Projections of climate change are essential to guide sustainable development plans in the tropical Andean countries such as Peru. This study assessed the projections of precipitation and potential evaporation, rain er...Projections of climate change are essential to guide sustainable development plans in the tropical Andean countries such as Peru. This study assessed the projections of precipitation and potential evaporation, rain erosive potential, and precipitation concentration in the Mantaro River Basin, in the Peruvian Andes, which is important for agriculture and energy production in Peru. We assumed the Intergovernmental Panel on Climate Change (IPCC) AIB greenhouse gas emission scenario and simulated the global climate change by the HadCM3 global climate model. Due to the steepness of the mountain slopes and the narrowness of the river valley, this study uses the downscaling of the global model simulations by the regional Eta model down to 2o-km resolution. The downscaling projections show decrease in the monthly precipitation with respect to the baseline period, especially during the rainy season, between February and April, until the end of the 21st century. Meanwhile, a progressive increase in the monthly evaporation from the baseline period is projected. The Modified Fournier Index (MFI) shows a statistically significant downward trend in the Mantaro River Basin, whieh suggests a possible reduction in the rain erosive potential. The Precipitation Concentration Index (PCI) shows a statistically significant increasing trend, which indicates increasingly more irregular temporal distribution of precipitation towards the end of the century. The results of this study allow us to conclude that there should be a gradual increase in water deficit and precipitation concentration. Both changes can be negative for agriculture, power generation, and water supply in the Mantaro River Basin in Peru.展开更多
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode...A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.展开更多
Passive Millimeter-Wave(MMW)detection has become a threat to ground targets.Toenhance the survivability of the ground target in the future battlefield,passive MMW stealth tech-nology is analyzed in this paper.Based on...Passive Millimeter-Wave(MMW)detection has become a threat to ground targets.Toenhance the survivability of the ground target in the future battlefield,passive MMW stealth tech-nology is analyzed in this paper.Based on the passive MMW detection principle,computation andanalysis are made for the MMW apparent temperature of tank in different actual combat conditions.The necessity of the passive MMW stealth is analyzed and the passive MMW stealth methods arealso studied.展开更多
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct...Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.展开更多
AIM To evaluate the morphology of the colon in patients with irritable bowel syndrome(IBS) by using computed tomography colonography(CTC).METHODS Twelve patients with diarrhea type IBS(IBS-D), 13 patients with constip...AIM To evaluate the morphology of the colon in patients with irritable bowel syndrome(IBS) by using computed tomography colonography(CTC).METHODS Twelve patients with diarrhea type IBS(IBS-D), 13 patients with constipation type IBS(IBS-C), 12 patients with functional constipation(FC) and 14 control patients underwent colonoscopy following CTC. The lengths of the rectosigmoid colon, transverse colon and the total colon were measured. The diameters of the rectum, sigmoid colon, descending colon, transverse colon, and ascending colon were measured.RESULTS The mean length of the total colon was 156.5 cm in group C, 158.9 cm in group IBS-D, 172.0 cm in group IBS-C, and 188.8 cm in group FC. The total colon in group FC was significantly longer than that in group C(P < 0.05). The mean length of the rectosigmoid colon was 56.2 cm, 55.9 cm, 63.6cm, and 77.4 cm(NS). The mean length of the transverse colon was 49.9 cm, 43.1 cm, 57.0 cm, and 55.0 cm. The transverse colonin group IBS-D was significantly shorter than that in group IBS-C(P < 0.01) and that in group FC(P = 0.02). The mean diameter of the sigmoid colon was 4.0 cm, 3.3 cm, 4.2 cm, and 4.3 cm(NS). The mean diameter of the descending colon was 3.6 cm, 3.1 cm, 3.8 cm, and 4.3 cm. The descending colon diameter in group IBS-D was significantly less than that in group IBS-C(P = 0.03) and that in group FC(P < 0.001). The descending colon diameter in group FC was significantly greater than that in group C(P = 0.04). The mean diameter of the transverse colon was 4.4 cm, 3.3 cm, 4.2 cm, and 5.0 cm(NS).CONCLUSION CT colonography might contribute the clarification of subtypes of IBS.展开更多
There are some uncertain charazteristics of the Ds1(2536), which deserves further discussion. Based on the assumption that the meson is constituted by c s, and belongs to T doublet (1^+, 2^+), radiative decays ...There are some uncertain charazteristics of the Ds1(2536), which deserves further discussion. Based on the assumption that the meson is constituted by c s, and belongs to T doublet (1^+, 2^+), radiative decays Ds1(2536) → Ds(1968) +γ and Ds1(2536) → Ds^*(2112) + γ are studied in the CQM model The large branching ratios of them from our calculations not only indicate the process may be detected in the future experiments, but also can give a deep comprehension of the structure of it.展开更多
AIM: Chronic constipation is a frequent finding in children. In this age range, the concomitant occurrence of megarectum is not uncommon. However, the definition of megarectum is variable, and a few data exist for Ita...AIM: Chronic constipation is a frequent finding in children. In this age range, the concomitant occurrence of megarectum is not uncommon. However, the definition of megarectum is variable, and a few data exist for Italy.We studied anorectal manometric variables and sensation in a group of constipated children with megarectum defined by radiologic criteria. Data from this group were compared with those obtained in a similar group of children with recurrent abdominal pain.METHODS: Anorectal testing was carried out in both groups by standard manometric technique and rectal balloon expulsion test.RESULTS: Megarectum patients displayed discrete abnormalities of anorectal variables and sensation with respect to controls. In particular, the pelvic floor function appeared to be impaired in most patients.CONCLUSION: Constipated children with megarectum have abnormal anorectal function and sensation. These findings may be helpful for a better understanding of the pathophysiological basis of this condition.展开更多
This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works ...This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.展开更多
基金FAPEMIG (PPM X 45-16)CNPqpartially funded by CNPq 308035/2013-5
文摘Projections of climate change are essential to guide sustainable development plans in the tropical Andean countries such as Peru. This study assessed the projections of precipitation and potential evaporation, rain erosive potential, and precipitation concentration in the Mantaro River Basin, in the Peruvian Andes, which is important for agriculture and energy production in Peru. We assumed the Intergovernmental Panel on Climate Change (IPCC) AIB greenhouse gas emission scenario and simulated the global climate change by the HadCM3 global climate model. Due to the steepness of the mountain slopes and the narrowness of the river valley, this study uses the downscaling of the global model simulations by the regional Eta model down to 2o-km resolution. The downscaling projections show decrease in the monthly precipitation with respect to the baseline period, especially during the rainy season, between February and April, until the end of the 21st century. Meanwhile, a progressive increase in the monthly evaporation from the baseline period is projected. The Modified Fournier Index (MFI) shows a statistically significant downward trend in the Mantaro River Basin, whieh suggests a possible reduction in the rain erosive potential. The Precipitation Concentration Index (PCI) shows a statistically significant increasing trend, which indicates increasingly more irregular temporal distribution of precipitation towards the end of the century. The results of this study allow us to conclude that there should be a gradual increase in water deficit and precipitation concentration. Both changes can be negative for agriculture, power generation, and water supply in the Mantaro River Basin in Peru.
基金supported in part by National Natural Science Foundation of China under Grant Nos.60573127,60773012,and 60873082Natural Science Foundation of Hunan Province under Grant Nos.07JJ3128 and 2008RS4016+1 种基金Scientific Research Fund of Hunan Provincial Education Department under Grant No.08B011Postdoctoral Science Foundation of China under Grant Nos.20070420184 and 200801341
文摘A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.
文摘Passive Millimeter-Wave(MMW)detection has become a threat to ground targets.Toenhance the survivability of the ground target in the future battlefield,passive MMW stealth tech-nology is analyzed in this paper.Based on the passive MMW detection principle,computation andanalysis are made for the MMW apparent temperature of tank in different actual combat conditions.The necessity of the passive MMW stealth is analyzed and the passive MMW stealth methods arealso studied.
文摘Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.
文摘AIM To evaluate the morphology of the colon in patients with irritable bowel syndrome(IBS) by using computed tomography colonography(CTC).METHODS Twelve patients with diarrhea type IBS(IBS-D), 13 patients with constipation type IBS(IBS-C), 12 patients with functional constipation(FC) and 14 control patients underwent colonoscopy following CTC. The lengths of the rectosigmoid colon, transverse colon and the total colon were measured. The diameters of the rectum, sigmoid colon, descending colon, transverse colon, and ascending colon were measured.RESULTS The mean length of the total colon was 156.5 cm in group C, 158.9 cm in group IBS-D, 172.0 cm in group IBS-C, and 188.8 cm in group FC. The total colon in group FC was significantly longer than that in group C(P < 0.05). The mean length of the rectosigmoid colon was 56.2 cm, 55.9 cm, 63.6cm, and 77.4 cm(NS). The mean length of the transverse colon was 49.9 cm, 43.1 cm, 57.0 cm, and 55.0 cm. The transverse colonin group IBS-D was significantly shorter than that in group IBS-C(P < 0.01) and that in group FC(P = 0.02). The mean diameter of the sigmoid colon was 4.0 cm, 3.3 cm, 4.2 cm, and 4.3 cm(NS). The mean diameter of the descending colon was 3.6 cm, 3.1 cm, 3.8 cm, and 4.3 cm. The descending colon diameter in group IBS-D was significantly less than that in group IBS-C(P = 0.03) and that in group FC(P < 0.001). The descending colon diameter in group FC was significantly greater than that in group C(P = 0.04). The mean diameter of the transverse colon was 4.4 cm, 3.3 cm, 4.2 cm, and 5.0 cm(NS).CONCLUSION CT colonography might contribute the clarification of subtypes of IBS.
基金Supported by National Natural Science Foundation of China under Grant No.10847117 Hebei Province Department of Education under Grant No.2007409 Doctor Foundation of Hebei University under Grant No.Y2006081
文摘There are some uncertain charazteristics of the Ds1(2536), which deserves further discussion. Based on the assumption that the meson is constituted by c s, and belongs to T doublet (1^+, 2^+), radiative decays Ds1(2536) → Ds(1968) +γ and Ds1(2536) → Ds^*(2112) + γ are studied in the CQM model The large branching ratios of them from our calculations not only indicate the process may be detected in the future experiments, but also can give a deep comprehension of the structure of it.
文摘AIM: Chronic constipation is a frequent finding in children. In this age range, the concomitant occurrence of megarectum is not uncommon. However, the definition of megarectum is variable, and a few data exist for Italy.We studied anorectal manometric variables and sensation in a group of constipated children with megarectum defined by radiologic criteria. Data from this group were compared with those obtained in a similar group of children with recurrent abdominal pain.METHODS: Anorectal testing was carried out in both groups by standard manometric technique and rectal balloon expulsion test.RESULTS: Megarectum patients displayed discrete abnormalities of anorectal variables and sensation with respect to controls. In particular, the pelvic floor function appeared to be impaired in most patients.CONCLUSION: Constipated children with megarectum have abnormal anorectal function and sensation. These findings may be helpful for a better understanding of the pathophysiological basis of this condition.
基金the National Natural Science Foundation of China(No.60803146)
文摘This paper proposes an efficient batch secret sharing protocol among n players resilient to t 〈 n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.