Taking AuCu3-type sublattice system as an example, three discoveries have been presented: First, the third barrier hindering the progress in metal materials science is that researchers have got used to recognizing exp...Taking AuCu3-type sublattice system as an example, three discoveries have been presented: First, the third barrier hindering the progress in metal materials science is that researchers have got used to recognizing experimental phenomena of alloy phase transitions during extremely slow variation in temperature by equilibrium thinking mode and then taking erroneous knowledge of experimental phenomena as selected information for establishing Gibbs energy function and so-called equilibrium phase diagram. Second, the equilibrium holographic network phase diagrams of AuCu3-type sublattice system may be used to describe systematic correlativity of the composition?temperature-dependent alloy gene arranging structures and complete thermodynamic properties, and to be a standard for studying experimental subequilibrium order-disorder transition. Third, the equilibrium transition of each alloy is a homogeneous single-phase rather than a heterogeneous two-phase, and there exists a single-phase boundary curve without two-phase region of the ordered and disordered phases; the composition and temperature of the top point on the phase-boundary curve are far away from the ones of the critical point of the AuCu3 compound.展开更多
Taking Au3Cu-type sublattice system as an example, three discoveries have been presented. First, the fourth barrier to hinder the progress of metal materials science is that today’s researchers do not understand that...Taking Au3Cu-type sublattice system as an example, three discoveries have been presented. First, the fourth barrier to hinder the progress of metal materials science is that today’s researchers do not understand that the Gibbs energy function of an alloy phase should be derived from Gibbs energy partition function constructed of alloy gene sequence and their Gibbs energy sequence. Second, the six rules for establishing alloy gene Gibbs energy partition function have been discovered, and it has been specially proved that the probabilities of structure units occupied at the Gibbs energy levels in the degeneracy factor for calculating configuration entropy should be degenerated as ones of component atoms occupied at the lattice points. Third, the main characteristics unexpected by today’s researchers are as follows. There exists a single-phase boundary curve without two-phase region coexisting by the ordered and disordered phases. The composition and temperature of the top point on the phase-boundary curve are far away from those of the critical point of the Au3Cu compound; At 0 K, the composition of the lowest point on the composition-dependent Gibbs energy curve is notably deviated from that of the Au3Cu compounds. The theoretical limit composition range of long range ordered Au3Cu-type alloys is determined by the first jumping order degree.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
The holomorphic factorization of the superstring partition function is verified at arbitrary genus. The evaluation of scattering amplitudes and the implications of genus-dependent estimates on the string coupling are ...The holomorphic factorization of the superstring partition function is verified at arbitrary genus. The evaluation of scattering amplitudes and the implications of genus-dependent estimates on the string coupling are given.展开更多
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.展开更多
The logistic growth model with correlated additive and multiplicative Gaussian white noise is used to anedyze tumor cell population. The effects of perfectly correlated and anti-correlated noise on the stationary prop...The logistic growth model with correlated additive and multiplicative Gaussian white noise is used to anedyze tumor cell population. The effects of perfectly correlated and anti-correlated noise on the stationary properties of tumor cell population are studied. As in both cases the diffusion coefficient has zero point in real number field, some special features of the system are arisen. It is found that in cause tumor cell extinction. In the perfectly anti-correlated tumor cell population exhibit two extrema. both cases, the increase of the multiplicative noise intensity case, the stationary probability distribution as a function of展开更多
Erceg in [1] extended the Hausdorff distance function betwen subsets of a set X to fuzzy settheory, and introduced a fuzzy pseudo-quasi-metric(p. q. metric) p: L^x xL^x -[0,∞] where L is acompletely distributive latt...Erceg in [1] extended the Hausdorff distance function betwen subsets of a set X to fuzzy settheory, and introduced a fuzzy pseudo-quasi-metric(p. q. metric) p: L^x xL^x -[0,∞] where L is acompletely distributive lattice, and the associated family of neighborhood mappings {Dr |r>O}. Thefuzzy metric space in Erceg's sense is denoted by (L^x, p, Dr) since there exists a one to one correspondence between fuzzy p. q. metrics and associatcd families of neighborhood mapping, a family{Dr|r>0}satisfying certain conditions is also callcd a (standard) fuzzy p. q metric. In [2] Liang defimed apointwise fuzzy p. q. metric d: P(L^x)×P(L^x)-[0, ∞) and applicd it to the construction of theproduct fuzzy metric. In this paper, we give axiomatic definitions of molcculewise and展开更多
The authors discuss the normality concerning holomorphic functions and get the following result. Let F be a family of functions holomorphic on a domain D C, all of whose zeros have multiplicity at least k, where k ≥...The authors discuss the normality concerning holomorphic functions and get the following result. Let F be a family of functions holomorphic on a domain D C, all of whose zeros have multiplicity at least k, where k ≥ 2 is an integer. Let h(z) ≠ 0 and oo be a meromorphic function on D. Assume that the following two conditions hold for every f C Dr : (a) f(z) = 0 =→ |f(k)(z)| 〈|h(z)|. (b) f(k)(z) ≠ h(z). Then F is normal on D.展开更多
This study proposes a new coding function for the symmetric W state. Based on the new coding function, a theoretical protocol of deterministic quanama communication (DQC) is proposed. The sender can use the proposed...This study proposes a new coding function for the symmetric W state. Based on the new coding function, a theoretical protocol of deterministic quanama communication (DQC) is proposed. The sender can use the proposed coding function to encode his/her message, and the receiver can perform the imperfect Bell measurement to obtain the sender's message. In comparison to the existing DQC protocols that also use the W class state, the proposed protocol is more efficient and also more practical within today's technology. Moreover, the security of this protocol is analyzed to show that any eavesdropper will be detected with a very high probability under both the ideal and the noisy quantum channel.展开更多
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func...In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.展开更多
The authors obtain a holomorphic Lefschetz fixed point formula for certain non-compact “hyperbolic” Kǎihler manifolds (e.g. Kǎihler hyperbolic manifolds, bounded domains of holomorphy) by using the Bergman kerne...The authors obtain a holomorphic Lefschetz fixed point formula for certain non-compact “hyperbolic” Kǎihler manifolds (e.g. Kǎihler hyperbolic manifolds, bounded domains of holomorphy) by using the Bergman kernel. This result generalizes the early work of Donnelly and Fefferman.展开更多
In this paper, the authors prove that if Mn is a complete noncompact Kaehler manifold with a pole p, and its holomorphic bisectional curvature is asymptotically nonnegative to p, then it is a Stein manifold.
This paper deals with two topics mentioned in the title. First, it is proved that function f in L^P( Da) can be decomposed into a sum g + h, where Da is an angular domain in the complex plane, g and h are the non-t...This paper deals with two topics mentioned in the title. First, it is proved that function f in L^P( Da) can be decomposed into a sum g + h, where Da is an angular domain in the complex plane, g and h are the non-tangential limits of functions in H^P(Da) and H^P(aD^c) in the sense of LP(Da), respectively. Second, the sufficient and necessary conditions between boundary values of holomorphic functions and distributions in n-dimensional complex space are obtained.展开更多
In the paper, necessary and sufficient conditions are provided for a function involving the divided difference of two psi functions to be completely monotonic. Consequently, a class of inequalities for sums are presen...In the paper, necessary and sufficient conditions are provided for a function involving the divided difference of two psi functions to be completely monotonic. Consequently, a class of inequalities for sums are presented, the logarithmically complete monotonicity of a function involving the ratio of two gamma functions are derived, and two double inequalities for bounding the ratio of two gamma functions are discovered.展开更多
基金Project(51071181)supported by the National Natural Science Foundation of ChinaProject(2013FJ4043)supported by the Natural Science Foundation of Hunan Province,China
文摘Taking AuCu3-type sublattice system as an example, three discoveries have been presented: First, the third barrier hindering the progress in metal materials science is that researchers have got used to recognizing experimental phenomena of alloy phase transitions during extremely slow variation in temperature by equilibrium thinking mode and then taking erroneous knowledge of experimental phenomena as selected information for establishing Gibbs energy function and so-called equilibrium phase diagram. Second, the equilibrium holographic network phase diagrams of AuCu3-type sublattice system may be used to describe systematic correlativity of the composition?temperature-dependent alloy gene arranging structures and complete thermodynamic properties, and to be a standard for studying experimental subequilibrium order-disorder transition. Third, the equilibrium transition of each alloy is a homogeneous single-phase rather than a heterogeneous two-phase, and there exists a single-phase boundary curve without two-phase region of the ordered and disordered phases; the composition and temperature of the top point on the phase-boundary curve are far away from the ones of the critical point of the AuCu3 compound.
基金Project(51071181)supported by the National Natural Science Foundation of ChinaProject(2013FJ4043)supported by the Natural Science Foundation of Hunan Province,China
文摘Taking Au3Cu-type sublattice system as an example, three discoveries have been presented. First, the fourth barrier to hinder the progress of metal materials science is that today’s researchers do not understand that the Gibbs energy function of an alloy phase should be derived from Gibbs energy partition function constructed of alloy gene sequence and their Gibbs energy sequence. Second, the six rules for establishing alloy gene Gibbs energy partition function have been discovered, and it has been specially proved that the probabilities of structure units occupied at the Gibbs energy levels in the degeneracy factor for calculating configuration entropy should be degenerated as ones of component atoms occupied at the lattice points. Third, the main characteristics unexpected by today’s researchers are as follows. There exists a single-phase boundary curve without two-phase region coexisting by the ordered and disordered phases. The composition and temperature of the top point on the phase-boundary curve are far away from those of the critical point of the Au3Cu compound; At 0 K, the composition of the lowest point on the composition-dependent Gibbs energy curve is notably deviated from that of the Au3Cu compounds. The theoretical limit composition range of long range ordered Au3Cu-type alloys is determined by the first jumping order degree.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘The holomorphic factorization of the superstring partition function is verified at arbitrary genus. The evaluation of scattering amplitudes and the implications of genus-dependent estimates on the string coupling are given.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
文摘The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.
基金Supported by the National Natural Science Foundation of China under Grant No. 11045004
文摘The logistic growth model with correlated additive and multiplicative Gaussian white noise is used to anedyze tumor cell population. The effects of perfectly correlated and anti-correlated noise on the stationary properties of tumor cell population are studied. As in both cases the diffusion coefficient has zero point in real number field, some special features of the system are arisen. It is found that in cause tumor cell extinction. In the perfectly anti-correlated tumor cell population exhibit two extrema. both cases, the increase of the multiplicative noise intensity case, the stationary probability distribution as a function of
文摘Erceg in [1] extended the Hausdorff distance function betwen subsets of a set X to fuzzy settheory, and introduced a fuzzy pseudo-quasi-metric(p. q. metric) p: L^x xL^x -[0,∞] where L is acompletely distributive lattice, and the associated family of neighborhood mappings {Dr |r>O}. Thefuzzy metric space in Erceg's sense is denoted by (L^x, p, Dr) since there exists a one to one correspondence between fuzzy p. q. metrics and associatcd families of neighborhood mapping, a family{Dr|r>0}satisfying certain conditions is also callcd a (standard) fuzzy p. q metric. In [2] Liang defimed apointwise fuzzy p. q. metric d: P(L^x)×P(L^x)-[0, ∞) and applicd it to the construction of theproduct fuzzy metric. In this paper, we give axiomatic definitions of molcculewise and
基金Project supported by the National Natural Science Foundation of China(No.11071074)the Outstanding Youth Foundation of Shanghai(No.slg10015)
文摘The authors discuss the normality concerning holomorphic functions and get the following result. Let F be a family of functions holomorphic on a domain D C, all of whose zeros have multiplicity at least k, where k ≥ 2 is an integer. Let h(z) ≠ 0 and oo be a meromorphic function on D. Assume that the following two conditions hold for every f C Dr : (a) f(z) = 0 =→ |f(k)(z)| 〈|h(z)|. (b) f(k)(z) ≠ h(z). Then F is normal on D.
基金supported by the National Science Council of the Republic of China(Grant No.NSC 98-2221-E-006-097-MY3)
文摘This study proposes a new coding function for the symmetric W state. Based on the new coding function, a theoretical protocol of deterministic quanama communication (DQC) is proposed. The sender can use the proposed coding function to encode his/her message, and the receiver can perform the imperfect Bell measurement to obtain the sender's message. In comparison to the existing DQC protocols that also use the W class state, the proposed protocol is more efficient and also more practical within today's technology. Moreover, the security of this protocol is analyzed to show that any eavesdropper will be detected with a very high probability under both the ideal and the noisy quantum channel.
基金supported by National Natural Science Foundation of China(Grant No.60970152)IIE's Research Project on Cryptography(Grant No.Y3Z0011102)+1 种基金the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA06010701)National Key Basic Research Program of China(973 Program)(Grant No.2011CB302400)
文摘In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement.
基金supported by the Program for New Century Excellent Talents in University of China (No. 050380)the Grant for Chinese Excellent Doctorate’s Degree Thesis (No. 200519)the Fok Ying Tung EducationFoundation and the National Natural Science Foundation of China (No. 10871145).
文摘The authors obtain a holomorphic Lefschetz fixed point formula for certain non-compact “hyperbolic” Kǎihler manifolds (e.g. Kǎihler hyperbolic manifolds, bounded domains of holomorphy) by using the Bergman kernel. This result generalizes the early work of Donnelly and Fefferman.
基金Project supported by the National Natural Science Foundation of China (No. 10471105, No. 10571135).
文摘In this paper, the authors prove that if Mn is a complete noncompact Kaehler manifold with a pole p, and its holomorphic bisectional curvature is asymptotically nonnegative to p, then it is a Stein manifold.
基金supported by the National Natural Science Foundation of China(No.11271045)the Higher School Doctoral Foundation of China(No.20100003110004)
文摘This paper deals with two topics mentioned in the title. First, it is proved that function f in L^P( Da) can be decomposed into a sum g + h, where Da is an angular domain in the complex plane, g and h are the non-tangential limits of functions in H^P(Da) and H^P(aD^c) in the sense of LP(Da), respectively. Second, the sufficient and necessary conditions between boundary values of holomorphic functions and distributions in n-dimensional complex space are obtained.
基金supported partially by the China Scholarship Council and the Science Foundation of Tianjin Polytechnic Universitysupported in part by the Natural Science Foundation Project of Chongqing,China(Grant No.CSTC2011JJA00024)+1 种基金the Research Project of Science and Technology of Chongqing Education Commission,China(Grant No.KJ120625)the Fund of Chongqing Normal University,China(Grant Nos.10XLR017 and 2011XLZ07)
文摘In the paper, necessary and sufficient conditions are provided for a function involving the divided difference of two psi functions to be completely monotonic. Consequently, a class of inequalities for sums are presented, the logarithmically complete monotonicity of a function involving the ratio of two gamma functions are derived, and two double inequalities for bounding the ratio of two gamma functions are discovered.