical approaches. Based on the problem analysis, this study developed the dynamic operational rating(DOR) system for existing buildings by using the data-mining technique and the probability approach. The developed DOR system can be used as a tool for building energy performance diagnostics.To validate the applicability of the developed DOR system, educational facilities were selected as the representative type of existing buildings in South Korea. As a result, it was determined that the developed DOR system can solve the irrationality of the conventional operational rating system(i.e., the negative correlation between the space unit size and the CO2 emission density). Namely, the operational ratings of small buildings were adjusted upward while those of large buildings were adjusted downward. The developed DOR system can allow policymakers to establish the reasonable operational rating system for existing buildings, which can motivate the public to actively participate in energy-saving campaigns.展开更多
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.展开更多
Broadband photon pairs are highly desirable for quantum metrology,quantum sensing,and quantum communication.Such sources are usually designed through type-0 phase-matching spontaneous parametric down-conversion(SPDC)t...Broadband photon pairs are highly desirable for quantum metrology,quantum sensing,and quantum communication.Such sources are usually designed through type-0 phase-matching spontaneous parametric down-conversion(SPDC)that makes the photon pairs hard to separate in the frequency-degenerate case and thus limits their applications.In this paper,we design a broadband frequency-degenerate telecom-band photon pair source via the type-II SPDC in a dispersion-engineered thin-film lithium niobate waveguide,where the polarization modes of photon pairs are orthogonal and thus are easily separated deterministically.With a 5-mm-long waveguide,our design can achieve a bandwidth of 5.56 THz(44.8 nm),which is 8.6 times larger than that of the bulk lithium niobate,and the central wavelength can be flexibly adjusted.Our design is a promising approach towards high-quality integrated photon sources and may have wide applications in photonic quantum technologies.展开更多
文摘Climate change threatens cocoa quality, raising concerns regarding sustainable premium cocoa production. Evaluating the effectiveness of certification standards is imperative to address this concern effectively. A multi-stage method was employed for a systematic review of 39 peer-reviewed articles to highlight the impacts of climate change on the biophysical environment of cocoa and its implications for adapting Geographical Indications (GIs). Additionally, a comprehensive review was conducted on climate-relevant standards of certificates in Ecuador, Indonesia, and Ghana. The findings of this study provide practical insights into possible difficulties that cocoa-producing countries may encounter in maintaining the distinctive flavours and quality trademarks of cocoa in the face of changing climate. Moreover, the findings emphasize the need for producer countries to prioritize viable adaptation and product differentiation strategies that meet sustainable marketing standards to protect GIs or place-based intellectual property. Furthermore, the findings indicate certificates require effective multi-level climate change management and environmental-social-governance principles that promote scientifically proven mitigation strategies, such as increasing soil organic carbon, zero deforestation, and reducing emissions while striving to leverage local adaptation policies to reduce location-specific vulnerability. Finally, certificates can accelerate the expansion, intensification, and redistribution of sustainable production for gains that outweigh the inconveniences caused by climate change.
基金Supported bythe National Natural Science Foundationof China (60225007 ,60572155) the Science and Technology ResearchProject of Shanghai (04DZ07067)
文摘In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.
文摘Business English professional "Integration in Multiple Certificates" refers to these two kinds of certificates——a diploma and vocational certificates. Business English curriculum design unified vocational qualification certificate with professional training objectives. Basis on the meeting of requirements of certificates for graduation, making professional training contents, curriculum,teaching methods together with vocational training and the requirements of professional qualification certificates.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
基金Supported by the National Natural Science Founda-tion of China (60225007, 60572155) and the Science and Technology Research Project of Shanghai (04DZ07067)
文摘Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol.
基金the National Natural Science Foundation of China (60773086)
文摘The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.
文摘In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate.
基金This study is supported by the National Key Research and Development Program of China(2017YFB0307500).
文摘Implementing a new energy-saving electrochemical synthesis system with high commercial value is a strategy of the sustainable development for upgrading the bulk chemicals preparation technology in the future.Here,we report a multiple redox-mediated linear paired electrolysis system,combining the hydrogen peroxide mediated cathode process with the I2 mediated anode process,and realize the conversion of furfural to furoic acid in both side of the dividedflow cell simultaneously.By reasonably controlling the cathode potential,the undesired water splitting reaction and furfural reduction side reactions are avoided.Under the galvanostatic electrolysis,the two-mediated electrode processes have good compatibility,which reduce the energy consumption by about 22%while improving the electronic efficiency by about 125%.This system provides a green electrochemical synthesis route with commercial prospects.
基金supported by Joint Funds of the National Natural Science Foundation of China and Xinjiang under Project U1603261.
文摘The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows.Traditional methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on statistics.In these existing mechanisms,the identification of malicious flows depends on the IP address.However,the IP address is easy to be changed by attacks.Comparedwith the IP address,the certificate ismore challenging to be tampered with or forged.Moreover,the traffic trend in the network is towards encryption.The certificates are popularly utilized by IoT devices for authentication in encryption protocols.DTLShps proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN controller.Based on DTLShps,the SDN controller can collect statistics on certificates.In this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for IoT.Our goal is threefold.First,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire attack.Moreover,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay rate.Second,for detecting the Crossfire attack accurately,a method based on graph connectivity is proposed.Third,several trust-based routing principles are proposed tomitigate the Crossfire attack.These principles can also encourage users to use certificates in communication.The performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting schemes.Moreover,our trust model has a more appropriate decay rate than the traditional methods.
基金supported by the National Key R&D Program of China(No.2022YFA1602000)National Natural Science Foundation of China(Nos.12275081,U2067205,11790325,and U1732138)the Continuous-support Basic Scientific Research Project。
文摘Using the Skyrme density functional theory,potential energy surfaces of^(240)Pu with constraints on the axial quadrupole and octupole deformations(q_(20)and q_(30))were calculated.The volume-like and surface-like pairing forces,as well as a combination of these two forces,were used for the Hartree–Fock–Bogoliubov approximation.Variations in the least-energy fission path,fission barrier,pairing energy,total kinetic energy,scission line,and mass distribution of the fission fragments based on the different forms of the pairing forces were analyzed and discussed.The fission dynamics were studied based on the timedependent generator coordinate method plus the Gaussian overlap approximation.The results demonstrated a sensitivity of the mass and charge distributions of the fission fragments on the form of the pairing force.Based on the investigation of the neutron-induced fission of^(239)Pu,among the volume,mixed,and surface pairing forces,the mixed pairing force presented a good reproduction of the experimental data.
基金supported by the National Natural Science Foundation of China(72061147002)the National Social Science Foundation of China(18ZDA074)。
文摘The construction of a food certification system plays a vital role in upgrading export quality, which previous studies have largely overlooked. We match China's industry-level data of Green Food Certification with its HS6-digit export data of agri-food products to quantify the impact of Green Food Certification on export quality. We identify the significant and positive effect of Green Food Certification on export quality. The 2SLS estimation based on instrumental variables and a range of robustness checks confirm the validity and robustness of the benchmark conclusions. Further analysis discloses that Green Food Certification improves export quality by raising agricultural production efficiency and brand premiums. Heterogeneity analysis shows that the effect of Green Food Certification varies across regions, notably improving the quality of agri-food products exported to developed regions and regions with high levels of import supervision. Furthermore, among various product types, Green Food Certification significantly improves the export quality of primary products and products vulnerable to non-tariff measures. The above findings could guide the future development of agri-food quality certification systems, potentially leading to a transformation and promotion of the agri-food trade.
基金in part by the National Natural Science Foundation of China under Grants No.61003230,No.61370026,No.61300191,and No.61202445
文摘Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering the threat from the key exposure, it is desirable to incorporate the idea of key-insulated cryptosystem into the certificateless encryption. In this paper, we have designed an efficient certificateless keyinsulated encryption(CL-KIE) scheme to achieve this goal. By our approach, the computational performance of our scheme has been improved significantly in terms of reduction on running time and storage. We also gave the security proof of the new CL-KIE scheme against the chosen plaintext attacks(CPAs) in the random oracle, considering the assumption of the computational Diffie-Hellman(CDH) problem.
基金supported by Beijing Natural Science Foundation(Grant No.1242022).The numerical simulations in this work were performed at HSCC of Beijing Normal University.
文摘A recently discovered family of kagome lattice materials,AV_(3)Sb_(5)(A=K,Rb,Cs),has attracted great interest,especiallyin the debate over their dominant superconducting pairing symmetry.To explore this issue,we study the superconductingpairing behavior within the kagome-lattice Hubbard model through the constrained path Monte Carlo method.It isfound that doping around the Dirac point generates a dominant next-nearest-neighbor-d pairing symmetry driven by on-siteCoulomb interaction U.However,when considering the nearest-neighbor interaction V,it may induce nearest-neighbor-ppairing to become the preferred pairing symmetry.Our results provide useful information to identify the dominant superconductingpairing symmetry in the AV_(3)Sb_(5)family.
基金Project supported by the National Key Research and Development Program of China (Grant No.2021YFA1400400)the National Natural Science Foundation of China (Grant Nos.92165205,12074175,and 12374137)。
文摘By utilizing the fluctuation exchange approximation method,we perform a study on the superconducting pairing symmetry in a t_(2g) three-orbital model on the square lattice.Although the tight-binding parameters of the model are based on Sr_(2)RuO_(4),we have systematically studied the evolution of superconducting pairing symmetry with the carrier density and interactions,making our findings relevant to a broader range of material systems.Under a moderate Hund’s coupling,we find that spin fluctuations dominate the superconducting pairing,leading to a prevalent spin-singlet pairing with a d_(x^(2)-y^(2))-wave symmetry for the carrier density within the range of n=1.5-4 per site.By reducing the Hund’s coupling,the charge fluctuations are enhanced and play a crucial role in determining the pairing symmetry,leading to a transition of the pairing symmetry from the spin-singlet d_(x^(2)-y^(2))-wave to the spin-triplet p-wave.Furthermore,we find that the superconducting pairings are orbital dependent.As the carrier density changes from n=4 to n=1.5,the active orbitals for superconducting pairing shift from the quasi-two-dimensional orbital dxy to the quasi-one-dimensional orbitals d_(xz) and d_(yz).
基金Project supported by the National Natural Science Foundation of China (Grant No.12074130)the Natural Science Foundation of Guangdong Province (Grant No.2021A1515012340)。
文摘Recent experimental findings have demonstrated the occurrence of superconductivity in Bernal bilayer graphene when induced by a magnetic field.In this study,we conduct a theoretical investigation of the potential pairing symmetry within this superconducting system.By developing a theoretical model,we primarily calculate the free energy of the system with p+ip-wave parallel spin pairing,p+ip-wave anti-parallel spin pairing and d+i d-wave pairing symmetry.Our results confirm that the magnetic field is indeed essential for generating the superconductivity.We discover that the p+ip-wave parallel spin pairing leads to a lower free energy for the system.The numerical calculations of the energy band structure,zero-energy spectral function and density of states for each of the three pairing symmetries under consideration show a strong consistency with the free energy results.
基金supported by the National Natural Science Foundation of China(22379100,U21A20312)the Shenzhen Science and Technology Program(Grant No.20231121200418001)+1 种基金the Guangdong Basic and Applied Basic Research Foundation(2022B1515120084)the Key Project of Department of Education of Guangdong Province(2023ZDZX3020)。
文摘Electrochemical co-reduction of nitrate(NO_(3)^(-))and carbon dioxide(CO_(2))has been widely regarded as a promising route to produce urea under ambient conditions,however the yield rate of urea has remained limited.Here,we report an atomically ordered intermetallic pallium-zinc(PdZn)electrocatalyst comprising a high density of PdZn pairs for boosting urea electrosynthesis.It is found that Pd and Zn are responsible for the adsorption and activation of NO_(3)^(-)and CO_(2),respectively,and thus the co-adsorption and co-activation NO_(3)^(-)and CO_(2) are achieved in ordered PdZn pairs.More importantly,the ordered and well-defined PdZn pairs provide a dual-site geometric structure conducive to the key C-N coupling with a low kinetical barrier,as demonstrated on both operando measurements and theoretical calculations.Consequently,the PdZn electrocatalyst displays excellent performance for the co-reduction to generate urea with a maximum urea Faradaic efficiency of 62.78%and a urea yield rate of 1274.42μg mg^(-1) h^(-1),and the latter is 1.5-fold larger than disordered pairs in PdZn alloys.This work paves new pathways to boost urea electrosynthesis via constructing ordered dual-metal pairs.
文摘The operational rating system in building energy performance certificates(EPCs) has been used for systematically monitoring and diagnosing the energy performance in the operation and maintenance phases of existing buildings. However, there are several limitations of the conventional operational rating system,which can be subdivided into three aspects:(i) building category;(i i) region category; and(iii) space unit size. To overcome these challenges, this study conducted the problem analysis of the conventional operational rating system for existing buildings by using the statistical and geostatistical approaches. Based on the problem analysis, this study developed the dynamic operational rating(DOR) system for existing buildings by using the data-mining technique and the probability approach. The developed DOR system can be used as a tool for building energy performance diagnostics.To validate the applicability of the developed DOR system, educational facilities were selected as the representative type of existing buildings in South Korea. As a result, it was determined that the developed DOR system can solve the irrationality of the conventional operational rating system(i.e., the negative correlation between the space unit size and the CO2 emission density). Namely, the operational ratings of small buildings were adjusted upward while those of large buildings were adjusted downward. The developed DOR system can allow policymakers to establish the reasonable operational rating system for existing buildings, which can motivate the public to actively participate in energy-saving campaigns.
文摘The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature.
基金Project supported by the National Key Research and Development Program of China(Grant No.2019YFA0705000)Innovation Program for Quantum Science and Technology(Grant No.2021ZD0301500)+1 种基金Leading-edge Technology Program of Jiangsu Natural Science Foundation(Grant No.BK20192001)the National Natural Science Foundation of China(Grant Nos.51890861 and 11974178).
文摘Broadband photon pairs are highly desirable for quantum metrology,quantum sensing,and quantum communication.Such sources are usually designed through type-0 phase-matching spontaneous parametric down-conversion(SPDC)that makes the photon pairs hard to separate in the frequency-degenerate case and thus limits their applications.In this paper,we design a broadband frequency-degenerate telecom-band photon pair source via the type-II SPDC in a dispersion-engineered thin-film lithium niobate waveguide,where the polarization modes of photon pairs are orthogonal and thus are easily separated deterministically.With a 5-mm-long waveguide,our design can achieve a bandwidth of 5.56 THz(44.8 nm),which is 8.6 times larger than that of the bulk lithium niobate,and the central wavelength can be flexibly adjusted.Our design is a promising approach towards high-quality integrated photon sources and may have wide applications in photonic quantum technologies.